SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Going Native
Citizens, Smart Cities, & Security
January 2018
David Bressler, VP Industry Solutions, API Management @ CA Technologies
http://davidbressler.com
Smart City value will be realized through software. More software means
more value, but also more complexity. Learn how to frame this complexity in
order to prevent security from becoming a barrier to citizen engagement.
This person.
This moment.
This job.
The generic play:
modernize your application
architecture
4
5
6
Process
Data
Event
More than data is necessary to
create an experience
7
Persona
Moment
Job
The platform
informs the
experience
Why Native?
9
The Challenge to Secure
Smart City Applications:
How do I create:
• A native security experience that is
convenient, frictionless, and makes it fast
to add to new security modalities to apps?
• Secure enough to meet audits &
compliance requirements?
• Provides “developer velocity”: maximum
value without high costs to develop,
operate, or support?
Velocity
Convenience
Security
Decouple Security
from the app silo
Take as much authentication, data
governance, or security architecture
decisions out of the application silo.
The developers in that silo may not have
anything to do with you.
12
13
Benefits and Outcomes:
14
Native security
experiences, as they
evolve
Our voice will authenticate us, when it does, it should be as
seamless as FaceID was for TouchID developers
Many security use cases
”out of the box”
Two factor. Token passing. Others. We’ve seen how two-factor
has evolved to bypass SMS weakness; how many still haven’t
figured it out?
Governed in the platform,
not the silo
How do we use context and identity to reduce risk? Security
officers should decide, implement, and govern. App developers?
Let them write apps.
Faster/Cheaper to develop Not every developer needs to be a security expert; not every
project needs a security implementation timeline.
Increased security / identity
sophistication because not
building on the legacy of
desktop security
My bank app still “times me out after inactivity” in their mobile
app, like I’m in a browser session! How many companies still
require regularly changed passwords? If that’s so important,
why doesn’t Google/Apple?
Can our
Smart Cities
be Healthier
Cities?
If 20 minutes of
exercise, 3x per week
improves health
outcomes, could I
lower insurance rates
for people willing to
share their smart-bike
activity?
15bit.ly/HealthyCiti
In China people who follow the
rules have better credit scores:
16
VP, Industry Solutions
david.Bressler@ca.com
David Bressler
@djbressler
http://davidbressler.com
http://linkedin.com/in/djbressler
Thank You.

Weitere ähnliche Inhalte

Was ist angesagt?

Envisioning your Monitoring Strategy
Envisioning your Monitoring StrategyEnvisioning your Monitoring Strategy
Envisioning your Monitoring Strategyintuit_india
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldEkhlaque Bari
 
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and ManagementNUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and ManagementNUS-ISS
 
Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021Pixel Crayons
 
Mobile Strategies That Work - ServiceNow - July 2013
Mobile Strategies That Work - ServiceNow - July 2013Mobile Strategies That Work - ServiceNow - July 2013
Mobile Strategies That Work - ServiceNow - July 2013PeopleReign, Inc.
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationPaul Tocatlian
 
Smarter Print Workflows for the Connected Enterprise
Smarter Print Workflows for the Connected EnterpriseSmarter Print Workflows for the Connected Enterprise
Smarter Print Workflows for the Connected EnterpriseSamsung Business USA
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroIBM Security
 
5 big enterprise application development trends of 2017
5 big enterprise application development trends of 20175 big enterprise application development trends of 2017
5 big enterprise application development trends of 2017TRooTech Business Solutions
 
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Richard Rabins
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoTPaul Madsen
 
From APM to Full Stack with Blue Medora [FutureStack16]
From APM to Full Stack with Blue Medora [FutureStack16]From APM to Full Stack with Blue Medora [FutureStack16]
From APM to Full Stack with Blue Medora [FutureStack16]New Relic
 
Top 5 Software Development Jobs In Trending
Top 5 Software Development Jobs In TrendingTop 5 Software Development Jobs In Trending
Top 5 Software Development Jobs In TrendingMyjobspace
 
Spider logiccorporatepresentation
Spider logiccorporatepresentationSpider logiccorporatepresentation
Spider logiccorporatepresentationGirish Ramachandra
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Preventive Maintenance and IoE
Preventive Maintenance and IoEPreventive Maintenance and IoE
Preventive Maintenance and IoERF Studio
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Embedded Development - to Fit the Unique Needs of Enterprises Around the Globe
Embedded Development - to Fit the Unique Needs of Enterprises Around the GlobeEmbedded Development - to Fit the Unique Needs of Enterprises Around the Globe
Embedded Development - to Fit the Unique Needs of Enterprises Around the GlobeTizbi, Inc.
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IRelayware
 
Ethical Artificial Intelligence
Ethical Artificial IntelligenceEthical Artificial Intelligence
Ethical Artificial IntelligenceRudradeb Mitra
 

Was ist angesagt? (20)

Envisioning your Monitoring Strategy
Envisioning your Monitoring StrategyEnvisioning your Monitoring Strategy
Envisioning your Monitoring Strategy
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital world
 
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and ManagementNUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
 
Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021
 
Mobile Strategies That Work - ServiceNow - July 2013
Mobile Strategies That Work - ServiceNow - July 2013Mobile Strategies That Work - ServiceNow - July 2013
Mobile Strategies That Work - ServiceNow - July 2013
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise Transformation
 
Smarter Print Workflows for the Connected Enterprise
Smarter Print Workflows for the Connected EnterpriseSmarter Print Workflows for the Connected Enterprise
Smarter Print Workflows for the Connected Enterprise
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security Superhero
 
5 big enterprise application development trends of 2017
5 big enterprise application development trends of 20175 big enterprise application development trends of 2017
5 big enterprise application development trends of 2017
 
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
From APM to Full Stack with Blue Medora [FutureStack16]
From APM to Full Stack with Blue Medora [FutureStack16]From APM to Full Stack with Blue Medora [FutureStack16]
From APM to Full Stack with Blue Medora [FutureStack16]
 
Top 5 Software Development Jobs In Trending
Top 5 Software Development Jobs In TrendingTop 5 Software Development Jobs In Trending
Top 5 Software Development Jobs In Trending
 
Spider logiccorporatepresentation
Spider logiccorporatepresentationSpider logiccorporatepresentation
Spider logiccorporatepresentation
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Preventive Maintenance and IoE
Preventive Maintenance and IoEPreventive Maintenance and IoE
Preventive Maintenance and IoE
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Embedded Development - to Fit the Unique Needs of Enterprises Around the Globe
Embedded Development - to Fit the Unique Needs of Enterprises Around the GlobeEmbedded Development - to Fit the Unique Needs of Enterprises Around the Globe
Embedded Development - to Fit the Unique Needs of Enterprises Around the Globe
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART I
 
Ethical Artificial Intelligence
Ethical Artificial IntelligenceEthical Artificial Intelligence
Ethical Artificial Intelligence
 

Ähnlich wie 2018 01 smart city symposium - db

Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development TrendsJane Brewer
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022Cerebrum Infotech
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?Jane Brewer
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxAdvance Tech
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesPavan Kumar
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Hemang Rindani
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Cygnet Infotech
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...Utah Tech Labs
 

Ähnlich wie 2018 01 smart city symposium - db (20)

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development Trends
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docx
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
 

Kürzlich hochgeladen

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Kürzlich hochgeladen (20)

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

2018 01 smart city symposium - db

  • 1. Going Native Citizens, Smart Cities, & Security January 2018 David Bressler, VP Industry Solutions, API Management @ CA Technologies http://davidbressler.com Smart City value will be realized through software. More software means more value, but also more complexity. Learn how to frame this complexity in order to prevent security from becoming a barrier to citizen engagement.
  • 2.
  • 4. The generic play: modernize your application architecture 4
  • 5. 5
  • 6. 6
  • 7. Process Data Event More than data is necessary to create an experience 7 Persona Moment Job
  • 10. The Challenge to Secure Smart City Applications: How do I create: • A native security experience that is convenient, frictionless, and makes it fast to add to new security modalities to apps? • Secure enough to meet audits & compliance requirements? • Provides “developer velocity”: maximum value without high costs to develop, operate, or support? Velocity Convenience Security
  • 11. Decouple Security from the app silo Take as much authentication, data governance, or security architecture decisions out of the application silo. The developers in that silo may not have anything to do with you.
  • 12. 12
  • 13. 13
  • 14. Benefits and Outcomes: 14 Native security experiences, as they evolve Our voice will authenticate us, when it does, it should be as seamless as FaceID was for TouchID developers Many security use cases ”out of the box” Two factor. Token passing. Others. We’ve seen how two-factor has evolved to bypass SMS weakness; how many still haven’t figured it out? Governed in the platform, not the silo How do we use context and identity to reduce risk? Security officers should decide, implement, and govern. App developers? Let them write apps. Faster/Cheaper to develop Not every developer needs to be a security expert; not every project needs a security implementation timeline. Increased security / identity sophistication because not building on the legacy of desktop security My bank app still “times me out after inactivity” in their mobile app, like I’m in a browser session! How many companies still require regularly changed passwords? If that’s so important, why doesn’t Google/Apple?
  • 15. Can our Smart Cities be Healthier Cities? If 20 minutes of exercise, 3x per week improves health outcomes, could I lower insurance rates for people willing to share their smart-bike activity? 15bit.ly/HealthyCiti
  • 16. In China people who follow the rules have better credit scores: 16
  • 17. VP, Industry Solutions david.Bressler@ca.com David Bressler @djbressler http://davidbressler.com http://linkedin.com/in/djbressler Thank You.

Hinweis der Redaktion

  1. For most, this is part of the EHR… but modern application design takes a feature of a bigger system and makes it more relevant. In this case, knowing that not everyone is a doctor and may not even know what medications tney take… they do know the shape/color of their pills, so this is designed around those people (that persona!). For anyone that’s booked travel on a corporate travel reservation system or done the resulting expense report – I’m neither travel agent nor accountant. It’s only recently that applications have become easier without deep knowledge of the space. As a user, I struggle with this very problem (with pills). And there are so many who’d benefit, yet it can’t get done? Why? Let’s look at a simpler example… [next]
  2. This struck me as a great concept. It tells you something useful, makes it actionable, and presents relevant information to make the decision it wants you to do. This is a demonstration of the value we get from breaking down silos – there’s a weather app, a schedule/calendar app, and a health app… like a mash-up, only you can imagine needing many of these apps, native is critical, and you can imagine real use cases requiring identity/security. Idea that this is probably a good example of a non-native app is OK, but… what about Apple Watch notifications (or gathering data)? What about actions… I could schedule that run right from my watch, and just move on. Might I want to share this information with my insurance company to lower my rates? Or capture information to improve city traffic management / parks / congestion? I get the sense that presented with this concept, people would say “yeah we could do that…” but then it’s never prioritized because it’s just a “UI” problem. The ”hard part” is already done – gathering the information and making it available.
  3. These are informed by Persona, Journey, and Job to come up with an application (and there can be as many as you can deliver, so lots of opportunities as things get connected in smart cities, there’s going to be so much data and so much access to things at the periphery, so technology/software can reach beyond the boundaries of the screen with human input)
  4. Why is native such a hard idea for big companies to get their heads around? Browsers have trained them in “write once, run everywhere”. And that worked when the computing stack was a PC, and the interaction model was fixed. Now, there are an order of magnitude more devices, and that’s enough for multiple “operating systems to ‘win’”. And, technology is fragmenting as a result. Apple’s AR will not be compatible or evolve at the same cadence as Google’s. What to do? Can talk about voice, and how that will impact things. Is the watch the same as a tablet? What about event-driven applciations (notifications) rather than traditional UI-based applications? Let me say this another way. Snapchat cold not exist on a desktop computer, it just wouldn’t make sense. What other opportunities are we missing because we keep thinking with a desktop mindset… extend that… what are we missing on the watch if we keep thinking it’s an accessory to the phone? Tablet? TV? Whatever’s next?
  5. Thoughts… On point #3 – can use story of planning a dive and not incorporating risk at every step of the plan, just at the end. For people who didn’t plan that way, they’d look at what I did as impossible. On point #5 – can use story of doctors who used to have x-ray or radiology in house, but specialized places see more, have better experience, and can make investment better than an individual doctor.
  6. Ask, so is this a citibike app, a cigna app, or a NY app? Who develops it? Who benefits? We need to create a platform for permissionless innovation, and we can’t do that without the right data governance and security. The security technology is there today, it’s just unevenly implemented. Make it easier to do security well by building capabilities into the platform so developers don’t have to do it in the silo, defining repeatable security use cases so that we can deliver the security experience to match the risk, and managing risk actively in the flow of app traffic (what are they trying to do, what is and where is the risk, and should we let them do it).
  7. If you think my citibike idea is way out there… hello, it’s already happening (granted, in China where we definitely don’t see eye-to-eye on personal data privacy rights… but that’s just an implementation issue).