SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Insight into today's IT Strategic Challenges Jorge Sebastião Founder and CEO [email_address] www.esgulf.com
The Net is very different Internet Instantaneous Any- to-any Standards- based Always- on Mobility In person Phone Mail Private  networks
 
How Do We Manage Enterprise Complexity? ERP Solutions Mainframe Client/Server Heterogeneous distributed databases Mission Critical Availability The Internet heightens availability requirements Inter-dependencies of applications with business
Products Are Not Enough People Technology Process
Management Requirements
10 Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],User Awareness and Adoption?
Support Requirements ,[object Object],Research Note
Unavailability Technical skills ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Professional Development ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Professional Development ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Telephone Services Data Services  (WWW,  e-mail, etc) Video  Services  (TV, movie, etc) Telephone Services Network Video Services Network Data Services Network Policy Area 1 Policy Area 2 Policy Area 3 Legacy: Vertically-Integrated Networks pre-NGN Network Challenges - Legacy Networks
Network Challenges– NGN challenges Source TIPHON Control Area lP/MPLS Core Network Transport Area Service/ Application Area PSTN Internet Soft Switch ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Messaging Application Media Gateways Application Hosting ,[object Object],[object Object],[object Object],[object Object],Web based Service selection Application Mediation Layer Enterprise ASP 3rd party Application Policy Server Aggregation Network Metro Optical RAS DSL Cable Frame/ATM Wireless Service Switch ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Challenges– Business Drivers Service Control Layer lP/MPLS Core Network Layer Application Layer PSTN Internet Soft Switch ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Messaging Application Media Gateways Application Hosting ,[object Object],[object Object],[object Object],[object Object],Web based Service selection Application Mediation Layer Enterprise ASP 3rd party Application Policy Server LDAP based Aggregation Network Metro Optical RAS DSL Cable Frame/ATM Wireless IP Service Switch IP Video Internet Offload IP Voice IP VPN IP Transport Multimedia Conferencing Unified  Messaging Virtual Office Tele Education E-Business Margin
Users Want Mobility? Home working 89%   of top 100 US companies offer telecommuting 2 60%+   Britons & Germans equipped to work remotely 1 Mobility How many of us using Mobile Today  ≥ 66%   workers will use mobile & wireless computing 1 Branch Offices 60 %   of employees work at Branches Virtual 58%   companies consider theirs to be a virtual workplace today 1 interpretation of analyst data  2 ComputerWorld survey
New Corporate Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobility and Access Management Control Loosely-coupled, Dynamic exterior Tightly-coupled, Persistent interior Intranet Extranets Customers Partners/Suppliers Employees Consumers Internet
Mobility Devices ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Is Privacy & Why Does It Matter? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Does New Technology  Threaten Our Privacy? ,[object Object],[object Object],[object Object]
Technology - Opportunities and Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Privacy Risks By Legislation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Risks Using Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evolving Risks – Banking Ex
Phishing new threat
First Phishing – Now Ransomware ,[object Object],[object Object],[object Object]
IT and Corporate Governance Business BSC IT BSC CoBiT ITIL ( & BS15000) ISO27001/BS7799 IT Governance & ITSM
Multitude of Governance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics and IT Systems ,[object Object],PIN Rapid! Know Have Be
Biometric Process-1 Enrollment stage Identification stage Biometric Present Sensor Signal Process Reject Accept Sensor Biometric Present Storage Decision Signal Process
Biometrics and Statistics ,[object Object],[object Object],[object Object],[object Object]
Biometrics-enabled Authentication Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics-Problems
Smartcards-The Wallet Computer
SmartCards Influencing Implementation Multipurpose Secure Personal ID System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User Privacy Acceptance Social
SmartCards Impediments to use ,[object Object],[object Object],[object Object]
SmartCard Issues-1 What information? Where it is stored? Who is entitled to access it? How it is protected from un-authorized access? Privacy Authority: oversees, administers, enforces ID program. Governance Card is either alternative or mandatory ID. Voluntary vs. Mandatory ID Requirements Policy
Issues-2 Amount and type of information applied for risk profiling? Profiling Allowable means proving identity prior to ID issuance Mechanisms for Issuance Which standards? Interoperability? Standards Degree of authentication? Level of risk mgmt required?  P ublic acceptance of the process? Level of Authentication Requirements Policy
Infrastructure Management Challenges Reduce Complexity Bandwidth Utilization Network Resource Accountability Guaranteed Network Performance Security
Infrastructure Mgmt Fragmented IT Desktop Help Desk LAN Admin DBA Operations Mainframe Security Network Management Chaos Business User Non  IT  Devices Applications Databases Systems Networks
Fragmented Service Delivery Desktop Help Desk LAN Admin DBA Operations Mainframe Security Network Management 97% 97% 97% 97% 97% 97% 97% 97% Business User Non  IT  Devices Applications Databases Systems Networks 76% Availability
Government Education Dept 0 1 2 3 4 5 Service Level Management Availability Management IT Service Continuity Financial Management Capacity Management Service Desk Incident Management Problem Management Config. Management Change Management Release Management Efficiency & effectiveness Process Maturity
Project Failure Rates ,[object Object],Challenged Succeeded  Failed 28% 46% 26%
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Priorities By Function ,[object Object],[object Object],[object Object],[object Object],CIO Data Center Networking Operations VP  Infrastructure
People Business Processes Technology Delivering ROI Competitive Advantage
Service Improvement A process led approach Maintaining the momentum Where do we  want to be? Vision and Business objectives Where are we now? Assessments How do we get where we want? Process Change How do we know we have arrived? Metrics
Maturity
Process Maturity Framework The Five Levels of Service Management Process Maturity Ref:  based on Norton / Nolan & CMM In terms of: - vision & strategy - steering - processes - people - technology - culture 1 Initial 2 Repeatable 3 Defined 4 Managed 5 Optimised
Implementation Process Education Standards & Best Practices Support
Solution Building Blocks INTEGRATED ICT SOLUTIONS VOICE FRAME/ATM MPLS BANDWIDTH INTERNET MANAGED WAN MANAGED LAN MANAGED VoIP MANAGED SECURITY MANAGED MOBILITY BUSINESS SERVICES VALUE ADDED SERVICES NETWORK SERVICES NETWORK PRODUCTS NETWORK & ACCESS INTEGRATED SOLUTIONS IT SERVICES & APPLICATIONS WIRELESS SATELLITE xDSL ETHERNET LEASED LINE HOSTING &  STORAGE OUTSOURCED CALL CENTRE  MESSAGING HOSTED MMVoIP MULTI-MEDIA CALL CENTRE VoIP PORTALS/ INTRANET CRM APPLICATIONS MANAGED  DESKTOP SECURITY NETWORK. OUTSOURCING BUSINESS OUTSOURCING ENTERPRISE SECURITY SYSTEMS INTEGRATION TECHNOLOGY CONSULTING
Implementation Challenges Theory… Practice:…
Questions?

Weitere ähnliche Inhalte

Andere mochten auch

Landesweite Lernplattform in Bremen - Einführung von itslearning
 Landesweite Lernplattform in Bremen - Einführung von itslearning Landesweite Lernplattform in Bremen - Einführung von itslearning
Landesweite Lernplattform in Bremen - Einführung von itslearningUnivention GmbH
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureSociety of Women Engineers
 
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...Univention GmbH
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionSociety of Women Engineers
 
오픈소스 공헌을 위한 필수 지식
오픈소스 공헌을 위한 필수 지식오픈소스 공헌을 위한 필수 지식
오픈소스 공헌을 위한 필수 지식Matthew (정재화)
 
ビビッド・パワポ・オペーレーション Revision 2015
ビビッド・パワポ・オペーレーション Revision 2015ビビッド・パワポ・オペーレーション Revision 2015
ビビッド・パワポ・オペーレーション Revision 2015Masahito Zembutsu
 
Human Resource Management presentation.Human Resource roles,Human resource Fu...
Human Resource Management presentation.Human Resource roles,Human resource Fu...Human Resource Management presentation.Human Resource roles,Human resource Fu...
Human Resource Management presentation.Human Resource roles,Human resource Fu...Jubin Johny
 
Applying Data Science to Your Business Problem
Applying Data Science to Your Business ProblemApplying Data Science to Your Business Problem
Applying Data Science to Your Business ProblemCA Technologies
 

Andere mochten auch (15)

Landesweite Lernplattform in Bremen - Einführung von itslearning
 Landesweite Lernplattform in Bremen - Einführung von itslearning Landesweite Lernplattform in Bremen - Einführung von itslearning
Landesweite Lernplattform in Bremen - Einführung von itslearning
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
 
WE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace SexismWE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace Sexism
 
agentes de transporte
agentes de transporteagentes de transporte
agentes de transporte
 
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...
Best Practice - ein Beispiel gelungener Zusammenarbeit zwischen Univention Pa...
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and Inclusion
 
오픈소스 공헌을 위한 필수 지식
오픈소스 공헌을 위한 필수 지식오픈소스 공헌을 위한 필수 지식
오픈소스 공헌을 위한 필수 지식
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
 
EMEA Airheads- ArubaOS - Understanding Control-Plane-Security
EMEA Airheads-  ArubaOS - Understanding Control-Plane-SecurityEMEA Airheads-  ArubaOS - Understanding Control-Plane-Security
EMEA Airheads- ArubaOS - Understanding Control-Plane-Security
 
ビビッド・パワポ・オペーレーション Revision 2015
ビビッド・パワポ・オペーレーション Revision 2015ビビッド・パワポ・オペーレーション Revision 2015
ビビッド・パワポ・オペーレーション Revision 2015
 
Human Resource Management presentation.Human Resource roles,Human resource Fu...
Human Resource Management presentation.Human Resource roles,Human resource Fu...Human Resource Management presentation.Human Resource roles,Human resource Fu...
Human Resource Management presentation.Human Resource roles,Human resource Fu...
 
Applying Data Science to Your Business Problem
Applying Data Science to Your Business ProblemApplying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
 

Ähnlich wie Insight into IT Strategic Challenges

Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentationTed Wentzel
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency, Inc.
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDForgeRock
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudGuy Vinograd ☁
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 

Ähnlich wie Insight into IT Strategic Challenges (20)

02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentation
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentation
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Information Security
Information SecurityInformation Security
Information Security
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 

Mehr von Jorge Sebastiao

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchainJorge Sebastiao
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3Jorge Sebastiao
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startupsJorge Sebastiao
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0Jorge Sebastiao
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart CityJorge Sebastiao
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0Jorge Sebastiao
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Jorge Sebastiao
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1Jorge Sebastiao
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Jorge Sebastiao
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Jorge Sebastiao
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Jorge Sebastiao
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Jorge Sebastiao
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4Jorge Sebastiao
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumJorge Sebastiao
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasJorge Sebastiao
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?Jorge Sebastiao
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Jorge Sebastiao
 

Mehr von Jorge Sebastiao (20)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance Forum
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 

Kürzlich hochgeladen

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Kürzlich hochgeladen (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

Insight into IT Strategic Challenges

  • 1. Insight into today's IT Strategic Challenges Jorge Sebastião Founder and CEO [email_address] www.esgulf.com
  • 2. The Net is very different Internet Instantaneous Any- to-any Standards- based Always- on Mobility In person Phone Mail Private networks
  • 3.  
  • 4. How Do We Manage Enterprise Complexity? ERP Solutions Mainframe Client/Server Heterogeneous distributed databases Mission Critical Availability The Internet heightens availability requirements Inter-dependencies of applications with business
  • 5. Products Are Not Enough People Technology Process
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Telephone Services Data Services (WWW, e-mail, etc) Video Services (TV, movie, etc) Telephone Services Network Video Services Network Data Services Network Policy Area 1 Policy Area 2 Policy Area 3 Legacy: Vertically-Integrated Networks pre-NGN Network Challenges - Legacy Networks
  • 14.
  • 15.
  • 16. Users Want Mobility? Home working 89% of top 100 US companies offer telecommuting 2 60%+ Britons & Germans equipped to work remotely 1 Mobility How many of us using Mobile Today ≥ 66% workers will use mobile & wireless computing 1 Branch Offices 60 % of employees work at Branches Virtual 58% companies consider theirs to be a virtual workplace today 1 interpretation of analyst data 2 ComputerWorld survey
  • 17.
  • 18. Mobility and Access Management Control Loosely-coupled, Dynamic exterior Tightly-coupled, Persistent interior Intranet Extranets Customers Partners/Suppliers Employees Consumers Internet
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Evolving Risks – Banking Ex
  • 27.
  • 28. IT and Corporate Governance Business BSC IT BSC CoBiT ITIL ( & BS15000) ISO27001/BS7799 IT Governance & ITSM
  • 29.
  • 30.
  • 31. Biometric Process-1 Enrollment stage Identification stage Biometric Present Sensor Signal Process Reject Accept Sensor Biometric Present Storage Decision Signal Process
  • 32.
  • 33.
  • 36.
  • 37.
  • 38. SmartCard Issues-1 What information? Where it is stored? Who is entitled to access it? How it is protected from un-authorized access? Privacy Authority: oversees, administers, enforces ID program. Governance Card is either alternative or mandatory ID. Voluntary vs. Mandatory ID Requirements Policy
  • 39. Issues-2 Amount and type of information applied for risk profiling? Profiling Allowable means proving identity prior to ID issuance Mechanisms for Issuance Which standards? Interoperability? Standards Degree of authentication? Level of risk mgmt required? P ublic acceptance of the process? Level of Authentication Requirements Policy
  • 40. Infrastructure Management Challenges Reduce Complexity Bandwidth Utilization Network Resource Accountability Guaranteed Network Performance Security
  • 41. Infrastructure Mgmt Fragmented IT Desktop Help Desk LAN Admin DBA Operations Mainframe Security Network Management Chaos Business User Non IT Devices Applications Databases Systems Networks
  • 42. Fragmented Service Delivery Desktop Help Desk LAN Admin DBA Operations Mainframe Security Network Management 97% 97% 97% 97% 97% 97% 97% 97% Business User Non IT Devices Applications Databases Systems Networks 76% Availability
  • 43. Government Education Dept 0 1 2 3 4 5 Service Level Management Availability Management IT Service Continuity Financial Management Capacity Management Service Desk Incident Management Problem Management Config. Management Change Management Release Management Efficiency & effectiveness Process Maturity
  • 44.
  • 45.
  • 46. People Business Processes Technology Delivering ROI Competitive Advantage
  • 47. Service Improvement A process led approach Maintaining the momentum Where do we want to be? Vision and Business objectives Where are we now? Assessments How do we get where we want? Process Change How do we know we have arrived? Metrics
  • 49. Process Maturity Framework The Five Levels of Service Management Process Maturity Ref: based on Norton / Nolan & CMM In terms of: - vision & strategy - steering - processes - people - technology - culture 1 Initial 2 Repeatable 3 Defined 4 Managed 5 Optimised
  • 50. Implementation Process Education Standards & Best Practices Support
  • 51. Solution Building Blocks INTEGRATED ICT SOLUTIONS VOICE FRAME/ATM MPLS BANDWIDTH INTERNET MANAGED WAN MANAGED LAN MANAGED VoIP MANAGED SECURITY MANAGED MOBILITY BUSINESS SERVICES VALUE ADDED SERVICES NETWORK SERVICES NETWORK PRODUCTS NETWORK & ACCESS INTEGRATED SOLUTIONS IT SERVICES & APPLICATIONS WIRELESS SATELLITE xDSL ETHERNET LEASED LINE HOSTING & STORAGE OUTSOURCED CALL CENTRE MESSAGING HOSTED MMVoIP MULTI-MEDIA CALL CENTRE VoIP PORTALS/ INTRANET CRM APPLICATIONS MANAGED DESKTOP SECURITY NETWORK. OUTSOURCING BUSINESS OUTSOURCING ENTERPRISE SECURITY SYSTEMS INTEGRATION TECHNOLOGY CONSULTING

Hinweis der Redaktion

  1. Introduction of presentation, speaker, and thank you. Introduction into an updated strategy for eSecurity effective for today’s technologies, and eGovernment environments.