david cooper
Post on 18-Oct-2014
420 views
DESCRIPTION
TRANSCRIPT
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud Evolution David Cooper
Public Sector CTO , Asia Pacific & Japan
Hewlett-Packard Enterprise Group
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
1950s
1960s
1970s
1980s
1990s
today
2000s
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3
The first stage reach
1970 1960 1980 2000 1990 2010 t
2005 2020
The Internet
Connectivity
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4
The second stage reach
1970 1960 1980 2000 1990 2010 t
2005 2020
The Web
Information &
e-commerce The Internet
Connectivity
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6
Ecosystems now drive Consumption &
Expectations
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. …we will be constantly connected.
2010 3.8 exabytes
2020 127 exabytes
Mobile traffic multiplies
Mobile traffic forecast in EB (exabytes)
(1EB = 1,000,000 terabytes)
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 8
The third stage reach
1970 1960 1980 2000 1990 2010 t
2005 2020
The
Cloud
Services The Web
Information &
e-commerce The Internet
Connectivity
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9
Hybrid Cloud Model
Service Level Agreements (SLAs) Availability, Security, Performance, Compliance, Cost
Build & operate Consume
Private Cloud
Community
Cloud
Public Cloud
Traditional IT
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 10
Securit
y Big
Data
Mobility Clou
d
Public
Services
Employee Empowerment
Public Value (IT-enabled business
innovation)
Citizen Experience Workforce
Engagement
Four Key Drivers
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 12
Collaboration Frameworks and Operation Centres Driven by the need to share information in real-time
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13
Document libraries store
reference materials and
are fully audited/ logged
Presence identifies
members who are online
and enables instant
communication via open
standards
Secure chat enables
rapid communication to
all parties in the app
Collaboration over a map
identify events, threats
and emergencies.
Overlays enable
simplification of
information displayed
on the map
Records monitoring
tracks events in
real-time
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14
Information Management
NSW
Police
SA Police
WA
Police
NT Police
Tas
Police
AFP
Security
Audit Trails
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15
Hybrid Cloud Model
Service Level Agreements (SLAs) Availability, Security, Performance, Compliance, Cost
Build & operate Consume
Public Cloud
Private Cloud
Community
Cloud
Traditional IT
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17
Improving safety at the London Olympics
Social media into insight
• Process 2.3 million tweets/day
• Ingest feeds from 22 sources, including
news feeds and blogs
• Identified a connection between two
intelligence targets that had not been
previously known
• Ensured appropriate response to highly-
sensitive community events
HP Autonomy
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 18
The fourth stage reach
t
The Internet
Connectivity
The Web
Information & e-commerce
The Cloud
Services
The
Sensors Sensations
1970 1960 1980 2000 1990 2010 2005 2015 2020
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19
Generation 2 light bars with ANPR cameras mounted on police cars
Mobile Surveillance and Video Analytics
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20
Fixed Camera Surveillance Intersection Infringement Analysis
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21
Where will sensors appear? Everywhere.
Wildlife tracking
Airframe integrity Passenger comfort
Infrastructure health
Home automation Home security
Geo physical mapping
Merchandise tracking
Tsunami warning
Real-time traffic conditions
Security/Access
Climate monitoring Water / Gas
Wearable Technology
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 22
Exponential Growth in Sensors
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23
Successive stages of transmission, consolidation and transformation of data
Connected into a Cloud Ecosystem
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 24
Convergence for Analysis
Big Data
in the Cloud Big Data Police?
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 25
Cloud threats (Source: CSA and ENISA)
Risk Assessment
Supply chain
failure Cloud provider
malicious insider
Imp
act
Likelihood
High
Low High
Lock-in
Isolation
failure
Loss of business
reputation
Cloud service
termination
Interception
data in transit
Cloud provider
acquisition
Compliance
challenges
Loss of
governance
Resource
exhaustion
Management
interface compromise
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 26
Governance, Risk and Compliance
Management RS-08: Power / Telecommunications
Governance
Complianc
e
Risk management Confidentiality
Integrity
Availability
Threats
Impacts
Vulnerabilities
Audit Reporting
Monitoring
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 27
Integrated GRC Model
Web &
application
security
Data
protection
Data center
security
Intelligence &
operations
Mobility and
devices
Identity and
access
Cloud security
Information
governance
STAR
T
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 28
The Converged Cloud
Converged
Cloud
Public Cloud
Private Cloud
Managed Cloud
Traditional
Choice • Open
• Heterogeneous
• Extensible
Consistenc
y • Common architecture
• Portability
• Consumption
experience
Confidence • Enterprise SLAs
• Security and
management
• Automation
Management, Infrastructure &
Security integration
Bursting & Hybrid Design
Cloud Controller
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 29
Maturity model to fine tune cloud computing GRC
Maturity
stages
Stage 1: allocated budget
(Project activities)
Stage 2: Consolidated (Negotiated activities)
Stage 3: Service enabled
(Optimised activities)
Stage 4: Hybrid delivery
(Shared activities)
Stage 5: Value-based pricing
(Performance activities)
Key
words Siloes & projects Standardised & consolidated Shared & virtualised Strategic & tactical Commercial & accountable
Key Indicators
Go
ve
rna
nc
e
Undefined cloud
computing security
policies
Ambiguous cloud security
roles and responsibilities
Defined cloud computing
security polices
Defined cloud security roles
and responsibilities
Defined cloud security
programme
Implemented virtualised
environment security
policies
Trained VM Administrator
in virtualised security
Enforced cloud
computing security
policies
Implemented role-based
security performance
metrics
Extended security policies
across SPI providers
Published SPI provider
security requirements
Ris
k m
gt.
Unknown cloud
computing threats
Unknown cloud
computing risk profile
Adopted CSA and ENISA
cloud computing threat
inventory
Defined and performed cloud
computing risk assessment
process
Completed virtualised
environment risk
assessment
Treated virtualised
environment risks
Defined cloud computing
key risk indicators
Integrated risk
management across
cloud computing
environment
Performed risk assessments
across SPI providers
Defined SPI provider risk
treatment plans
Co
mp
lia
nc
e
Unknown cloud
computing compliance
requirements
Unknown data privacy
impacts
Known cloud computing
compliance requirements
Known data privacy impacts
Validated virtualised
environment compliance
Tested virtualised
environment security
controls
Implemented cloud
security compliance
control metrics
Reported standards and
regulatory compliance
Monitored cloud computing
compliance
Reported SPI provider
compliance
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 30
The fifth stage reach
1980 1970 1990 2010 2000 t
2020
The Internet
Connectivity
The Web
Information & e-commerce
The Cloud
Services
The Sensor
Sensations
The Actor
Actuations
2030 1960
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 31
Early Examples
SYDNEY — Australian police on Monday said
they had arrested a man after a drone allegedly
carrying drugs was seen “hovering in the vicinity
of a prison.”
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank You