david cooper

32
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cloud Evolution David Cooper Public Sector CTO , Asia Pacific & Japan Hewlett-Packard Enterprise Group

Post on 18-Oct-2014

420 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Cloud Evolution David Cooper

Public Sector CTO , Asia Pacific & Japan

Hewlett-Packard Enterprise Group

Page 2: David cooper

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

1950s

1960s

1970s

1980s

1990s

today

2000s

Page 3: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3

The first stage reach

1970 1960 1980 2000 1990 2010 t

2005 2020

The Internet

Connectivity

Page 4: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4

The second stage reach

1970 1960 1980 2000 1990 2010 t

2005 2020

The Web

Information &

e-commerce The Internet

Connectivity

Page 5: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5

Page 6: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6

Ecosystems now drive Consumption &

Expectations

Page 7: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. …we will be constantly connected.

2010 3.8 exabytes

2020 127 exabytes

Mobile traffic multiplies

Mobile traffic forecast in EB (exabytes)

(1EB = 1,000,000 terabytes)

Page 8: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 8

The third stage reach

1970 1960 1980 2000 1990 2010 t

2005 2020

The

Cloud

Services The Web

Information &

e-commerce The Internet

Connectivity

Page 9: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9

Hybrid Cloud Model

Service Level Agreements (SLAs) Availability, Security, Performance, Compliance, Cost

Build & operate Consume

Private Cloud

Community

Cloud

Public Cloud

Traditional IT

Page 10: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 10

Securit

y Big

Data

Mobility Clou

d

Public

Services

Employee Empowerment

Public Value (IT-enabled business

innovation)

Citizen Experience Workforce

Engagement

Four Key Drivers

Page 11: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11

Page 12: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 12

Collaboration Frameworks and Operation Centres Driven by the need to share information in real-time

Page 13: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13

Document libraries store

reference materials and

are fully audited/ logged

Presence identifies

members who are online

and enables instant

communication via open

standards

Secure chat enables

rapid communication to

all parties in the app

Collaboration over a map

identify events, threats

and emergencies.

Overlays enable

simplification of

information displayed

on the map

Records monitoring

tracks events in

real-time

Page 14: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14

Information Management

NSW

Police

SA Police

WA

Police

NT Police

Tas

Police

AFP

Security

Audit Trails

Page 15: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15

Hybrid Cloud Model

Service Level Agreements (SLAs) Availability, Security, Performance, Compliance, Cost

Build & operate Consume

Public Cloud

Private Cloud

Community

Cloud

Traditional IT

Page 16: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16

Page 17: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17

Improving safety at the London Olympics

Social media into insight

• Process 2.3 million tweets/day

• Ingest feeds from 22 sources, including

news feeds and blogs

• Identified a connection between two

intelligence targets that had not been

previously known

• Ensured appropriate response to highly-

sensitive community events

HP Autonomy

Page 18: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 18

The fourth stage reach

t

The Internet

Connectivity

The Web

Information & e-commerce

The Cloud

Services

The

Sensors Sensations

1970 1960 1980 2000 1990 2010 2005 2015 2020

Page 19: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19

Generation 2 light bars with ANPR cameras mounted on police cars

Mobile Surveillance and Video Analytics

Page 20: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20

Fixed Camera Surveillance Intersection Infringement Analysis

Page 21: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21

Where will sensors appear? Everywhere.

Wildlife tracking

Airframe integrity Passenger comfort

Infrastructure health

Home automation Home security

Geo physical mapping

Merchandise tracking

Tsunami warning

Real-time traffic conditions

Security/Access

Climate monitoring Water / Gas

Wearable Technology

Page 22: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 22

Exponential Growth in Sensors

Page 23: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23

Successive stages of transmission, consolidation and transformation of data

Connected into a Cloud Ecosystem

Page 24: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 24

Convergence for Analysis

Big Data

in the Cloud Big Data Police?

Page 25: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 25

Cloud threats (Source: CSA and ENISA)

Risk Assessment

Supply chain

failure Cloud provider

malicious insider

Imp

act

Likelihood

High

Low High

Lock-in

Isolation

failure

Loss of business

reputation

Cloud service

termination

Interception

data in transit

Cloud provider

acquisition

Compliance

challenges

Loss of

governance

Resource

exhaustion

Management

interface compromise

Page 26: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 26

Governance, Risk and Compliance

Management RS-08: Power / Telecommunications

Governance

Complianc

e

Risk management Confidentiality

Integrity

Availability

Threats

Impacts

Vulnerabilities

Audit Reporting

Monitoring

Page 27: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 27

Integrated GRC Model

Web &

application

security

Data

protection

Data center

security

Intelligence &

operations

Mobility and

devices

Identity and

access

Cloud security

Information

governance

STAR

T

Page 28: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 28

The Converged Cloud

Converged

Cloud

Public Cloud

Private Cloud

Managed Cloud

Traditional

Choice • Open

• Heterogeneous

• Extensible

Consistenc

y • Common architecture

• Portability

• Consumption

experience

Confidence • Enterprise SLAs

• Security and

management

• Automation

Management, Infrastructure &

Security integration

Bursting & Hybrid Design

Cloud Controller

Page 29: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 29

Maturity model to fine tune cloud computing GRC

Maturity

stages

Stage 1: allocated budget

(Project activities)

Stage 2: Consolidated (Negotiated activities)

Stage 3: Service enabled

(Optimised activities)

Stage 4: Hybrid delivery

(Shared activities)

Stage 5: Value-based pricing

(Performance activities)

Key

words Siloes & projects Standardised & consolidated Shared & virtualised Strategic & tactical Commercial & accountable

Key Indicators

Go

ve

rna

nc

e

Undefined cloud

computing security

policies

Ambiguous cloud security

roles and responsibilities

Defined cloud computing

security polices

Defined cloud security roles

and responsibilities

Defined cloud security

programme

Implemented virtualised

environment security

policies

Trained VM Administrator

in virtualised security

Enforced cloud

computing security

policies

Implemented role-based

security performance

metrics

Extended security policies

across SPI providers

Published SPI provider

security requirements

Ris

k m

gt.

Unknown cloud

computing threats

Unknown cloud

computing risk profile

Adopted CSA and ENISA

cloud computing threat

inventory

Defined and performed cloud

computing risk assessment

process

Completed virtualised

environment risk

assessment

Treated virtualised

environment risks

Defined cloud computing

key risk indicators

Integrated risk

management across

cloud computing

environment

Performed risk assessments

across SPI providers

Defined SPI provider risk

treatment plans

Co

mp

lia

nc

e

Unknown cloud

computing compliance

requirements

Unknown data privacy

impacts

Known cloud computing

compliance requirements

Known data privacy impacts

Validated virtualised

environment compliance

Tested virtualised

environment security

controls

Implemented cloud

security compliance

control metrics

Reported standards and

regulatory compliance

Monitored cloud computing

compliance

Reported SPI provider

compliance

Page 30: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 30

The fifth stage reach

1980 1970 1990 2010 2000 t

2020

The Internet

Connectivity

The Web

Information & e-commerce

The Cloud

Services

The Sensor

Sensations

The Actor

Actuations

2030 1960

Page 31: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 31

Early Examples

SYDNEY — Australian police on Monday said

they had arrested a man after a drone allegedly

carrying drugs was seen “hovering in the vicinity

of a prison.”

Page 32: David cooper

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank You