SlideShare a Scribd company logo
1 of 15
Business Case for upgrading ICT 
Data Security System of KD 
Insurance PLC to Accommodate 
Cloud Computing 
By 
Keerthi Delwatta: Chief Information 
Officer. 
9/17/2014 1
Agenda 
What is Cloud Computing 
Advantages and Disadvantages 
Business Proposal 
Financial Analysis 
Conclusion 
List of References 
9/17/2014 2
Purpose of Presentation 
To enlighten CEO, Board and Executives on Cloud 
Computing to upgrade the ICT Data Security System 
of the company to protect client’s and firm’s data. 
9/17/2014 3
Cloud Computing in Insurance 
Industry 
How the Cloud is utilized : 
Data is stored in the off site virtual server owned by 
a service provider on the basis of actual usage. 
Associated Risk: 
Loss of control over software application. 
Over Dependence on service provider for 
Maintenance, Upgrading and Management. 
Experiences of other Companies: 
Very positive and Encouraging. 
9/17/2014 4
Cloud Computing in Insurance Industry 
Advantages : 
Economies of scale 
Scalable Processing & Application 
Minimum Capital Investment 
Speedy Implementation 
Higher Productivity 
Disadvantages: 
Extreme Dependence on the Service Provider 
Loss of control over software application 
Compromise confidentiality & Privacy 
9/17/2014 5
Cloud Computing in Insurance 
Industry 
 Scope of Recommendation: 
Upgrading ICT Data security system to protect Client’s 
and Firm’s own data. 
To synchronize and ensure integrity of data on servers 
and end user devices. 
 Infrastructure Requirements: 
Cloud specific software applications 
Improved Communication Network Facilities 
9/17/2014 6
Financial Feasibility 
• Base Case Analysis: 
7 
Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. 
year 0 1 2 3 4 5 6 
Relevant benefits (millions) 
Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 
Improved productivity $0 $25 $30 $40 $60 $75 $80 
Reduced insurance $0 $20 $20 $30 $40 $50 $60 
Total improvements (A) $0 $70 $80 $100 $135 $165 $185 
Relevant costs 
policy development and maintenance $0 $40 $45 $55 $55 $60 $70 
software acquisition $40 $10 $10 $10 $10 $10 $10 
support team $25 $10 $10 $10 $10 $10 $10 
incremental maintenance $0 $0 $10 $10 $10 $10 $10 
training $10 $5 $0 $0 $0 $0 $0 
Total costs (B) $75 $65 $75 $85 $85 $90 $100 
Net cash flow -$75 $5 $5 $15 $50 $75 $85 
9/17/2014
Financial Feasibility 
8 
Pay back Period 04 Years 
$ 73million 
28.4 %d 
NPV @ 10% 
IRR 
Profitability Index 1.98d 
9/17/2014
Sensitivity Analysis 
Criteria: Policy Development & Maintenance Cost: 
Recommendation: 
 Policy Development & Maintenance Cost is highly sensitive to Net Present value 
and hence should be properly controlled. 
9 
100% 
Policy 
Development & 
Maintenance 
Cost 
314% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Incremental maintenance cost 
Recommendation: 
 Maintenance cost is relatively sensitive to Net Present value and hence should be 
controlled. 
10 
100% 
Maintenance 
cost 
47% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Productivity 
Recommendation: 
 Productivity is highly sensitive to Net Present value and hence should be properly 
monitored to ensure desired results. 
11 
100% 
Productivity 
288% 
Net Present 
Value 
9/17/2014
Conclusion 
• Cloud Computing is highly advantageous to the 
company as it enhance the productivity , increase 
efficiency of the ICT Data Security system while 
minimizing the cost and hence I seek your 
authorization and financial support for immediate 
implementation of the project. 
9/17/2014 12
Lessons learnt from Conducting the 
Research 
The risk mitigation strategy of adopting a Private 
Virtual Infrastructure(PVI) Model to share 
responsibility for Security of Cloud Computing between 
information owner and service provider has been 
evolved which is encouraging. 
9/17/2014 13
Lessons learnt from Conducting the 
Research 
Trusted Virtual Machines Identification Technique has 
been evolved to ensure proper management of virtual 
machines in the data center that encourage cloud 
computing. 
9/17/2014 14
List of References 
1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, 
Thirteenth Edition, Pearson, England. 
2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy 
of Management Executives, Vol. 13 No. 4, pp. 50 -62 
3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, 
Gartner, inc., Stemford, Ct, 2008. 
4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of 
Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 
5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: 
Research Problems in Data Center Networks”, ACM SIGCOMM Computer 
Communications Review. 
6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud 
Computing SLAs”, Proc. GRID conference, pp. 129–136. 
7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and 
Capacity Planning”, Proc. Computer Measurement Group conference 
8. http://www.ibm.com/developerworks/cloud/about.html 
9/17/2014 15

More Related Content

Viewers also liked

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open DataSecuRing
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtDaniela Silva
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 

Viewers also liked (6)

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 

Similar to KD Insurance Upgrades ICT Data Security with Cloud Computing

Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathFadi Semaan
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesMcKinsey & Company
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
Why group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudWhy group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudMark D. Huzyak DMD
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloudmyhosting
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16Peak 10
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
DoD Cloud Computing Strategy
DoD Cloud Computing StrategyDoD Cloud Computing Strategy
DoD Cloud Computing StrategyGovCloud Network
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterDOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterGene Kim
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...innoforum09
 

Similar to KD Insurance Upgrades ICT Data Security with Cloud Computing (20)

Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Why group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudWhy group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloud
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloud
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Innovation in maintenance - Accenture
Innovation in maintenance - AccentureInnovation in maintenance - Accenture
Innovation in maintenance - Accenture
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
DoD Cloud Computing Strategy
DoD Cloud Computing StrategyDoD Cloud Computing Strategy
DoD Cloud Computing Strategy
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterDOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

KD Insurance Upgrades ICT Data Security with Cloud Computing

  • 1. Business Case for upgrading ICT Data Security System of KD Insurance PLC to Accommodate Cloud Computing By Keerthi Delwatta: Chief Information Officer. 9/17/2014 1
  • 2. Agenda What is Cloud Computing Advantages and Disadvantages Business Proposal Financial Analysis Conclusion List of References 9/17/2014 2
  • 3. Purpose of Presentation To enlighten CEO, Board and Executives on Cloud Computing to upgrade the ICT Data Security System of the company to protect client’s and firm’s data. 9/17/2014 3
  • 4. Cloud Computing in Insurance Industry How the Cloud is utilized : Data is stored in the off site virtual server owned by a service provider on the basis of actual usage. Associated Risk: Loss of control over software application. Over Dependence on service provider for Maintenance, Upgrading and Management. Experiences of other Companies: Very positive and Encouraging. 9/17/2014 4
  • 5. Cloud Computing in Insurance Industry Advantages : Economies of scale Scalable Processing & Application Minimum Capital Investment Speedy Implementation Higher Productivity Disadvantages: Extreme Dependence on the Service Provider Loss of control over software application Compromise confidentiality & Privacy 9/17/2014 5
  • 6. Cloud Computing in Insurance Industry  Scope of Recommendation: Upgrading ICT Data security system to protect Client’s and Firm’s own data. To synchronize and ensure integrity of data on servers and end user devices.  Infrastructure Requirements: Cloud specific software applications Improved Communication Network Facilities 9/17/2014 6
  • 7. Financial Feasibility • Base Case Analysis: 7 Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. year 0 1 2 3 4 5 6 Relevant benefits (millions) Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 Improved productivity $0 $25 $30 $40 $60 $75 $80 Reduced insurance $0 $20 $20 $30 $40 $50 $60 Total improvements (A) $0 $70 $80 $100 $135 $165 $185 Relevant costs policy development and maintenance $0 $40 $45 $55 $55 $60 $70 software acquisition $40 $10 $10 $10 $10 $10 $10 support team $25 $10 $10 $10 $10 $10 $10 incremental maintenance $0 $0 $10 $10 $10 $10 $10 training $10 $5 $0 $0 $0 $0 $0 Total costs (B) $75 $65 $75 $85 $85 $90 $100 Net cash flow -$75 $5 $5 $15 $50 $75 $85 9/17/2014
  • 8. Financial Feasibility 8 Pay back Period 04 Years $ 73million 28.4 %d NPV @ 10% IRR Profitability Index 1.98d 9/17/2014
  • 9. Sensitivity Analysis Criteria: Policy Development & Maintenance Cost: Recommendation:  Policy Development & Maintenance Cost is highly sensitive to Net Present value and hence should be properly controlled. 9 100% Policy Development & Maintenance Cost 314% Net Present Value 9/17/2014
  • 10. Sensitivity Analysis Criteria: Incremental maintenance cost Recommendation:  Maintenance cost is relatively sensitive to Net Present value and hence should be controlled. 10 100% Maintenance cost 47% Net Present Value 9/17/2014
  • 11. Sensitivity Analysis Criteria: Productivity Recommendation:  Productivity is highly sensitive to Net Present value and hence should be properly monitored to ensure desired results. 11 100% Productivity 288% Net Present Value 9/17/2014
  • 12. Conclusion • Cloud Computing is highly advantageous to the company as it enhance the productivity , increase efficiency of the ICT Data Security system while minimizing the cost and hence I seek your authorization and financial support for immediate implementation of the project. 9/17/2014 12
  • 13. Lessons learnt from Conducting the Research The risk mitigation strategy of adopting a Private Virtual Infrastructure(PVI) Model to share responsibility for Security of Cloud Computing between information owner and service provider has been evolved which is encouraging. 9/17/2014 13
  • 14. Lessons learnt from Conducting the Research Trusted Virtual Machines Identification Technique has been evolved to ensure proper management of virtual machines in the data center that encourage cloud computing. 9/17/2014 14
  • 15. List of References 1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, Thirteenth Edition, Pearson, England. 2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy of Management Executives, Vol. 13 No. 4, pp. 50 -62 3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, Gartner, inc., Stemford, Ct, 2008. 4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: Research Problems in Data Center Networks”, ACM SIGCOMM Computer Communications Review. 6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud Computing SLAs”, Proc. GRID conference, pp. 129–136. 7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and Capacity Planning”, Proc. Computer Measurement Group conference 8. http://www.ibm.com/developerworks/cloud/about.html 9/17/2014 15