SlideShare a Scribd company logo
1 of 25
From Brainstorm
to Build
How leading law firm, MinterEllison,
built a highly secure client data
platform in AWS
‘We help aspiring
businesses, and their
people, win by using the
Cloud brilliantly’
Our Purpose
One of the Asia Pacific's leading law firms.
Operates with around 2000 staff in Australia, Hong Kong, mainland China, Mongolia, New
Zealand and the United Kingdom
$42 Bill Market Cap
50,000 Instances running in AWS
7 Billion Hours of Video per Quarter
$11 Billion Valuation
Migrated to AWS when only 12 staff
400 Terabytes of Data in AWS
Raised $1.5 Billion Funding round
Migrated to AWS in 2009
Serviced 25 million Guests Globally
‘In the future the ability to
screen, analyse and interpret
unprecedented volumes of data
will become just as critical to law
firms’ success as the ‘art’ of
delivering legal advice is now’
Technology is changing Law
Agile
Platform
Data
Growth
Platform that must support the changing needs of the Industry and Firm.
Amazon Web Services provides this platform.
Recognition of the need to Transform
Need for immediate secure storage of client data for processing. This is
required on-demand with little notice.
Increase in Industry-wide volume of data
Business
Analytics
Access to a platform that will support current and emerging trends in the
Legal Industry, increasing speed whilst lowering processing costs.
Trends in Analytics, Big Data and Machine Learning
From Brainstorm to Build
How leading law firm, MinterEllison, built a highly secure
client data platform in AWS – Data Solutions Group
––
Gary Adler, Chief Information Officer
Paul Harmat, Enterprise Architect
––
April 2017
How to overcome
barriers & obstacles
9
How to overcome barriers & obstacles
10
Step
3
Step
4
Step
5
Step
1
Step
2
WHY HOW EXECUTION WHAT’S NEXT
Cloud is ambiguous:
 Define its meaning very specifically for your organisation
 Remove the noise, focus on the ‘actual’ not the ‘anecdotal’
11
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
4
Step
5
Step
1
Step
2
Step
2
Work out real
risks versus
perceived risks
Perceived
 It’s unsecure
 Clients may leave you
 Performance, reliability issues
 Its an alternative option
Real
 Data sovereignty /
jurisdictional issues
 Data retrieval
 Security layer
 Client engagement letters
 Initial complexity
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
4
Step
5
Step
1
Construct
mitigations
for real risks
13
Mitigation
1. Ensure contractually, private data is not
permitted to leave Australia
2. Understand process before committing
3. Data fully encrypted end-to-end & hold keys
4. Review approach with GC & Tech Lawyers
5. Use of expert integrators, actively upskill IT
staff
Risk
1. Data sovereignty /
jurisdictional issues
2. Data retrieval
3. Security layer
4. Engagement letters
5. Initial complexity
WHY HOW EXECUTION WHAT’S NEXT
Step
2
Step
4
Step
5
Step
1
Step
3
Step
4
Step
3
1. GC/CRO – risk, liability
2. Executive – clients/customers, revenue, strategy
impact
3. IT – major paradigm shift especially for
infrastructure team
4. The other 200 bosses – what does it all mean?
14
Work out key
stakeholders and
their individual
interests
WHY HOW EXECUTION WHAT’S NEXT
Step
2
Step
5
Step
1
15
Start small
 It is indeed a very complex space – don’t go it alone!
 Find a safe and containerised first use case with both client and
business benefits (but keep an eye on the broader strategy to
avoid long term silos)
 Patience, commitment and acceptance of failure along the way
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
2
Step
4
Step
1
Step
5
Step
4
What did we
execute?
16
MinterEllison Client Data: Problem and Challenges
Challenges
 On-premise infrastructure capacity
 Expense to support peak compute and storage
 Data back-up and protection requirements
 Operational isolation of state-based eDiscovery teams
 Risk, process and compliance
 3rd parties, matter life cycle and archiving
 Operational impact
 Legality and security in terms of technology and client protection
WHY HOW EXECUTION WHAT’S NEXT
Problem statement
Continued growth
of client data in legal
dispute resolution
places increasing
pressure on the ability
for IT to support the
eDiscovery team
Overview of solution
 Deployment of a secure and segregated AWS
infrastructure foundational layer
 Elasticity of storage and compute to resolve on premise
constraints
 Resiliency of backup and recovery of large amounts of
critical client data
 Deployment of security layers to protect and mitigate risk
for the organisation
 Citrix desktop and application virtualisation
 Operationally close to data
 Simplification of AWS complexity for end users through a
custom data transfer application
Deployed AWS Resources
WHY HOW EXECUTION WHAT’S NEXT
Integration with forensics suppliers and legal 3rd parties
SOLUTION
Execution through VPC peering, KMS
and S3 buckets for data sharing
 Utilise AWS native infrastructure and benefits
across AWS accounts with 3rd parties
 Encrypted and secured at rest and in transit
 Time reduced from days to minutes leveraging
AWS’ high speed network
 Remove the reliance on physical media
 No data double-handling
 Citrix ShareFile for ad-hoc sharing
 Deepen relationships with 3rd party vendors in
our AWS cloud journey
WHY HOW EXECUTION WHAT’S NEXT
Dedicated AWS Data Transfer Application Part 1 of 2
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
A custom AWS Data Transfer
Application that empowers our
eDiscovery teams
 Enables end users to operate AWS CLI
commands through a GUI to share data
 Operational unification of MinterEllison state-
based eDiscovery teams
 Encapsulates the encryption/decryption
of client data to 3rd party vendors
 Leverages the high capacity AWS network
 Alleviates eDiscovery team’s administrative
overhead in management of data
Dedicated AWS Data Transfer Application Part 2 of 2
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
The custom AWS Data Transfer
Application under the hood
 Web Application deployed on an
EC2 CentOS 7 instance
 Utilisation of python (boto3) API calls
to S3Transfer.Upload and
S3Transfer.Download
 Application interfacing across AWS EC2,
S3, SES, KMS and DynamoDB
Security in the Public Cloud
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
Blending AWS Security best practices
with MinterEllison’s requirements and
security policies
 Security through an AWS
infrastructure foundation
 A security design that is scalable,
auditable and has levels of redundancy
 Network Security
 Auditing
 Roles
What’s next?
23
The Journey Ahead
24
Strap yourself in for a long ride – 3 year transition
Internal
Test and development
environments
On prem to SaaS
Exchange, enterprise
collaboration tools
On prem to IaaS
Enterprise content
management systems,
Practice management systems
WHY HOW EXECUTION WHAT’S NEXT
Thank-you and
Questions…
Thank you!

More Related Content

What's hot

Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?RapidScale
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseRapidScale
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?HTS Hosting
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop VirtualizationTop Use Cases for Desktop Virtualization
Top Use Cases for Desktop VirtualizationCitrix
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 

What's hot (18)

4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the Enterprise
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud security
Cloud security Cloud security
Cloud security
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop VirtualizationTop Use Cases for Desktop Virtualization
Top Use Cases for Desktop Virtualization
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 

Similar to From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions

Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Managementgbroadbent67
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Vaultastic
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101Mithun T. Dhar
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud TodayGovCloud Network
 
The Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWSThe Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWSAmazon Web Services
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)Vincent Kwon
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Similar to From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions (20)

Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Future Commerce 2019
Future Commerce 2019 Future Commerce 2019
Future Commerce 2019
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud Today
 
The Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWSThe Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWS
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
B1802041217
B1802041217B1802041217
B1802041217
 
Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions

  • 1. From Brainstorm to Build How leading law firm, MinterEllison, built a highly secure client data platform in AWS
  • 2. ‘We help aspiring businesses, and their people, win by using the Cloud brilliantly’ Our Purpose
  • 3. One of the Asia Pacific's leading law firms. Operates with around 2000 staff in Australia, Hong Kong, mainland China, Mongolia, New Zealand and the United Kingdom
  • 4. $42 Bill Market Cap 50,000 Instances running in AWS 7 Billion Hours of Video per Quarter $11 Billion Valuation Migrated to AWS when only 12 staff 400 Terabytes of Data in AWS Raised $1.5 Billion Funding round Migrated to AWS in 2009 Serviced 25 million Guests Globally
  • 5. ‘In the future the ability to screen, analyse and interpret unprecedented volumes of data will become just as critical to law firms’ success as the ‘art’ of delivering legal advice is now’ Technology is changing Law
  • 6. Agile Platform Data Growth Platform that must support the changing needs of the Industry and Firm. Amazon Web Services provides this platform. Recognition of the need to Transform Need for immediate secure storage of client data for processing. This is required on-demand with little notice. Increase in Industry-wide volume of data Business Analytics Access to a platform that will support current and emerging trends in the Legal Industry, increasing speed whilst lowering processing costs. Trends in Analytics, Big Data and Machine Learning
  • 7. From Brainstorm to Build How leading law firm, MinterEllison, built a highly secure client data platform in AWS – Data Solutions Group –– Gary Adler, Chief Information Officer Paul Harmat, Enterprise Architect –– April 2017
  • 8. How to overcome barriers & obstacles 9
  • 9. How to overcome barriers & obstacles 10 Step 3 Step 4 Step 5 Step 1 Step 2 WHY HOW EXECUTION WHAT’S NEXT
  • 10. Cloud is ambiguous:  Define its meaning very specifically for your organisation  Remove the noise, focus on the ‘actual’ not the ‘anecdotal’ 11 WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 4 Step 5 Step 1 Step 2
  • 11. Step 2 Work out real risks versus perceived risks Perceived  It’s unsecure  Clients may leave you  Performance, reliability issues  Its an alternative option Real  Data sovereignty / jurisdictional issues  Data retrieval  Security layer  Client engagement letters  Initial complexity WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 4 Step 5 Step 1
  • 12. Construct mitigations for real risks 13 Mitigation 1. Ensure contractually, private data is not permitted to leave Australia 2. Understand process before committing 3. Data fully encrypted end-to-end & hold keys 4. Review approach with GC & Tech Lawyers 5. Use of expert integrators, actively upskill IT staff Risk 1. Data sovereignty / jurisdictional issues 2. Data retrieval 3. Security layer 4. Engagement letters 5. Initial complexity WHY HOW EXECUTION WHAT’S NEXT Step 2 Step 4 Step 5 Step 1 Step 3
  • 13. Step 4 Step 3 1. GC/CRO – risk, liability 2. Executive – clients/customers, revenue, strategy impact 3. IT – major paradigm shift especially for infrastructure team 4. The other 200 bosses – what does it all mean? 14 Work out key stakeholders and their individual interests WHY HOW EXECUTION WHAT’S NEXT Step 2 Step 5 Step 1
  • 14. 15 Start small  It is indeed a very complex space – don’t go it alone!  Find a safe and containerised first use case with both client and business benefits (but keep an eye on the broader strategy to avoid long term silos)  Patience, commitment and acceptance of failure along the way WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 2 Step 4 Step 1 Step 5 Step 4
  • 16. MinterEllison Client Data: Problem and Challenges Challenges  On-premise infrastructure capacity  Expense to support peak compute and storage  Data back-up and protection requirements  Operational isolation of state-based eDiscovery teams  Risk, process and compliance  3rd parties, matter life cycle and archiving  Operational impact  Legality and security in terms of technology and client protection WHY HOW EXECUTION WHAT’S NEXT Problem statement Continued growth of client data in legal dispute resolution places increasing pressure on the ability for IT to support the eDiscovery team
  • 17. Overview of solution  Deployment of a secure and segregated AWS infrastructure foundational layer  Elasticity of storage and compute to resolve on premise constraints  Resiliency of backup and recovery of large amounts of critical client data  Deployment of security layers to protect and mitigate risk for the organisation  Citrix desktop and application virtualisation  Operationally close to data  Simplification of AWS complexity for end users through a custom data transfer application Deployed AWS Resources WHY HOW EXECUTION WHAT’S NEXT
  • 18. Integration with forensics suppliers and legal 3rd parties SOLUTION Execution through VPC peering, KMS and S3 buckets for data sharing  Utilise AWS native infrastructure and benefits across AWS accounts with 3rd parties  Encrypted and secured at rest and in transit  Time reduced from days to minutes leveraging AWS’ high speed network  Remove the reliance on physical media  No data double-handling  Citrix ShareFile for ad-hoc sharing  Deepen relationships with 3rd party vendors in our AWS cloud journey WHY HOW EXECUTION WHAT’S NEXT
  • 19. Dedicated AWS Data Transfer Application Part 1 of 2 WHY HOW EXECUTION WHAT’S NEXT SOLUTION A custom AWS Data Transfer Application that empowers our eDiscovery teams  Enables end users to operate AWS CLI commands through a GUI to share data  Operational unification of MinterEllison state- based eDiscovery teams  Encapsulates the encryption/decryption of client data to 3rd party vendors  Leverages the high capacity AWS network  Alleviates eDiscovery team’s administrative overhead in management of data
  • 20. Dedicated AWS Data Transfer Application Part 2 of 2 WHY HOW EXECUTION WHAT’S NEXT SOLUTION The custom AWS Data Transfer Application under the hood  Web Application deployed on an EC2 CentOS 7 instance  Utilisation of python (boto3) API calls to S3Transfer.Upload and S3Transfer.Download  Application interfacing across AWS EC2, S3, SES, KMS and DynamoDB
  • 21. Security in the Public Cloud WHY HOW EXECUTION WHAT’S NEXT SOLUTION Blending AWS Security best practices with MinterEllison’s requirements and security policies  Security through an AWS infrastructure foundation  A security design that is scalable, auditable and has levels of redundancy  Network Security  Auditing  Roles
  • 23. The Journey Ahead 24 Strap yourself in for a long ride – 3 year transition Internal Test and development environments On prem to SaaS Exchange, enterprise collaboration tools On prem to IaaS Enterprise content management systems, Practice management systems WHY HOW EXECUTION WHAT’S NEXT