SlideShare a Scribd company logo
1 of 15
Business Case for upgrading ICT 
Data Security System of KD 
Insurance PLC to Accommodate 
Cloud Computing 
By 
Keerthi Delwatta: Chief Information 
Officer. 
9/17/2014 1
Agenda 
What is Cloud Computing 
Advantages and Disadvantages 
Business Proposal 
Financial Analysis 
Conclusion 
List of References 
9/17/2014 2
Purpose of Presentation 
To enlighten CEO, Board and Executives on Cloud 
Computing to upgrade the ICT Data Security System 
of the company to protect client’s and firm’s data. 
9/17/2014 3
Cloud Computing in Insurance 
Industry 
How the Cloud is utilized : 
Data is stored in the off site virtual server owned by 
a service provider on the basis of actual usage. 
Associated Risk: 
Loss of control over software application. 
Over Dependence on service provider for 
Maintenance, Upgrading and Management. 
Experiences of other Companies: 
Very positive and Encouraging. 
9/17/2014 4
Cloud Computing in Insurance Industry 
Advantages : 
Economies of scale 
Scalable Processing & Application 
Minimum Capital Investment 
Speedy Implementation 
Higher Productivity 
Disadvantages: 
Extreme Dependence on the Service Provider 
Loss of control over software application 
Compromise confidentiality & Privacy 
9/17/2014 5
Cloud Computing in Insurance 
Industry 
 Scope of Recommendation: 
Upgrading ICT Data security system to protect Client’s 
and Firm’s own data. 
To synchronize and ensure integrity of data on servers 
and end user devices. 
 Infrastructure Requirements: 
Cloud specific software applications 
Improved Communication Network Facilities 
9/17/2014 6
Financial Feasibility 
• Base Case Analysis: 
7 
Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. 
year 0 1 2 3 4 5 6 
Relevant benefits (millions) 
Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 
Improved productivity $0 $25 $30 $40 $60 $75 $80 
Reduced insurance $0 $20 $20 $30 $40 $50 $60 
Total improvements (A) $0 $70 $80 $100 $135 $165 $185 
Relevant costs 
policy development and maintenance $0 $40 $45 $55 $55 $60 $70 
software acquisition $40 $10 $10 $10 $10 $10 $10 
support team $25 $10 $10 $10 $10 $10 $10 
incremental maintenance $0 $0 $10 $10 $10 $10 $10 
training $10 $5 $0 $0 $0 $0 $0 
Total costs (B) $75 $65 $75 $85 $85 $90 $100 
Net cash flow -$75 $5 $5 $15 $50 $75 $85 
9/17/2014
Financial Feasibility 
8 
Pay back Period 04 Years 
$ 73million 
28.4 %d 
NPV @ 10% 
IRR 
Profitability Index 1.98d 
9/17/2014
Sensitivity Analysis 
Criteria: Policy Development & Maintenance Cost: 
Recommendation: 
 Policy Development & Maintenance Cost is highly sensitive to Net Present value 
and hence should be properly controlled. 
9 
100% 
Policy 
Development & 
Maintenance 
Cost 
314% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Incremental maintenance cost 
Recommendation: 
 Maintenance cost is relatively sensitive to Net Present value and hence should be 
controlled. 
10 
100% 
Maintenance 
cost 
47% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Productivity 
Recommendation: 
 Productivity is highly sensitive to Net Present value and hence should be properly 
monitored to ensure desired results. 
11 
100% 
Productivity 
288% 
Net Present 
Value 
9/17/2014
Conclusion 
• Cloud Computing is highly advantageous to the 
company as it enhance the productivity , increase 
efficiency of the ICT Data Security system while 
minimizing the cost and hence I seek your 
authorization and financial support for immediate 
implementation of the project. 
9/17/2014 12
Lessons learnt from Conducting the 
Research 
The risk mitigation strategy of adopting a Private 
Virtual Infrastructure(PVI) Model to share 
responsibility for Security of Cloud Computing between 
information owner and service provider has been 
evolved which is encouraging. 
9/17/2014 13
Lessons learnt from Conducting the 
Research 
Trusted Virtual Machines Identification Technique has 
been evolved to ensure proper management of virtual 
machines in the data center that encourage cloud 
computing. 
9/17/2014 14
List of References 
1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, 
Thirteenth Edition, Pearson, England. 
2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy 
of Management Executives, Vol. 13 No. 4, pp. 50 -62 
3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, 
Gartner, inc., Stemford, Ct, 2008. 
4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of 
Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 
5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: 
Research Problems in Data Center Networks”, ACM SIGCOMM Computer 
Communications Review. 
6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud 
Computing SLAs”, Proc. GRID conference, pp. 129–136. 
7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and 
Capacity Planning”, Proc. Computer Measurement Group conference 
8. http://www.ibm.com/developerworks/cloud/about.html 
9/17/2014 15

More Related Content

Viewers also liked (6)

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 

Similar to Business case for upgrading ict data security system by keerthi delwatta u1054630

10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
Peak 10
 

Similar to Business case for upgrading ict data security system by keerthi delwatta u1054630 (20)

Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Why group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudWhy group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloud
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloud
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Innovation in maintenance - Accenture
Innovation in maintenance - AccentureInnovation in maintenance - Accenture
Innovation in maintenance - Accenture
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
DoD Cloud Computing Strategy
DoD Cloud Computing StrategyDoD Cloud Computing Strategy
DoD Cloud Computing Strategy
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterDOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Business case for upgrading ict data security system by keerthi delwatta u1054630

  • 1. Business Case for upgrading ICT Data Security System of KD Insurance PLC to Accommodate Cloud Computing By Keerthi Delwatta: Chief Information Officer. 9/17/2014 1
  • 2. Agenda What is Cloud Computing Advantages and Disadvantages Business Proposal Financial Analysis Conclusion List of References 9/17/2014 2
  • 3. Purpose of Presentation To enlighten CEO, Board and Executives on Cloud Computing to upgrade the ICT Data Security System of the company to protect client’s and firm’s data. 9/17/2014 3
  • 4. Cloud Computing in Insurance Industry How the Cloud is utilized : Data is stored in the off site virtual server owned by a service provider on the basis of actual usage. Associated Risk: Loss of control over software application. Over Dependence on service provider for Maintenance, Upgrading and Management. Experiences of other Companies: Very positive and Encouraging. 9/17/2014 4
  • 5. Cloud Computing in Insurance Industry Advantages : Economies of scale Scalable Processing & Application Minimum Capital Investment Speedy Implementation Higher Productivity Disadvantages: Extreme Dependence on the Service Provider Loss of control over software application Compromise confidentiality & Privacy 9/17/2014 5
  • 6. Cloud Computing in Insurance Industry  Scope of Recommendation: Upgrading ICT Data security system to protect Client’s and Firm’s own data. To synchronize and ensure integrity of data on servers and end user devices.  Infrastructure Requirements: Cloud specific software applications Improved Communication Network Facilities 9/17/2014 6
  • 7. Financial Feasibility • Base Case Analysis: 7 Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. year 0 1 2 3 4 5 6 Relevant benefits (millions) Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 Improved productivity $0 $25 $30 $40 $60 $75 $80 Reduced insurance $0 $20 $20 $30 $40 $50 $60 Total improvements (A) $0 $70 $80 $100 $135 $165 $185 Relevant costs policy development and maintenance $0 $40 $45 $55 $55 $60 $70 software acquisition $40 $10 $10 $10 $10 $10 $10 support team $25 $10 $10 $10 $10 $10 $10 incremental maintenance $0 $0 $10 $10 $10 $10 $10 training $10 $5 $0 $0 $0 $0 $0 Total costs (B) $75 $65 $75 $85 $85 $90 $100 Net cash flow -$75 $5 $5 $15 $50 $75 $85 9/17/2014
  • 8. Financial Feasibility 8 Pay back Period 04 Years $ 73million 28.4 %d NPV @ 10% IRR Profitability Index 1.98d 9/17/2014
  • 9. Sensitivity Analysis Criteria: Policy Development & Maintenance Cost: Recommendation:  Policy Development & Maintenance Cost is highly sensitive to Net Present value and hence should be properly controlled. 9 100% Policy Development & Maintenance Cost 314% Net Present Value 9/17/2014
  • 10. Sensitivity Analysis Criteria: Incremental maintenance cost Recommendation:  Maintenance cost is relatively sensitive to Net Present value and hence should be controlled. 10 100% Maintenance cost 47% Net Present Value 9/17/2014
  • 11. Sensitivity Analysis Criteria: Productivity Recommendation:  Productivity is highly sensitive to Net Present value and hence should be properly monitored to ensure desired results. 11 100% Productivity 288% Net Present Value 9/17/2014
  • 12. Conclusion • Cloud Computing is highly advantageous to the company as it enhance the productivity , increase efficiency of the ICT Data Security system while minimizing the cost and hence I seek your authorization and financial support for immediate implementation of the project. 9/17/2014 12
  • 13. Lessons learnt from Conducting the Research The risk mitigation strategy of adopting a Private Virtual Infrastructure(PVI) Model to share responsibility for Security of Cloud Computing between information owner and service provider has been evolved which is encouraging. 9/17/2014 13
  • 14. Lessons learnt from Conducting the Research Trusted Virtual Machines Identification Technique has been evolved to ensure proper management of virtual machines in the data center that encourage cloud computing. 9/17/2014 14
  • 15. List of References 1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, Thirteenth Edition, Pearson, England. 2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy of Management Executives, Vol. 13 No. 4, pp. 50 -62 3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, Gartner, inc., Stemford, Ct, 2008. 4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: Research Problems in Data Center Networks”, ACM SIGCOMM Computer Communications Review. 6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud Computing SLAs”, Proc. GRID conference, pp. 129–136. 7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and Capacity Planning”, Proc. Computer Measurement Group conference 8. http://www.ibm.com/developerworks/cloud/about.html 9/17/2014 15