Slides from the webinar I co-presented for FierceContentManagement. Are you ready for enterprise mobile opportunities? Technology-wise? Skills-wise? Satisfying the work needs to be done AND can be done well with mobile? Time to find out!
Period, at all, not by anyone or any organization. I can put you in touch with penetration testing teams I know if you don’t believe me. But you won’t sleep for weeks.Don’t believe Oracle’s “100% Secure” or whatever their ridiculous marketing claim was. It’s not possible.
Stop thinking “no risk” and create guard rails that keep your car on the road. Stuff happens, it’s how you react that’s more important than trying to prevent all bad things.There are always going to be people who accidentally or on purpose go beyond “expected behavior” – but trying to be “ultra-vigilent” is a serious mistake. It’s almost never worth it.You can’t afford “perfect security” and even if you could, it’s not possible. So instead of thinking “protect against all harm” – think “safely enable” – it opens up a much wider realm of opportunity.
Major moment for me as a security guy…Can’t protect against all threats. Completely impossible.We our are own worst enemies. I was in charge of security configurations and audits….Accidentally killed off all email EXCEPT spam for about 30 minutes. Not a good day in my career.Problem is… I thought I was going above and beyond to ultra-protective of the company. But one tiny misconfiguration completely reversed the expected risk profile… and that’s just a simple example of a major security hole that came about WITHOUT being attacked. Pure human misconfiguration of a truly terrible user interface. Checkpoint firewall, for those who are wondering.
There are no absolutes in security – but calculating risk and addressing various risk levels happens about as often as ROI calculations are done in enterprises, for the same reasons.We are terrible at calculating risks, we are predictably irrational in the way we make decisions, justify decisions after the fact, and prepare for future potential decisions.Both of these books are fantastic – as they show that are understanding of how decisions are made, how people think they’ll react and how they actually do, are not as “obvious” as we might think.Even professional risk takers “fail” quite often – that’s the point of risk – you calculate it and acknowledge that sometimes you’ll be wrong, but work to minimize the downside while maximizing the upside.
So, against my initial inclination for this webinar - I just can’t bring myself to make a massive deal out of mobile security and/or cloud concerns. They are just extensions and in many ways, a return to very old computing models.So let’s focus on whether you’re even ready to take advantage of what is, in my opinion, a massive opportunity to right some wrongs that have hampered us for far too long…
When’s the last time you loved any devices you have to use at work?Probably never.This is REALLY big folks.More people forget their spouses and children more often than they will forget their phone.And according to FMRi (functional magnetic resonance imaging) studies, we show signs of not just being addicted to mobile devices, but effectively “loving” our phones very literally. Exact same measurable response.Is that creepy? Exciting? Not sure – probably both – but this is a major moment for computers – away from the dry labs of mainframes and into devices in our pockets that have “lickable” user interfaces as the model.So… we love our phones, but is your enterprise ready for this?
We have all of this potential power right in our hands – let’s go for it!
Cap Gemini/MIT survey of 157 executives $1 billion+ revenue companies: The three top reasons why companies are finding it hard to implement tools like analytics, mobile technology, and social media for business are: missing skills (77%), cultural issues (55%), and ineffective IT (50%). It is clear that changing people’s work habits represent the biggest impediment to technology change.
So why is that? Seems like mobile devices are everywhere, right? And at this point, that they’ve been available forever…But what were the sales levels of the iPad just 3 years ago?
You already have pirates breaking the rules to get things done in your organization…Call it Consumerization of IT or CoIT – The outside world and normal pace of tech change at most companies is far behind the pace of change of the world at large.Bring your tribe of pirates together to HELP you, rather than end-run around you.
All of the biggest, clunkiest costs for the infrastructure of companies (computers, wiring systems, offices, buildings, etc.) are being eliminated – to not take advantage of the massive revolution of mobile + cloud is very close to fiscally irresponsible, in my viewBe ready to map out both the risks AND the opportunities available via mobile, cloud, etc.
If you over-focus on security, you miss out on all sorts of other ways to innovate in your business – that far outweigh security concerns.
YOUR SYSTEMS ARE… ANCIENT
AND DECREPIT 3-‐10 YEARS OLD, USUALLY PROPRIETARY (FOCUSED ON A SINGLE ENVIRONMENT), STATIC RATHER THAN DYNAMIC, WINDOWS ONLY, ONE BROWSER ONLY, FULL OF “DUMB TERMINAL” TO ACCESS REALLY OLD SYSTEMS…
3 BIG GAPS: 77%
MISSING SKILLS, 55% CULTURAL ISSUES, 50% INEFFECTIVE IT Source: MIT/Cap Gemini
YOU CAN’T AFFORD NOT TO
EMBRACE MOBILE (+ CLOUD) VERY CLOSE TO FISCALLY IRRESPONSIBLE NOT TO CONSIDER THIS OPPORTUNITY
CONSIDER MORE THAN SECURITY
“UNITED SAID THAT PILOTS TYPICALLY CARRY 12,000 SHEETS OF PAPER TO CHART THEIR COURSE DURING FLIGHTS; THE INTRODUCTION OF THE IPAD SHOULD SAVE THE AIRLINE 16 MILLION SHEETS OF PAPER AND, THANKS TO THE REDUCTION IN WEIGHT, 326,000 GALLONS OF JET FUEL PER YEAR.” Source: http://www.pcworldme.net/2011/08/23/united-airlines-cockpits-go-paperless-with-ipads/
BYOD • A survey
covering 17 countries by business technology company Avanade found that 88% of execu;ves said employees were using their own personal compu;ng technologies for business purposes. • Absolute SoOware found that 64% of IT managers surveyed thought it was too risky to let personal devices be integrated into the business network. However 52% of companies allowed some form of access. • Another survey by Cisco found that although 48% said their company would never authorize employees to bring their own devices, 57% agreed that some employees use personal devices without consent. Source: MIT/Cap Gemini