Magor TeleCollaboration is a leading visual collaboration solution that enables seamless integration of high definition video and advanced desktop sharing. It allows for instant access to information and people through a peer-to-peer network. Rather than just talking, it allows for collaborative working sessions from any office. Christie Digital implemented Magor globally to improve decision making, productivity, and relationships across 14 countries.
Context Awareness, MEAP - Mobile Enterprise Application Platform, Development platform plus distribution via Enterprise App Store and Enterprise App Kiosk.
The document discusses the rise of shadow IT and consumerization of IT. It notes that over the last 3 years, user-driven IT has added more to productivity than corporate IT. Reasons for the rise of shadow IT include rigid corporate IT policies, lack of choice and fun usability. The document outlines how IT is evolving to become more flexible and driven by end user needs, including accepting bring your own device (BYOD) and moving to cloud-based solutions. It argues that standardization will mean creating a more dynamic IT environment that removes technology constraints and allows self-service options.
This document discusses mobile options for accessing SharePoint. There are five main options: using out of the box mobile views; a third party framework; mobile web apps; native apps; or responsive design. Each option has pros and cons related to user experience, maintenance costs, and effort required. The document also provides information about the business benefits of mobile access and barriers that have prevented more organizations from implementing mobile SharePoint solutions.
Mike Hall discusses enabling connectivity for devices. By 2020, the number of connected devices is projected to greatly outnumber the world's population. Different environments like LAN, WiFi, and WAN pose different connectivity challenges. Developing WAN solutions today is costly, complex, and time-consuming for OEMs and developers. Emerging trends include multi-core processing, ubiquitous screens, natural user interfaces, and cloud-enabled digital content. Enabling good user experiences requires addressing issues like connectivity states, local vs cloud-powered apps, and how to take advantage of hardware and connectivity.
Magor TeleCollaboration is a leading visual collaboration solution that enables seamless integration of high definition video and advanced desktop sharing. It allows for instant access to information and people through a peer-to-peer network. Rather than just talking, it allows for collaborative working sessions from any office. Christie Digital implemented Magor globally to improve decision making, productivity, and relationships across 14 countries.
Context Awareness, MEAP - Mobile Enterprise Application Platform, Development platform plus distribution via Enterprise App Store and Enterprise App Kiosk.
The document discusses the rise of shadow IT and consumerization of IT. It notes that over the last 3 years, user-driven IT has added more to productivity than corporate IT. Reasons for the rise of shadow IT include rigid corporate IT policies, lack of choice and fun usability. The document outlines how IT is evolving to become more flexible and driven by end user needs, including accepting bring your own device (BYOD) and moving to cloud-based solutions. It argues that standardization will mean creating a more dynamic IT environment that removes technology constraints and allows self-service options.
This document discusses mobile options for accessing SharePoint. There are five main options: using out of the box mobile views; a third party framework; mobile web apps; native apps; or responsive design. Each option has pros and cons related to user experience, maintenance costs, and effort required. The document also provides information about the business benefits of mobile access and barriers that have prevented more organizations from implementing mobile SharePoint solutions.
Mike Hall discusses enabling connectivity for devices. By 2020, the number of connected devices is projected to greatly outnumber the world's population. Different environments like LAN, WiFi, and WAN pose different connectivity challenges. Developing WAN solutions today is costly, complex, and time-consuming for OEMs and developers. Emerging trends include multi-core processing, ubiquitous screens, natural user interfaces, and cloud-enabled digital content. Enabling good user experiences requires addressing issues like connectivity states, local vs cloud-powered apps, and how to take advantage of hardware and connectivity.
The document provides information about Microsoft Lync 2013 Preview. It highlights key features of Lync 2013 such as a unified communications platform, HD video conferencing, mobile client experiences, integration with Office apps, federation with Skype, and deployment flexibility. It also discusses benefits of Lync like improved productivity and mobility, connected experiences, and simplified management. Finally, it lists next steps one can take including downloading the Lync 2013 preview, planning an upgrade, and working with Sentri on proof of concepts or managed services.
How Real Estate Developers can leverage the Cloud Platform to manage, monitor...REDceo.net
Find out How Real Estate Developers can leverage the Cloud Platform to manage, monitor & track their projects in real time, anywhere, any place on multiple devices
Jive Software is a global leader in social business software. It offers a true social business platform that bridges enterprises, customers, and the social web to enable engagement, collaboration, and business impact. Jive has the most deployed social business solution worldwide and the most extensive product capabilities, with implementations at over 25% of Fortune 100 companies.
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
TBC Corporation developed mobile applications over 19 days to enhance the customer experience across various touchpoints of the vehicle ownership journey. Key applications included providing vehicle health monitoring, educational content, and digital invoices. IBM's mobile capabilities helped deliver critical success factors like supporting multiple standards, end-to-end security, and integrating mobile access with backend systems.
The document is a presentation by Lars Bodenhoff, Business Development Manager at MobileAdvisor, about Zenprise and enterprise mobility management. It summarizes that mobile devices and apps are proliferating rapidly, and the best companies are 3 times as likely to have a mobility strategy. It then outlines Zenprise's offerings for mobile device management, including their MobileManager software, ZenCloud cloud-based solution, and services and support. Finally, it discusses Zenprise's security, compliance, on-premise and cloud architectures.
The Presentation was presented by Dr. Robert Sutor, Vice President, IBM Mobile Platform at the Mobile World Congress 2012 at Barcelona, earlier this year. It has illustrations of IBM’s Mobile Strategy along with details on Worklight, IBM’s latest acquisition.
The document discusses Enterprise 2.0 and the benefits it provides. Enterprise 2.0 refers to using social software and Web 2.0 technologies internally in a company. It allows for knowledge sharing through wikis and blogs, as well as social networking, publishing, and collaboration among employees. Benefits include improved business agility, participation, and emergence of ideas and expertise from within the organization. An example of Enterprise 2.0 described is TamTamy, a knowledge sharing framework developed by Reply that allows employees to freely share and discuss information through blogs, files, tags, and chat.
Two Way View is seeking $324,000 in funding to develop and commercialize a see-through display technology for remote collaboration. The technology allows two users on opposite sides of a semi-transparent display to see each other and jointly view and manipulate shared digital content in a natural face-to-face interaction. The target market is the architecture, construction and engineering industries where the technology could improve collaboration on design projects. An initial product will be a large stationary unit priced at $15,000.
The presentation I presented at the local Belgium Innovate conference. It gives an overview of how the IBM Rational portfolio can be used to address the challenges of Mobile application lifecycle management
Reply and Hinchcliffe & Company signed an agreement for the exclusive delivery of Web 2.0 University™, the education solution developed by Hinchcliffe & Company, in strategic partnership with O’Reilly Media
This document discusses IBM's strategy for social business technologies and platforms. It outlines IBM's vision of enabling social collaboration across workforces, customers, and product development. The strategy focuses on connecting people through social networks and communication channels, analyzing social data for insights, and facilitating emergent processes. IBM aims to remove barriers between people to allow them to apply expertise and insights that improve business results. The technical approach involves social business capabilities that are delivered through various access points and service models.
Here are the key steps to create a custom mobile interface for warehouse employees to track inventory using a Mobile HTML Application in Salesforce:
1. Define the data model using Custom Objects and Fields to track inventory items, quantities, locations etc.
2. Create Visualforce pages bound to the custom objects to display and edit inventory data. Make sure to use responsive design techniques like CSS media queries.
3. Expose the Visualforce pages as Mobile Navigation Items and Mobile Tabs so they are accessible from the mobile app.
4. Add functionality like scanning barcodes using JavaScript to auto-populate fields on inventory update.
5. Configure page layouts and field-level security to control what data is visible to warehouse
This document summarizes a presentation about mobile consumerization trends in businesses. It discusses how consumer mobile devices like smartphones and tablets are increasingly being used in the workplace. This brings both organizational benefits like reduced costs and improved productivity, but also challenges around security, management of personal devices on business networks, and maintaining a separation between work and personal life. It provides an example of a company that successfully implemented a "bring your own device" policy. Finally, it discusses future trends of more mobile devices being used for both personal and work purposes, requiring companies to adapt policies to embrace this trend while mitigating risks.
Web conferencing allows for conferencing events to be shared across geographically dispersed locations in near real-time. It began in the late 1980s with real-time text chat and evolved to include capabilities like slide presentations, video, audio, and screen sharing. There are three deployment models - hosting services, software, and appliances. While it enables real-time communication and access to remote individuals, there can be issues with bandwidth, compatibility, time zones, support, and administration. Major providers of web conferencing software and services are listed.
Learn The Characteristics Of World Class CommunitiesTelligent
Today, everything is social. It’s the most revolutionary change in business since the introduction of email. Social is the “new normal” – every business has to have it. So why is it that some social strategies thrive while others wither and die?
Once you remove the shiny wrapper, there is an incredible amount of depth and value in using community software as a way to reach your customers. Join Telligent CTO Rob Howard and Sr. Director of Strategy Cecilia Edwards for their ground-breaking webinar, Learn the Characteristics of World Class Communities. Take this opportunity to hear expert views on how to transform your community from stale to “world class”, including how to:
Identify business objectives
Leverage the wisdom of the crowd
Provide privileged membership
View these slides to learn how your organization can build a world-class community.
Harmonisation of digital life - Innovation in devices, mobility and connectivity continue to drive the way we use everyday services, socialise and communicate.
Technology Trends & Strategies for 2014. How to prepare your company for next wave of IT & Cloud computing focused on mobile applications and user experience
Cloud computing allows users to access software and store data over the internet rather than locally on individual computers. It provides various services through different deployment models including public, private, hybrid and community clouds. The main cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). While cloud computing provides advantages like scalability, cost savings, and mobility, security of stored data is a primary concern that requires measures like access control, authentication, authorization and encryption.
The document provides information about Microsoft Lync 2013 Preview. It highlights key features of Lync 2013 such as a unified communications platform, HD video conferencing, mobile client experiences, integration with Office apps, federation with Skype, and deployment flexibility. It also discusses benefits of Lync like improved productivity and mobility, connected experiences, and simplified management. Finally, it lists next steps one can take including downloading the Lync 2013 preview, planning an upgrade, and working with Sentri on proof of concepts or managed services.
How Real Estate Developers can leverage the Cloud Platform to manage, monitor...REDceo.net
Find out How Real Estate Developers can leverage the Cloud Platform to manage, monitor & track their projects in real time, anywhere, any place on multiple devices
Jive Software is a global leader in social business software. It offers a true social business platform that bridges enterprises, customers, and the social web to enable engagement, collaboration, and business impact. Jive has the most deployed social business solution worldwide and the most extensive product capabilities, with implementations at over 25% of Fortune 100 companies.
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
TBC Corporation developed mobile applications over 19 days to enhance the customer experience across various touchpoints of the vehicle ownership journey. Key applications included providing vehicle health monitoring, educational content, and digital invoices. IBM's mobile capabilities helped deliver critical success factors like supporting multiple standards, end-to-end security, and integrating mobile access with backend systems.
The document is a presentation by Lars Bodenhoff, Business Development Manager at MobileAdvisor, about Zenprise and enterprise mobility management. It summarizes that mobile devices and apps are proliferating rapidly, and the best companies are 3 times as likely to have a mobility strategy. It then outlines Zenprise's offerings for mobile device management, including their MobileManager software, ZenCloud cloud-based solution, and services and support. Finally, it discusses Zenprise's security, compliance, on-premise and cloud architectures.
The Presentation was presented by Dr. Robert Sutor, Vice President, IBM Mobile Platform at the Mobile World Congress 2012 at Barcelona, earlier this year. It has illustrations of IBM’s Mobile Strategy along with details on Worklight, IBM’s latest acquisition.
The document discusses Enterprise 2.0 and the benefits it provides. Enterprise 2.0 refers to using social software and Web 2.0 technologies internally in a company. It allows for knowledge sharing through wikis and blogs, as well as social networking, publishing, and collaboration among employees. Benefits include improved business agility, participation, and emergence of ideas and expertise from within the organization. An example of Enterprise 2.0 described is TamTamy, a knowledge sharing framework developed by Reply that allows employees to freely share and discuss information through blogs, files, tags, and chat.
Two Way View is seeking $324,000 in funding to develop and commercialize a see-through display technology for remote collaboration. The technology allows two users on opposite sides of a semi-transparent display to see each other and jointly view and manipulate shared digital content in a natural face-to-face interaction. The target market is the architecture, construction and engineering industries where the technology could improve collaboration on design projects. An initial product will be a large stationary unit priced at $15,000.
The presentation I presented at the local Belgium Innovate conference. It gives an overview of how the IBM Rational portfolio can be used to address the challenges of Mobile application lifecycle management
Reply and Hinchcliffe & Company signed an agreement for the exclusive delivery of Web 2.0 University™, the education solution developed by Hinchcliffe & Company, in strategic partnership with O’Reilly Media
This document discusses IBM's strategy for social business technologies and platforms. It outlines IBM's vision of enabling social collaboration across workforces, customers, and product development. The strategy focuses on connecting people through social networks and communication channels, analyzing social data for insights, and facilitating emergent processes. IBM aims to remove barriers between people to allow them to apply expertise and insights that improve business results. The technical approach involves social business capabilities that are delivered through various access points and service models.
Here are the key steps to create a custom mobile interface for warehouse employees to track inventory using a Mobile HTML Application in Salesforce:
1. Define the data model using Custom Objects and Fields to track inventory items, quantities, locations etc.
2. Create Visualforce pages bound to the custom objects to display and edit inventory data. Make sure to use responsive design techniques like CSS media queries.
3. Expose the Visualforce pages as Mobile Navigation Items and Mobile Tabs so they are accessible from the mobile app.
4. Add functionality like scanning barcodes using JavaScript to auto-populate fields on inventory update.
5. Configure page layouts and field-level security to control what data is visible to warehouse
This document summarizes a presentation about mobile consumerization trends in businesses. It discusses how consumer mobile devices like smartphones and tablets are increasingly being used in the workplace. This brings both organizational benefits like reduced costs and improved productivity, but also challenges around security, management of personal devices on business networks, and maintaining a separation between work and personal life. It provides an example of a company that successfully implemented a "bring your own device" policy. Finally, it discusses future trends of more mobile devices being used for both personal and work purposes, requiring companies to adapt policies to embrace this trend while mitigating risks.
Web conferencing allows for conferencing events to be shared across geographically dispersed locations in near real-time. It began in the late 1980s with real-time text chat and evolved to include capabilities like slide presentations, video, audio, and screen sharing. There are three deployment models - hosting services, software, and appliances. While it enables real-time communication and access to remote individuals, there can be issues with bandwidth, compatibility, time zones, support, and administration. Major providers of web conferencing software and services are listed.
Learn The Characteristics Of World Class CommunitiesTelligent
Today, everything is social. It’s the most revolutionary change in business since the introduction of email. Social is the “new normal” – every business has to have it. So why is it that some social strategies thrive while others wither and die?
Once you remove the shiny wrapper, there is an incredible amount of depth and value in using community software as a way to reach your customers. Join Telligent CTO Rob Howard and Sr. Director of Strategy Cecilia Edwards for their ground-breaking webinar, Learn the Characteristics of World Class Communities. Take this opportunity to hear expert views on how to transform your community from stale to “world class”, including how to:
Identify business objectives
Leverage the wisdom of the crowd
Provide privileged membership
View these slides to learn how your organization can build a world-class community.
Harmonisation of digital life - Innovation in devices, mobility and connectivity continue to drive the way we use everyday services, socialise and communicate.
Technology Trends & Strategies for 2014. How to prepare your company for next wave of IT & Cloud computing focused on mobile applications and user experience
Cloud computing allows users to access software and store data over the internet rather than locally on individual computers. It provides various services through different deployment models including public, private, hybrid and community clouds. The main cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). While cloud computing provides advantages like scalability, cost savings, and mobility, security of stored data is a primary concern that requires measures like access control, authentication, authorization and encryption.
The document discusses cloud computing and its applications for libraries. It begins by explaining what cloud computing is and some of its key benefits like flexibility, cost effectiveness, and accessibility from any device. It then outlines different types of cloud models including private, public, hybrid, and community clouds. The document notes advantages of cloud computing for consumers, small businesses, and large companies. Potential concerns around reliability, security, privacy, and unpredictable costs are also presented. Finally, it discusses how cloud computing represents a more efficient model than local servers for libraries and provides some examples of cloud services that could be used.
IBM delivers a comprehensive end-to-end mobile solution that includes: (1) building mobile applications that connect to backend systems, (2) managing mobile devices and applications through visibility, security and automation tools, and (3) extending existing business capabilities and transforming businesses through new mobile opportunities. IBM acquired Worklight to accelerate mobile app development and recently announced new offerings like Rational Collaborative Lifecycle Management and IBM Endpoint Manager for mobile devices.
This document provides an overview of cloud computing, including its history, models, types, advantages and recent developments. Some key points:
1) Cloud computing originated from network diagrams depicting the internet as a cloud. Major companies like Amazon Web Services, Google, and IBM launched cloud services in the mid-2000s.
2) There are three main models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides basic storage and computing resources, while PaaS and SaaS provide higher-level services.
3) The four main types of cloud are public, community, hybrid, and private clouds
This is a presentation introducing a 1080P video collaboration platform over a 3 mbps unmanaged broadband pipe. Provides up to 1080P resolution on concurrent application sharing with far-side control capabilities.
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
The document discusses the need for a new mobile-cloud desktop architecture. It notes that users now expect to access their applications, data and files from any device. However, traditional desktop environments remain tied to specific devices and locations. The document recommends moving to a mobile-cloud model where applications and data are stored and managed centrally in the cloud but delivered locally to any user device. This provides benefits like a consistent experience across devices and easier management for IT.
The Presentation was presented by Dr. Robert Sutor, Vice President, IBM Mobile Platform at the Mobile World Congress 2012 at Barcelona, earlier this year. It has illustrations of IBM’s Mobile Strategy along with details on Worklight, IBM’s latest acquisition.
Translating Open Source Value to the CloudGordon Haff
Open source has not only helped free users from vendor lock-in; it has untapped new sources of innovation and enabled new opportunities for collaboration. These and other open source values are now serving to revolutionize cloud computing--indeed, to make it possible in the first place. Yet, it's not a simple literal translation. Open source protections such as licenses have different meanings, especially in public clouds. And new aspects of and potential threats to software freedom, like APIs, are central to cloud computing, whether on-premise or otherwise.
The document discusses the transition from a traditional, hierarchical society to a new internet society characterized by virtual time, exponential growth, virtual communities, social networking, distributed authority, and bottom-up consensus management. It argues that the future internet has the potential to devolve power to citizens and deliver a more personalized, customized, and user-controlled experience. Realizing this vision will require redefining traditional concepts of community and boundaries. Ireland is positioned to play a leadership role due to its strengths in telecommunications, research, workforce, and commitment to e-government. Large-scale projects, flexibility, systematic project selection, open sharing, and integration of sectors are recommended for maximizing common enablers across areas like smart energy, utilities,
Webinar: The Enterrpise Appstore - What is it and why you need it.Appear
The document discusses the benefits of an enterprise appstore for managing workforce mobility. It outlines how first generation mobility solutions had challenges around training, adoption and employee satisfaction that second generation solutions address through features like cloud-based platforms, BYOD support, and improved user interfaces. The presentation promotes an appstore that enables cross-platform mobile app development, integration with backend systems, and delivery of context-aware apps to connect employees, assets, customers and systems. Key success factors for such an appstore include supporting multiple devices and OSes, cloud-based deployment, and delivering apps tailored to user context.
Codestrong 2012 breakout session creating a mobile strategyAxway Appcelerator
The document discusses creating an enterprise mobile strategy. It recommends establishing a Mobile Center of Excellence (MCoE) to organize efforts across departments and prioritize mobile applications. It presents a mobile maturity model from exploration to transformation and sample frameworks for evaluating application requests and BYOD policies. The conclusions emphasize starting with the right organization and learning from successful implementations.
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Amazon Web Services
(Presented by Skytap) Complex multi-tier enterprise applications that have been under development for decades assume reliable hardware and typically have dependencies on underlying operating systems, hardware configurations, and network topologies. The boundary between one application or service and another is often fuzzy, with many interdependencies. These traits make some enterprise applications difficult to refactor and move to a public cloud. Even the teams that manage these applications can be unfamiliar with cloud terminology and concepts. In this session for enterprise IT architects and developers, Brad Schick, CTO of Skytap and Skytap customers Fulcrum, DataXu and F5 will share their insights into why the evolution of enterprise applications will lead to hybrid applications that opportunistically take advantage of cloud-based services. Brad will then demonstrate Skytap Cloud with Amazon Web Services and discuss how enterprises can easily achieve this integration today for application development and testing.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It allows users to access resources without needing to manage physical infrastructure. Resources in the cloud are pooled and allocated dynamically based on demand. Cloud computing delivers scalability, resilience, homogeneity and low costs through virtualization, broad network access, and rapid elasticity of resources.
The document provides an overview of cloud computing. It defines cloud computing as enabling on-demand access to configurable computing resources over the internet. There are five essential cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. There are three cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). There are also four deployment models: private cloud, community cloud, public cloud, and hybrid cloud. The document discusses advantages and challenges of cloud computing as well as trends in data centers and cloud adoption.
The document discusses cloud computing and its opportunities and challenges. It provides an overview of cloud computing fundamentals, the stages of adopting cloud computing, and how cloud computing can impact businesses and IT. It also discusses how cloud computing services can create new opportunities for businesses to develop more agile and scalable solutions, while addressing challenges around governance, security, and operational readiness.
Similar to 2013 Democratization Of Technology How Cloud And Consumerization Change Everything (20)
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
The cybersecurity industry had another record-breaking year in 2019 with $27.6 billion in M&A volume and $8.9 billion in VC investments. While the IPO market remained active with companies like CrowdStrike and CloudFlare going public, maintaining relevance in the crowded vendor landscape and keeping up with the changing technology as a CISO becomes increasingly difficult. The future of the industry depends on stopping "FUD" and overcomplicating programs, and getting back to the basics of simple and measurable cybersecurity.
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
The document discusses the impact of emerging technologies on various industries and society as part of the 4th Industrial Revolution (4IR). It identifies factors driving 4IR such as the Internet of Things, automation, cloud technology, 3D printing, advanced robotics, artificial intelligence, and more. The document summarizes how these technologies are already changing how people work, travel, buy goods, and live. It also outlines new areas being developed like robotics, drones, virtual reality, and more. Finally, the document emphasizes that all industries will be disrupted and discusses skills needed to thrive in 4IR like critical thinking, collaboration, and technological literacy.
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
The document discusses the current state of threat intelligence and provides recommendations for improvement. It notes that most threat intelligence programs lack proper structure, analysis, and adherence to intelligence tradecraft. Vendors often provide reports without proper sourcing, context, or credibility assessments. The document recommends building intelligence functions from the top down with a focus on people, process, and then technology. Proper analysis, long-term strategic work, and direct access to stakeholders are also emphasized over short-term reporting and technical focus. Adopting intelligence tradecraft standards from agencies like the CIA could help threat intelligence programs mature.
The document outlines an agenda for a Cloud Security Alliance (CSA) chapter meeting, including time for networking, a presentation on the top 12 cloud computing threats in 2016, CSA chapter announcements and research, and a vote for new CSA board leaders. It also includes slides on CSA's mission and ways to get involved through chapters, individual membership, and corporate membership.
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
This document discusses enterprise risk management and cybersecurity regulations for businesses. It outlines challenges such as different rules established by governments, misconceptions around cybersecurity, and difficulties for businesses to stay safe. It recommends formalizing enterprise risk management using standards like ISO 31000 and ISO 27005 to accommodate multiple approaches. The argument is made that traditional risk management may not work for cybersecurity on its own and that an all-hazards approach is more applicable for governments than businesses.
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
Cyber security is an important and growing field due to increasing threats from cybercriminals. The document discusses why cyber security is needed to protect national security, public health and safety, and economic well-being from issues like hacking of devices like insulin pumps. It notes that many systems and devices are now connected but not sufficiently secured. The document encourages pursuing cyber security as a career path due to the growing number of jobs and need for professionals in the field. It provides tips on how to launch a career in cyber security such as getting educated and certified in important skills.
The document discusses application security then and now. It summarizes the OWASP Top 10 lists from 2001-2004 and 2013, noting that the types of vulnerabilities have not substantially changed. It emphasizes that the intent of the OWASP Top 10 is to manage risk, not just avoid vulnerabilities. The document provides tips for implementing application security, including starting small, gaining buy-in, educating developers, recruiting champions, and using the right partners and tools. It stresses that network security alone cannot prevent application breaches and that static analysis should be done early in development.
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
Board of Directors are increasingly facing lawsuits related to data privacy and security breaches. To mitigate these risks, boards should regularly discuss data privacy and security issues, ensuring adequate resources are devoted to these areas. Recent reports show that breaches can occur at companies of all sizes, and that many companies have insufficient security budgets or expertise. Proper board oversight of cybersecurity is needed to establish responsible risk management practices and response plans for potential security incidents.
Data Breaches. Are you next? What does the data say? Phil Agcaoili
The document discusses cyber security risks facing the airline and airport industries. It notes that airports and airlines have complex IT systems used to manage passenger flow and exchange sensitive information in real-time, making them vulnerable to cyber attacks. The document presents several case studies of past cyber incidents affecting airports and airlines, including viruses that infected airport servers and drone fleets, and system failures at airports due to malware and technical issues. It stresses that all organizations must take basic steps to improve cyber hygiene and security.
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
Cyber crime is a growing global problem that costs businesses and organizations billions of dollars annually. The document discusses various types of cyber criminals, from amateur hackers to organized criminal groups. It also examines the national security threat from state-sponsored cyber espionage, particularly from China and Russia, which steal intellectual property and sensitive government information through sophisticated targeted attacks. The costs of cyber crime to businesses are substantial and increasing each year as more data and systems become electronically connected.
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
This document provides an overview of the cybersecurity field, including why it is a good career option, common career paths and roles, in-demand skills, top job locations, and advice on getting started in the field. It notes that cybersecurity jobs are expected to grow rapidly and face ongoing skills shortages, with average salaries of $116,000 per year. The top job titles include security engineer, security analyst, and information security analyst. Experience in areas like systems administration, networking, development, and auditing is recommended to break into the field.
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
The document provides an overview of a live event discussing the Software Assurance Marketplace (SWAMP) project. It includes:
1) An agenda for the event with presentations on the SWAMP overview, an executive insight, and Q&A session.
2) Descriptions of the SWAMP project, which is a $23 million, 5-year effort to build a facility for testing open source software for vulnerabilities. It will provide tools, resources, and results reporting to support software assurance.
3) Details on the SWAMP's vision to help developers integrate security testing early and often through continuous assurance in their development cycles. This will help find and fix vulnerabilities before they become serious problems.
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
This document discusses the National Institute of Standards and Technology's Cybersecurity Framework. It begins by defining cyber security and information security. It then explains that the Framework was created through a collaborative process between the private sector and government to provide a common language for managing cybersecurity risks. The Framework includes functions for identifying, protecting, detecting, responding to and recovering from cybersecurity events. It also establishes tiers to assess approaches to cyber risk management. The document urges organizations to adopt the Framework to improve cybersecurity practices and facilitate information sharing.
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
The document summarizes recent cybersecurity activities and initiatives from the federal government and private sector. It discusses the Cybersecurity Framework being developed by NIST, the Executive Order on cybersecurity critical infrastructure signed by the President, and incentives for voluntary adoption of the framework. It also provides an overview of the communications and other critical infrastructure sectors and a timeline of upcoming cybersecurity events.
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
The document discusses cybersecurity trends and the US government's efforts to define and secure critical infrastructure. It begins by defining critical infrastructure sectors and noting the increase in cyber attacks over the last decade. It then discusses an executive order and presidential policy directive that aim to improve information sharing, develop a cybersecurity framework, and define roles for securing critical infrastructure. The document provides summaries of cybersecurity reports and trends to support taking a risk-based, evidence-driven approach to cybersecurity.
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
The Cloud Security Alliance released a draft of version 3.0 of the Cloud Control Matrix for peer review, which realigns control domains and introduces three new domains. They also released reports on the top 10 big data security challenges and a position paper on AICPA reporting frameworks for cloud security. Additionally, they published a Privacy Level Agreement outline for cloud service providers in the EU to disclose personal data handling practices.
1) The document discusses how Moneyball, a book and film about using statistical analysis to build a winning baseball team with limited resources, can be applied to information security through an approach called "Moneysec".
2) Moneyball showed how underfunded baseball teams could compete by focusing on overlooked statistical metrics that correlated most strongly with winning, rather than conventional evaluations.
3) Similarly, Moneysec proposes using evidence-based metrics and data to optimize security investments and decisions, rather than traditional subjective assessments, allowing organizations to strengthen their security effectiveness despite budget constraints.
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
The document discusses cloud assurance basics and provides an overview of cloud computing concepts, models, and security concerns. It outlines key legal and privacy issues to consider regarding data location, applicable laws and regulations. It also summarizes the latest developments in cloud security standards and frameworks, including the Cloud Security Alliance's Cloud Controls Matrix, Consensus Assessments Initiative, Security, Trust and Assurance Registry, and Open Certification Framework.
2013 Democratization Of Technology How Cloud And Consumerization Change Everything
1. 1
The Democratization of Technology
How Cloud and Consumerization Change Everything in 2013
Phil Agcaoili
Cloud
Consumer-
Mobility ization
App
Virtualization
Evolution
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
3. 3
Anytime. Anywhere. Any Device.
A Collection of Devices Access Ubiquitous Services/Apps
•Shifts in client computing
▫ Personal computers no longer the focus
▫ Smartphones, tablets, and other consumer devices
•Emerging cloud services connect multiple devices
▫ Lots of choices for users
▫ Where, when, and how
•The post-PC era
▫ Not really about being 'after' the PC
▫ Experiencing a new style of personal computing
Frees individuals to use computing in fundamentally new ways
Improves multiple aspects of their work and personal lives
•Several driving forces are combining to create a new technology era
•Trends have roots from the past decade, but aligning in new ways
*Gartner
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
4. 4
Consumerization
Home Technology Enters the Corporate Environment
• Nothing new, consumer technology has been impacting corporate
information technology for the past decade
• Major wave is starting to take hold across all aspects of information
technology as several key factors come together:
▫ Users are more technologically savvy and have very different expectations
of technology
▫ The Internet and social media have empowered and emboldened users
▫ The rise of powerful, affordable mobile devices change the equation for
users
▫ Users have become innovators
▫ Through the democratization of technology, users of all types and status
within organizations can now have similar technology available to them
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
5. 5
Mobility
Wherever and Whenever You Want
• Mobile devices combined with the cloud can fulfill most computing tasks,
• Tradeoffs are outweighed in the minds of the user by the convenience
and flexibility provided by the mobile devices
• Emergence of more-natural user interface experiences is making mobility
practical
▫ Touch- and gesture-based user experiences
▫ Speech and contextual awareness
▫ Wearable and modular computing
• Enables rich interaction with devices and a much greater level of freedom
• Any given device will take on the role of the user's primary device
▫ Users have a web of devices
▫ Personal delivered at a new level, agnostic to the device itself
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
6. 6
Cloud
Enabling, Flexible, and Cost-Effective Services
• Cloud services individual users
▫ Business impact
• Every user has a scalable and nearly infinite set of resources available for
whatever they need to do
• The impacts for IT infrastructures are stunning, but when this is applied
to the individual, there are some specific benefits that emerge.
▫ Users' digital activities are far more self-directed than ever before
▫ Users demand to make their own choices about applications, services and
content, selecting from a nearly limitless collection on the Internet
• Encourages a culture of self-service that users expect in all aspects of
their digital experience
▫ Lines are blurred between business and home
• Opens a whole new level of opportunity
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
7. 7
Apps Evolution (of Applications)
Applications Evolve to Apps
• Changes occurring to the way applications are designed, delivered and
consumed by users
▫ Simple but powerful
▫ Single purpose delivers
• Applications can now be exposed in multiple ways and used in varying
situations by the user
▫ Increases greater cross-platform portability
▫ Small user experience (UX) apps used to adjust a server- or cloud-resident
application
▫ Unique characteristics of a specific device or scenario minimized
HTML5 and Webkit
• Profound impact on how applications are written and managed in corporate
environments
• Dramatic impact on all other aspects of the market
▫ Appstores
▫ Direct delivery
▫ Levels the playing field for competition
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
8. 8
Virtualization
Enabling the Any Device Dream
• Virtualization has improved flexibility and increased the options for how
IT organizations can implement client environments
• Virtualization has freed applications from the peculiarities of individual
devices, operating systems or even processor architectures
▫ Eliminates browser compatibility woes
▫ Enables standardization
• Virtualization provides a way to move the legacy of applications and
processes developed in the PC era forward into the new emerging world
• Low-power devices have access to much-greater processing power
▫ Expanding device utility
▫ Increases the reach of processor-intensive applications
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
9. 9
Conclusion
• The combination of trends coupled with advances in new enabling
technologies is ushering in the era of the personal cloud
• The specifics of devices will become less important for the individual
and organization to worry about
• Users will use a collection of devices, with the PC remaining one of
many options, but no one device will be the primary device
• The personal cloud will take on the role of central need
• Access to the cloud and the content stored or shared in the cloud
will be managed and secured, rather than solely focusing on the
device itself
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
11. 11
Problem Statement
• A groundswell of new(er) technologies
demanded by employees requires a new
strategy to enable and empower employees
▫ Smart phones - 14% of US employees use
smartphones for work today; 8% buy their own*
▫ Cloud services – more and more of our internal
services are being outsourced, use of services like
GoogleDocs, DropBox, etc.
▫ Social technology - 17% of employees use social
technologies for work*
*Forrester
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
12. 12
Why
• These technologies are being used for multiple reasons
▫ Serving customers better
▫ Getting our jobs done better
▫ People are used to using these technologies at
home
More than half of US employees say they have better technology at home
than at work*
37% of US information workers are solving their customer and business
problems using technology they bring from home*
• It isn‟t just about the latest technology
▫ While this may be one factor, it isn‟t the driving
factor for most
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
13. 13
Reality
• Employees are going to use the technology
anyways
▫ “It was something I use in my personal life and wanted
to use it at work” – 43% of US workers surveyed
▫ “I needed it and my company didn‟t provide an
alternative” – 35% of US workers surveyed
▫ “It is better than what my company provided” – 24% of
US workers surveyed
• Business units and employees are moving
ahead with solutions that meet their needs,
with or without IT‟s or Security‟s guidance and
support
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
20. We have an opportunity to address
the risks & leverage the benefits before the cloud
becomes ubiquitous
21. 21
Possible responses
Strategy and Free for all
Not allowed
measured
approach using
risk as a guide
Questions we should be asking:
– What are people really trying to do? Help customers better, use
what they like to use (i.e., use at home)?
– What is the value to the business?
– What are the risks?
– Assuming the business case holds, how can the company
support the activity?
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
22. 22
What’s missing?
• We aren‟t getting in front of the issues and enabling
internal and external users
▫ The technology and policies are the answer, but
what are the problems our employees are trying
to solve?
▫ Are we asking them?
▫ Do we know what users are trying to do so we can
propose the right processes and technical
solutions?
• People, Process, and Technology
▫ Policy
▫ Resources to handle new devices to manage
▫ Secure containers and sandboxes
▫ Change how we provide remote access
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
23. 23
Risks of doing nothing
• We have multiple groups trying to solve the issue
▫ Risk of not solving the real problem
▫ Risk of ending up with multiple solutions (i.e,.
No standardization or governance)
• Lack of an enabled workforce resulting in less
innovation
▫ How does the lack of current technologies affect
our ability to innovate (and do we know where
innovation will come from)?
▫ What are your competitors doing?
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
24. 24
Stakeholders
• This topic or set of topics impacts many different
stakeholders
▫ IT/Enterprise Architecture– non-standard solutions may proliferate
▫ Operations - someone has to support the enabling technologies
▫ Security – what are the risks?
▫ Legal – what are the liability issues?
▫ Customer Care – how can we use these technologies to better service our
customers?
▫ Regional Teams – already gathering business requirements
▫ Product/Strategy – using current technology is critical to keeping up with (or
getting ahead of) our customers and their expectations of our services
▫ HR – policies and procedures
▫ Customers – if we aren‟t current with technology at work, how will be innovative
for our customers?
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
25. 25
Why security cares
• Security is normally the first blockade used to
discourage the use of new technologies
• Each of these new ways of doing business involve risk
▫ A risk based approach gets the issues on the table so the business
has a say in the decisions that are made around new technologies
▫ Understanding the risks puts security in an enabler role vs. a „just
say no‟ role
• The ability to support some or all of these technologies
requires a new way of doing security at most companies
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
26. 26
Why security cares
• Most rely on infrastructure protections (firewalls, locked
down workstations and laptops) to provide protection
• This method makes it challenging to support these new
technologies
▫ Do we know who has access to our data (employees, contractors, 3rd
parties)?
▫ Do we know where our data is?
▫ Is your internal network flat?
• We need to provide a flexible security architecture that
protects our data and resources from the inside out
▫ This will allow us to enable these new ways of doing business
while managing risk
• Security areas such as Identity Management, data
protection, remote access and remote device management
need to be focused on
▫ Virtualization/VDI/Citrix/Remote access may be the solution, but for
which problem(s)
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
27. 27
Conclusion
• Security must take a position on these trends
• Security must be preparing to enable these
services
▫ Change security model (Phil‟s perspective)
Treat all end points as hostile
Focus on most important data
Collapse core(s)
Evolve remote access paradigms
Focus monitoring and application of fundamental
security measures (ISO 27002, PCI DSS, etc.)
• We need to manage risk
• We need to embrace the changes ahead
7/6/2012 Creative Commons Attribution-ShareAlike 3.0 Unported License
1. We have a unique opportunity to define new security controls and identity risks and threats before we see full ubiquity of the cloudThis is a big opportunity for the industry because of where we are today and where the cloud is headed. And make no mistake, security is the biggest challenge we are all facing.