SlideShare a Scribd company logo
Mobile:
The up and downside
of risk
โ€œOpportunities multiply as they are seized.โ€
Sun Tzu
Alliander IT CIO Office
Michel de Goede
1. Introduction
1. Introduction
โ€œEuropean electricity consumers have the right to enjoy universal service
that is the right to be supplied with electricity of a specified quality โ€ฆ at
reasonable, easily and clearly comparable and transparent prices.โ€
1. Introduction
โ€ข Electric Vehicles
โ€ข Two way traffic
โ€ข Smart metering and home automation
โ€ข Smart city initiatives
โ€ข Smart grid
3. Innovation: sixth Schumpeter / Kondratiev wave of innovation
3. Innovation: The semantic wave?
Predictions are as follows:
Source: Sogeti VINT
3. Innovation: And then there is also.....
Source: Sogeti VINT
3. Innovation: Biohackables (implanted bio chip)
Source: Motherboard
3. Innovation: Biohackables (Dean Kamenโ€™s Luke Arm)
Source: Wired
3. Innovation: Biohackables (exoskeleton)
3. Innovation: Biohackables (hearing colour)
Source PSFK
3. Innovation: Augmentables (Motorola wearable computer)
Source Motorola
3. Innovation: Augmentables (Oculus Rift)
3. Innovation: Enchantables (Glow Caps)
Source: Glow Caps
3. Innovation: Swallowables (colonoscopy camera pill)
Source: PSFK
3. Innovation: Wearables (navigation jacket)
Source: Wearable Experiments
3. Innovation: Wearables (Google & Motorolaโ€™s lie detector tattoo)
Source: PSFK
3. Innovation: Surroundables (Nissan Nismo Watch)
Source: Nissan
The ultimate device is YOU!
Business Processes
4. Security: So here is your Internet of Everything!!!
Virtual World
Personal
Devices
Home AutomationOperational Technology
IT Connected
Organizations
Crime
4. Security: Gartner 2020 planning assumptions
โ€ข 80% of digital access will be shaped by new mobile and non-PC
architectures, up from 5% today.
โ€ข 60% of all digital identities interacting with enterprises will come from external
identity providers through a competitive marketplace, up from <10% today.
โ€ข over 80% of enterprises will allow unrestricted access to non-critical assets,
up from <5% today, reducing spending on IAM by 25%.
โ€ข 70% of all businesses will use attribute-based access control (ABAC) as the
dominant mechanism to protect critical assets, up from <5% today.
โ€ข identity analytics and intelligence (IAI) tools will deliver direct business value*
in 60% of enterprises, up from <5% today.
โ€ข the Internet of Things will redefine the concept of "identity management" to
include what people own, share, and use.
Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)
5. Four measures to master mobile developments
1. Separate systems of engagement from systems of record
and specify interacions on the interface level (both protocol
and file/data format). Choose standards.
2. Orchestrate over an increasing number of business
partners, devices, protocols and formats
3. Be resilient to all types of risk in the automated landscape
under your responsibility
4. Carefully choose your anti lock-in strategy
Speed up!
5. Four measures to master mobile developments
- Separate systems of engagement from systems of record
Internet
(open)
Access Management
(access layer)
Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices
(closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in these rooms?
Protocol and data-
format decoupling
such as: Citrix,
HTML 5, JSON,
XML, Sybase SUP
and so on
Application
2 Application
3
Leverage
cloud
ยฉ Wim Bouman, Alliander IT
Needs semantics
5. Four measures to master mobile developments
- Orchestrate
Compliance
starts here
โ€ข Counter the โ€˜wave of appliancesโ€™ and lock-in wars with open
source orchestration
โ€ข Use standardization to minimize the number of supported
protocols and file formats as much as possible
โ€ข Keep risk acceptable
5. Four measures to master mobile developments
- Choose your anti lock-in strategy
Resilience can be obtained by moving away from typical barrier enhancement
risk-measures. Consider the following options:
โ€ข Ignore, the ostrich โ€˜see-no-evil-hear-no-evilโ€™ tactic;
โ€ข Accept, the potential impact of some risks may be deemed acceptable to
your organization;
โ€ข Reduce, e.g. the potential impact or probability of occurrence of a risk, like
the banking app;
โ€ข Transfer, use insurance or subcontracting to transfer potential consequences
of risk;
โ€ข Avoid , not entering the type of business that may incur potential risk impact
deemed too high;
โ€ข Exploit, risk is also an opportunity and high risk investments may yield high
returns.
5. Four measures to master mobile developments
- Be resilient
The beauty of it all?
โ€ข Seize the opportunities of Mobile
โ€ข Minimize downside risk
Alliander IT CIO Office
Michel de Goede
Thank you!

More Related Content

What's hot

Disruptive Analysis - Telecoms Futurism
Disruptive Analysis - Telecoms FuturismDisruptive Analysis - Telecoms Futurism
Disruptive Analysis - Telecoms Futurism
Dean Bubley
ย 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
Giulio Coraggio
ย 
Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018
Dean Bubley
ย 
Industry Revolution 4.0 Disruptions
Industry Revolution 4.0 DisruptionsIndustry Revolution 4.0 Disruptions
Industry Revolution 4.0 Disruptions
Dr. Mazlan Abbas
ย 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
ย 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Pear Yam
ย 
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in MalaysiaIndustry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Dr. Mazlan Abbas
ย 
Does it matter show
Does it matter showDoes it matter show
Does it matter show
Brandon Casebolt
ย 
Book Reading - Does IT Matter - Nicholas Carr
Book Reading  - Does IT Matter - Nicholas CarrBook Reading  - Does IT Matter - Nicholas Carr
Book Reading - Does IT Matter - Nicholas Carr
Ritesh Nayak
ย 
WebRTC Drivers & Opportunities for Telecom Service Providers
WebRTC Drivers & Opportunities for Telecom Service ProvidersWebRTC Drivers & Opportunities for Telecom Service Providers
WebRTC Drivers & Opportunities for Telecom Service Providers
Dean Bubley
ย 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Dean Bubley
ย 
WebRTC Market Status & Voice/Video Overview
WebRTC Market Status & Voice/Video OverviewWebRTC Market Status & Voice/Video Overview
WebRTC Market Status & Voice/Video Overview
Dean Bubley
ย 
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
MicheleNati
ย 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEEGLOBALSOFTSTUDENTPROJECTS
ย 
Dean Bubley presentation on enterprise & neutral host models for mobile
Dean Bubley presentation on enterprise & neutral host models for mobileDean Bubley presentation on enterprise & neutral host models for mobile
Dean Bubley presentation on enterprise & neutral host models for mobile
Dean Bubley
ย 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
44CON
ย 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
Atkins
ย 
Open Source IoT- Timm McShane
Open Source IoT- Timm McShaneOpen Source IoT- Timm McShane
Open Source IoT- Timm McShane
Inman News
ย 
FIWARE Accelerator Programme
FIWARE Accelerator ProgrammeFIWARE Accelerator Programme
FIWARE Accelerator Programme
FIWARE
ย 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
ITU
ย 

What's hot (20)

Disruptive Analysis - Telecoms Futurism
Disruptive Analysis - Telecoms FuturismDisruptive Analysis - Telecoms Futurism
Disruptive Analysis - Telecoms Futurism
ย 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
ย 
Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018
ย 
Industry Revolution 4.0 Disruptions
Industry Revolution 4.0 DisruptionsIndustry Revolution 4.0 Disruptions
Industry Revolution 4.0 Disruptions
ย 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
ย 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
ย 
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in MalaysiaIndustry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
ย 
Does it matter show
Does it matter showDoes it matter show
Does it matter show
ย 
Book Reading - Does IT Matter - Nicholas Carr
Book Reading  - Does IT Matter - Nicholas CarrBook Reading  - Does IT Matter - Nicholas Carr
Book Reading - Does IT Matter - Nicholas Carr
ย 
WebRTC Drivers & Opportunities for Telecom Service Providers
WebRTC Drivers & Opportunities for Telecom Service ProvidersWebRTC Drivers & Opportunities for Telecom Service Providers
WebRTC Drivers & Opportunities for Telecom Service Providers
ย 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
ย 
WebRTC Market Status & Voice/Video Overview
WebRTC Market Status & Voice/Video OverviewWebRTC Market Status & Voice/Video Overview
WebRTC Market Status & Voice/Video Overview
ย 
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
IoTMeetupGuildford#4: SOCIOTAL Project Overview - Michele Nati, Dionysia Tria...
ย 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
ย 
Dean Bubley presentation on enterprise & neutral host models for mobile
Dean Bubley presentation on enterprise & neutral host models for mobileDean Bubley presentation on enterprise & neutral host models for mobile
Dean Bubley presentation on enterprise & neutral host models for mobile
ย 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
ย 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
ย 
Open Source IoT- Timm McShane
Open Source IoT- Timm McShaneOpen Source IoT- Timm McShane
Open Source IoT- Timm McShane
ย 
FIWARE Accelerator Programme
FIWARE Accelerator ProgrammeFIWARE Accelerator Programme
FIWARE Accelerator Programme
ย 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
ย 

Similar to Mobile: the up and downside of risk

Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
Michel de Goede
ย 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
Michel de Goede
ย 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
Michel de Goede
ย 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
Startup Europe IoT Accelerator
ย 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
Michel de Goede
ย 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
Michel de Goede
ย 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
ย 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
ย 
Exploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolioExploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolio
Michel de Goede
ย 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
ย 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Utah Tech Labs
ย 
2008 Trends
2008 Trends2008 Trends
2008 Trends
TBledsoe
ย 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
Arnold Antoo
ย 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
Thorsten Schroeer
ย 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
ย 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
ย 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
ย 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
Dawn Nash Pfeiffer
ย 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
Alan Tatourian
ย 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
ย 

Similar to Mobile: the up and downside of risk (20)

Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
ย 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
ย 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
ย 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
ย 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
ย 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
ย 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
ย 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ย 
Exploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolioExploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolio
ย 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
ย 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
ย 
2008 Trends
2008 Trends2008 Trends
2008 Trends
ย 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
ย 
20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version20150702 - Strategy and Business Value for connected appliances public version
20150702 - Strategy and Business Value for connected appliances public version
ย 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
ย 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
ย 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
ย 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
ย 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
ย 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
ย 

More from Michel de Goede

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A
Michel de Goede
ย 
Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and ev
Michel de Goede
ย 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber security
Michel de Goede
ย 
Cloudifying Alliander
Cloudifying AllianderCloudifying Alliander
Cloudifying Alliander
Michel de Goede
ย 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
Michel de Goede
ย 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!
Michel de Goede
ย 
The Connected Utility
The Connected UtilityThe Connected Utility
The Connected Utility
Michel de Goede
ย 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
Michel de Goede
ย 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?
Michel de Goede
ย 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timeline
Michel de Goede
ย 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurship
Michel de Goede
ย 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
Michel de Goede
ย 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
Michel de Goede
ย 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learned
Michel de Goede
ย 
Database Technologies
Database TechnologiesDatabase Technologies
Database Technologies
Michel de Goede
ย 
IT: make or break the deal
IT: make or break the dealIT: make or break the deal
IT: make or break the deal
Michel de Goede
ย 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energy
Michel de Goede
ย 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
Michel de Goede
ย 
The connected utility
The connected utilityThe connected utility
The connected utility
Michel de Goede
ย 

More from Michel de Goede (19)

5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A5 dirt easy patterns for value delivery with IT in M&A
5 dirt easy patterns for value delivery with IT in M&A
ย 
Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and ev
ย 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber security
ย 
Cloudifying Alliander
Cloudifying AllianderCloudifying Alliander
Cloudifying Alliander
ย 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
ย 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!
ย 
The Connected Utility
The Connected UtilityThe Connected Utility
The Connected Utility
ย 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
ย 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?
ย 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timeline
ย 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurship
ย 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
ย 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
ย 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learned
ย 
Database Technologies
Database TechnologiesDatabase Technologies
Database Technologies
ย 
IT: make or break the deal
IT: make or break the dealIT: make or break the deal
IT: make or break the deal
ย 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energy
ย 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
ย 
The connected utility
The connected utilityThe connected utility
The connected utility
ย 

Mobile: the up and downside of risk

  • 1. Mobile: The up and downside of risk โ€œOpportunities multiply as they are seized.โ€ Sun Tzu Alliander IT CIO Office Michel de Goede
  • 3. 1. Introduction โ€œEuropean electricity consumers have the right to enjoy universal service that is the right to be supplied with electricity of a specified quality โ€ฆ at reasonable, easily and clearly comparable and transparent prices.โ€
  • 4. 1. Introduction โ€ข Electric Vehicles โ€ข Two way traffic โ€ข Smart metering and home automation โ€ข Smart city initiatives โ€ข Smart grid
  • 5. 3. Innovation: sixth Schumpeter / Kondratiev wave of innovation
  • 6. 3. Innovation: The semantic wave?
  • 7. Predictions are as follows: Source: Sogeti VINT
  • 8. 3. Innovation: And then there is also..... Source: Sogeti VINT
  • 9. 3. Innovation: Biohackables (implanted bio chip) Source: Motherboard
  • 10. 3. Innovation: Biohackables (Dean Kamenโ€™s Luke Arm) Source: Wired
  • 12. 3. Innovation: Biohackables (hearing colour) Source PSFK
  • 13. 3. Innovation: Augmentables (Motorola wearable computer) Source Motorola
  • 15. 3. Innovation: Enchantables (Glow Caps) Source: Glow Caps
  • 16. 3. Innovation: Swallowables (colonoscopy camera pill) Source: PSFK
  • 17. 3. Innovation: Wearables (navigation jacket) Source: Wearable Experiments
  • 18. 3. Innovation: Wearables (Google & Motorolaโ€™s lie detector tattoo) Source: PSFK
  • 19. 3. Innovation: Surroundables (Nissan Nismo Watch) Source: Nissan
  • 21. Business Processes 4. Security: So here is your Internet of Everything!!! Virtual World Personal Devices Home AutomationOperational Technology IT Connected Organizations Crime
  • 22. 4. Security: Gartner 2020 planning assumptions โ€ข 80% of digital access will be shaped by new mobile and non-PC architectures, up from 5% today. โ€ข 60% of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace, up from <10% today. โ€ข over 80% of enterprises will allow unrestricted access to non-critical assets, up from <5% today, reducing spending on IAM by 25%. โ€ข 70% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today. โ€ข identity analytics and intelligence (IAI) tools will deliver direct business value* in 60% of enterprises, up from <5% today. โ€ข the Internet of Things will redefine the concept of "identity management" to include what people own, share, and use. Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)
  • 23. 5. Four measures to master mobile developments 1. Separate systems of engagement from systems of record and specify interacions on the interface level (both protocol and file/data format). Choose standards. 2. Orchestrate over an increasing number of business partners, devices, protocols and formats 3. Be resilient to all types of risk in the automated landscape under your responsibility 4. Carefully choose your anti lock-in strategy Speed up!
  • 24. 5. Four measures to master mobile developments - Separate systems of engagement from systems of record Internet (open) Access Management (access layer) Representation (presentation layer) Authorization Management (application layer) Application 1 Application n May I enter the house? What goods and services am I allowed to use in these rooms? Any device Offices (closed) For which rooms do you give me the key(s)? What goods and services am I allowed to use in these rooms? Protocol and data- format decoupling such as: Citrix, HTML 5, JSON, XML, Sybase SUP and so on Application 2 Application 3 Leverage cloud
  • 25. ยฉ Wim Bouman, Alliander IT Needs semantics 5. Four measures to master mobile developments - Orchestrate Compliance starts here
  • 26. โ€ข Counter the โ€˜wave of appliancesโ€™ and lock-in wars with open source orchestration โ€ข Use standardization to minimize the number of supported protocols and file formats as much as possible โ€ข Keep risk acceptable 5. Four measures to master mobile developments - Choose your anti lock-in strategy
  • 27. Resilience can be obtained by moving away from typical barrier enhancement risk-measures. Consider the following options: โ€ข Ignore, the ostrich โ€˜see-no-evil-hear-no-evilโ€™ tactic; โ€ข Accept, the potential impact of some risks may be deemed acceptable to your organization; โ€ข Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking app; โ€ข Transfer, use insurance or subcontracting to transfer potential consequences of risk; โ€ข Avoid , not entering the type of business that may incur potential risk impact deemed too high; โ€ข Exploit, risk is also an opportunity and high risk investments may yield high returns. 5. Four measures to master mobile developments - Be resilient
  • 28. The beauty of it all? โ€ข Seize the opportunities of Mobile โ€ข Minimize downside risk
  • 29. Alliander IT CIO Office Michel de Goede Thank you!