SlideShare a Scribd company logo
Cloud Adoption –
Journey of IT Service Management
CIO San Francisco Summit
Dec 4, 2013
Caroline Hsieh
Cloud Adoption – How to Get There
Governance structure

Architecture strategies to identify cloud
capabilities to enable business
Selection criteria to determine
preferred cloud vendors

Risk-management process

Service management process for cloud
computing following the ITIL model

Executive
Endorsement
Why Cloud Governance?
Opportunity

 Business Growth
Threat
 Cost Savings
 Minimize vendor proliferation
 Security Risks
 Speed
 Reduce Corporate Risk
 Service Management
 Consistently Secure Data

Cloud Governance
Reap the benefits of cloud while….
 Minimize vendor proliferation
 Reduce Corporate Risk
 Consistently Secure Data

Quickly and Safely
Cloud Governance Structure
Forming a Cloud Governance Body

To enable business to rapidly adopt cloud
solutions while minimizing data security risks
with cloud vendors






Define cloud strategies and maintain cloud capabilities
Establish selection criteria to minimize proliferation of vendors
Perform risk assessment on data and cloud vendors
Educate business users on how to handle data in the cloud
Enforce data security and privacy policies






Enterprise Architecture
IT Operations
Vendor Management
Purchasing






Information Security
Corporate Compliance
Legal
Business Representatives

Cloud Governance Committee is a continuous working body to define
and maintain cloud usage policies and standards.
Architecture Strategy and Cloud Capabilities
Step 1 - Identify business demand across company
SaaS
Sales

IaaS

• Opportunity
Management
• Quoting
• Live Chat
• Account Mgmt.

• Sales Compensation
• Content
Management
• Partner Relationship
Management

Marketing

• Social Marketing
• Campaign
Management
• Live Chat

Tech Support

• Content
Management
• Live Chat

Education &
Training

• Virtual Classroom
• Live Chat

• Knowledge Base
• Compliance
Education

Professional
Services

• Project Accounting
• Online Collaboration

• Service Resource
Planning

HR

• Human Resource
Management
• Applicant Tracking

• Talent Management
• Payroll

Legal

• Contract
Management

• Online Collaboration

• Dev./QA Lab
• Storage
• Database

Marketing

• Microsite Hosting

• Content
Management
• Customer Survey
• Lead Management
• Online Collaboration

• Case Management
• Knowledge Base
• Account Mgmt.

Engineering

PaaS
Engineering

• Dev./QA Lab
• Database
• Integrated
Development
Environment

 Moderate usage of
cloud
 Heavy usage of cloud
Architecture Strategy and Cloud Capabilities
Step 2 – Select Preferred Cloud Vendors


Identify selection criteria
 Cost

 Support

 Talent acquisition

 Integration

 Web services, APIs
 Single sign on

 Data replication
 UI customization

 Support mobile devices
 Multi-factor auth.

 3rd party certification
 Data loss prevention

 Data retention policy
 Access management

 Data encryption
 Data segregation

 SLA (uptime & support)
 Monitoring

 Vendor viability
 Billing

 Redundancy/DR
 Incident notification

 Data privacy

 Indemnification

 eDiscovery

 Architecture
 Security

 Operation
 Legal



Create vendor checklists to incorporate the identified criteria



Select vendor based on functionality fit and adherence to the criteria
Architecture Strategy and Cloud Capabilities
Step 3 – Map business demand to vendor capabilities
Examples
Account Management

Pipeline Management
Lead Management
Performance
Management
Talent Management

Virtual Machine

Preferred CRM
SaaS Vendor

Storage
Web Hosting
Database

Preferred HRMS
SaaS Vendor

Development Platform

Preferred PaaS
Vendor

Workforce
Management
Campaign
Management
Event Management
Lead Generation
Content Management

Online Collaboration

Preferred IaaS
Vendor

Preferred
Marketing
Automation
SaaS Vendor
Preferred
Content
Management
SaaS Vendor

Leverage preferred vendors to






Minimize vendor proliferations
Reduce risk exposure
Consolidate buying power to get best pricing
Negotiate the terms to best protect the
corporation
Standardize technology and skillset required
to support the cloud solutions
Cloud Vendor Risks

What Business and IT are facing today
Data
Access,
Loss &
Privacy
Operations

Legal
Financial

Service
Management

Security
Corporate
Reputation

Vendor
Viability
Data Security and Risk Management


Establish policies for handling data in the cloud



Classify the data based on data sensitivity(*)
Define security control policies for different data classification
Less security control
Public Info







Higher security control
Internal data

Highly confidential data

Educate business community on handling data in the cloud
Obtain business and IT executive approval for storing data in the
cloud
Establish standard agreement terms with preferred vendors
Balancing Business Value vs. Risk Level
HIGH

Approve

Assess

Assess

Reject

Business Values
Time to Market
Cost Saving
Operation Efficiency
Customer Experience

LOW

Risk Level
Security
Financial
Legal
Vendor Management

HIGH
Service Management Process
Leveraging ITIL for cloud services

 Follow ITIL framework for
end to end cloud service
management,
 Clarify the role &
responsibilities of
Business, IT, and cloud
providers.
 Ensure governance
process encompass the
entire service
management cycle.
Develop your staff’s skills on cloud service management
Establish Service Management Process

Roles and Responsibilities Example – to be adjusted for SaaS, PaaS, IaaS
Service Strategy

Service Design

Vendor

Service Portfolio
Management

A

Demand
Management
Financial
Management

Service Level
Management

R

A

C

Transition Plan
& Support

CI

A

R

Event
Management

CI

Availability
Management

A

CI

R

Service Asset &
Configuration

I

CI

A

Incident
Management

A

A

RC

Capacity
Management

A

CI

R

Validation and
Testing

R

A

CI

Problem
Management

A

R

A

IT Service
Continuity

A

CI

R

Release and
Deploy

R

A

CI

Request
Fulfillment

A

Information
Security

CI

A

R

Change
Management

CI

CI

A

Access
Management

Supplier
Management

CI

A

Evaluation

R

A

Service
Catalogue

A

CI

Knowledge
Management

I

A

C

Continual Service
Improvement
IT

Business

Vendor

Service
Measurement and
Reporting

CI

CI

A

Continual Service
Improvement

CI

CI

A

Vendor

Business

C

Business

IT

RI

IT

Vendor

Vendor

Business

Business

A

Service Operation

IT

IT
Service Strategy

Service Transition

I

CI

A

CI

A

C

R

Responsible

A

Accountable

C

Consult

I

Inform
Executive Endorsement
Forming a Cloud Executive Council

Chief
Information
Officer

Business
Executive
Sponsors

Cloud Vision
Funding Model
Risk Threshold
Escalation
Chief
Technology
Officer

Chief
Information
Security
Officer

Cloud Executive Council is a steering committee to sponsor cloud
adoption and champion enforcement of policies.
Summary
Balance business benefits vs.
risk level

Establish cloud strategy and
cloud capability

Cloud Adoption
Obtain buy-in from
stakeholders

Incorporate cloud
governance as part of
enterprise architecture and
IT operations processes
Thank you!

Caroline Hsieh
Email: clhsieh@yahoo.com
www.linkedin.com/in/carolinehsieh

CarolineLHsieh

More Related Content

What's hot

How Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainHow Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation Pain
PT Datacomm Diangraha
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
PT Datacomm Diangraha
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
PT Datacomm Diangraha
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013David Linthicum
 
Cloud migration
Cloud migrationCloud migration
Cloud migrationMark Swick
 
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Extentia Information Technology
 
Cloud-Based Service Management
Cloud-Based Service ManagementCloud-Based Service Management
Cloud-Based Service Management
CA Technologies
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud StrategyAmit Gatenyo
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
IT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan IIIT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan IIdabai
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
jerianasmith
 
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saaskavinalli
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
 
Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0
Cloud Standards Customer Council
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
Vaibhav Khanna
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 

What's hot (20)

How Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainHow Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation Pain
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
 
Cloud-Based Service Management
Cloud-Based Service ManagementCloud-Based Service Management
Cloud-Based Service Management
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
IT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan IIIT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan II
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 

Viewers also liked

Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
TeamQuest Corporation
 
Top 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the SearchTop 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the Search
WebLink International
 
C1.3 Business Models in iCargo
C1.3 Business Models in iCargoC1.3 Business Models in iCargo
C1.3 Business Models in iCargo
iCargo Project
 
Cloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to AdoptionCloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to Adoption
Open Data Center Alliance
 
DevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft AzureDevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft Azure
gjuljo
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
accenture
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business model
David Skok
 
Benchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS CompaniesBenchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS Companies
Tomasz Tunguz
 

Viewers also liked (9)

Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
 
Top 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the SearchTop 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the Search
 
C1.3 Business Models in iCargo
C1.3 Business Models in iCargoC1.3 Business Models in iCargo
C1.3 Business Models in iCargo
 
Cloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to AdoptionCloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to Adoption
 
Steps to Payroll Software Selection
Steps to Payroll Software SelectionSteps to Payroll Software Selection
Steps to Payroll Software Selection
 
DevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft AzureDevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft Azure
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business model
 
Benchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS CompaniesBenchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS Companies
 

Similar to Cloud Adoption - Journey of IT Service Management

Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Adrian Hall
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
BSM for Cloud Computing
BSM for Cloud ComputingBSM for Cloud Computing
BSM for Cloud ComputingBMC Software
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...EuroCloud
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
BabatundeAbioye2
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
amanyosama21
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_finalLA_IBM_Cloud_Event
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Managed it services
Managed it servicesManaged it services
Managed it services
Gss America
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
Gss America
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptx
Steven Quach
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
Cloud Standards Customer Council
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
Joo Manthar
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
Rolf Frydenberg
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
CA Nimsoft
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 

Similar to Cloud Adoption - Journey of IT Service Management (20)

Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
BSM for Cloud Computing
BSM for Cloud ComputingBSM for Cloud Computing
BSM for Cloud Computing
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptx
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Mitigating Cloud Risks
Mitigating Cloud RisksMitigating Cloud Risks
Mitigating Cloud Risks
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Cloud Adoption - Journey of IT Service Management

  • 1. Cloud Adoption – Journey of IT Service Management CIO San Francisco Summit Dec 4, 2013 Caroline Hsieh
  • 2. Cloud Adoption – How to Get There Governance structure Architecture strategies to identify cloud capabilities to enable business Selection criteria to determine preferred cloud vendors Risk-management process Service management process for cloud computing following the ITIL model Executive Endorsement
  • 3. Why Cloud Governance? Opportunity  Business Growth Threat  Cost Savings  Minimize vendor proliferation  Security Risks  Speed  Reduce Corporate Risk  Service Management  Consistently Secure Data Cloud Governance Reap the benefits of cloud while….  Minimize vendor proliferation  Reduce Corporate Risk  Consistently Secure Data Quickly and Safely
  • 4. Cloud Governance Structure Forming a Cloud Governance Body To enable business to rapidly adopt cloud solutions while minimizing data security risks with cloud vendors      Define cloud strategies and maintain cloud capabilities Establish selection criteria to minimize proliferation of vendors Perform risk assessment on data and cloud vendors Educate business users on how to handle data in the cloud Enforce data security and privacy policies     Enterprise Architecture IT Operations Vendor Management Purchasing     Information Security Corporate Compliance Legal Business Representatives Cloud Governance Committee is a continuous working body to define and maintain cloud usage policies and standards.
  • 5. Architecture Strategy and Cloud Capabilities Step 1 - Identify business demand across company SaaS Sales IaaS • Opportunity Management • Quoting • Live Chat • Account Mgmt. • Sales Compensation • Content Management • Partner Relationship Management Marketing • Social Marketing • Campaign Management • Live Chat Tech Support • Content Management • Live Chat Education & Training • Virtual Classroom • Live Chat • Knowledge Base • Compliance Education Professional Services • Project Accounting • Online Collaboration • Service Resource Planning HR • Human Resource Management • Applicant Tracking • Talent Management • Payroll Legal • Contract Management • Online Collaboration • Dev./QA Lab • Storage • Database Marketing • Microsite Hosting • Content Management • Customer Survey • Lead Management • Online Collaboration • Case Management • Knowledge Base • Account Mgmt. Engineering PaaS Engineering • Dev./QA Lab • Database • Integrated Development Environment  Moderate usage of cloud  Heavy usage of cloud
  • 6. Architecture Strategy and Cloud Capabilities Step 2 – Select Preferred Cloud Vendors  Identify selection criteria  Cost  Support  Talent acquisition  Integration  Web services, APIs  Single sign on  Data replication  UI customization  Support mobile devices  Multi-factor auth.  3rd party certification  Data loss prevention  Data retention policy  Access management  Data encryption  Data segregation  SLA (uptime & support)  Monitoring  Vendor viability  Billing  Redundancy/DR  Incident notification  Data privacy  Indemnification  eDiscovery  Architecture  Security  Operation  Legal  Create vendor checklists to incorporate the identified criteria  Select vendor based on functionality fit and adherence to the criteria
  • 7. Architecture Strategy and Cloud Capabilities Step 3 – Map business demand to vendor capabilities Examples Account Management Pipeline Management Lead Management Performance Management Talent Management Virtual Machine Preferred CRM SaaS Vendor Storage Web Hosting Database Preferred HRMS SaaS Vendor Development Platform Preferred PaaS Vendor Workforce Management Campaign Management Event Management Lead Generation Content Management Online Collaboration Preferred IaaS Vendor Preferred Marketing Automation SaaS Vendor Preferred Content Management SaaS Vendor Leverage preferred vendors to      Minimize vendor proliferations Reduce risk exposure Consolidate buying power to get best pricing Negotiate the terms to best protect the corporation Standardize technology and skillset required to support the cloud solutions
  • 8. Cloud Vendor Risks What Business and IT are facing today Data Access, Loss & Privacy Operations Legal Financial Service Management Security Corporate Reputation Vendor Viability
  • 9. Data Security and Risk Management  Establish policies for handling data in the cloud   Classify the data based on data sensitivity(*) Define security control policies for different data classification Less security control Public Info    Higher security control Internal data Highly confidential data Educate business community on handling data in the cloud Obtain business and IT executive approval for storing data in the cloud Establish standard agreement terms with preferred vendors
  • 10. Balancing Business Value vs. Risk Level HIGH Approve Assess Assess Reject Business Values Time to Market Cost Saving Operation Efficiency Customer Experience LOW Risk Level Security Financial Legal Vendor Management HIGH
  • 11. Service Management Process Leveraging ITIL for cloud services  Follow ITIL framework for end to end cloud service management,  Clarify the role & responsibilities of Business, IT, and cloud providers.  Ensure governance process encompass the entire service management cycle. Develop your staff’s skills on cloud service management
  • 12. Establish Service Management Process Roles and Responsibilities Example – to be adjusted for SaaS, PaaS, IaaS Service Strategy Service Design Vendor Service Portfolio Management A Demand Management Financial Management Service Level Management R A C Transition Plan & Support CI A R Event Management CI Availability Management A CI R Service Asset & Configuration I CI A Incident Management A A RC Capacity Management A CI R Validation and Testing R A CI Problem Management A R A IT Service Continuity A CI R Release and Deploy R A CI Request Fulfillment A Information Security CI A R Change Management CI CI A Access Management Supplier Management CI A Evaluation R A Service Catalogue A CI Knowledge Management I A C Continual Service Improvement IT Business Vendor Service Measurement and Reporting CI CI A Continual Service Improvement CI CI A Vendor Business C Business IT RI IT Vendor Vendor Business Business A Service Operation IT IT Service Strategy Service Transition I CI A CI A C R Responsible A Accountable C Consult I Inform
  • 13. Executive Endorsement Forming a Cloud Executive Council Chief Information Officer Business Executive Sponsors Cloud Vision Funding Model Risk Threshold Escalation Chief Technology Officer Chief Information Security Officer Cloud Executive Council is a steering committee to sponsor cloud adoption and champion enforcement of policies.
  • 14. Summary Balance business benefits vs. risk level Establish cloud strategy and cloud capability Cloud Adoption Obtain buy-in from stakeholders Incorporate cloud governance as part of enterprise architecture and IT operations processes
  • 15. Thank you! Caroline Hsieh Email: clhsieh@yahoo.com www.linkedin.com/in/carolinehsieh CarolineLHsieh