SlideShare a Scribd company logo
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
Four Important Trends in Information
Technology and their Impact on
Organizational Security and Privacy
Dr. Curtis A. Carver Jr.
Vice Chancellor and Chief Information Officer
University System of Georgia
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• Shortage of IT personnel
• Clouds and Economies of Scale
• Consumerization of IT
• Data, Big Data, Location-based computing and
Data-Driven Decision-Making
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• Less folks + less qualified folks = more work.
• More salary will be necessary to attract folks.
• Internal salary inequities will be difficult to
manage.
• You may need to take more risk in hiring
employees (skillset, turnover, non-dedicated
resources, etc.).
Implications
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
Advantages of
Statewide Network
• Economies of Scale
• Proactive Growth
• Campus Agility
• Traffic Prioritization
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• Clouds and Economies of Scale
– Market pressures are driving consolidation and
moving IT services to private or public clouds.
– Economy of scale pricing example: the cost of 35
colleges and universities HR contract is much less
than the cost of two R1 institutions (Georgia
Health Sciences University and Georgia Tech)
combined.
– Library consortiums are the same.
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
HR
•Shared
Services
•32/35
centralized
•Outsourced to
ADP
Fin
•GeorgiaFIRST
•32/35 at ITS
•34/35
PeopleSoft
LMS
•GeorgiaVIEW
•31/35 at ITS
soon to be
34/35
•34/35 BlB/D2L
SIS
•GeorgiaBEST
•8/35 at ITS
•34/35 Banner
•520 GA Mods
BI
•USG123
•Being rebuilt
•35/35 at ITS
•Not fully
utilized
NET
•PeachNet
•35/35 at ITS
•Extensive
external state
participation
LIB
•GALILEO & GIL
•35/35
centralized
• Extensive
external
participation
State Ed Ecosystem
USG Educational
Cloud
Race to the
Top
Public
Cloud
Public
Cloud State Ed Ecosystem
State Educational Cloud
Now
Soon
Longer
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
Implications
• Integration and protection of corporate data is
going to be difficult.
• All the eggs in one basket requires a really safe
and secure basket.
• Some standardization (lack of control) is
required.
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
Consumerization of IT
– Bring Your Own Device will change
campus culture, security, and instructional
delivery
– Managed/Unmanaged Applications
– Private/Work Split
– Who Owns the data?
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• How much loss of control is acceptable?
• Protection of the data
• Change Management of Personnel
• Complexity is about to increase (need endpoint
management and federated identity
management)
Implications
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• Data….
• Big Data…..
• Location-based Big Data…..
• Big Data Driven Decision Making…..
“On the Internet, the First Amendment is
a local ordinance,” said Fred H. Cate, a
law professor at Indiana University.
What are folks saying about your
organization on Facebook?
What are doing about what they
are saying?
Do you even know?
Need decisions now
Requires a report
Report requires a collection
Collection requires months
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
• Unknown: We don’t need no stink’in data
governance.
• Jack Burton: It is all in the reflexes.
• Steve Wright: I don’t want to own everything.
I would not know where to put it.
Implications
GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
Questions, Comments,
A Conversation
Dr. Curtis A. Carver Jr.
Vice Chancellor and Chief Information Officer
University System of Georgia

More Related Content

Similar to Four important trends in it and security implications

Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
Curtis A. Carver Jr.
 
System level innovation
System level innovationSystem level innovation
System level innovation
Curtis A. Carver Jr.
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
Curtis A. Carver Jr.
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Jean-Michel Franco
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
Curtis A. Carver Jr.
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
Castlebridge Associates
 
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
European Data Forum
 
2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight
Vanessa Pulgarín Auquilla
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Sravan Ankaraju
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
joellemurphey
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
AMD Developer Central
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
Omar Khawaja
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
SolarWinds
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
Symantec
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
Precisely
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 

Similar to Four important trends in it and security implications (20)

Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
 
System level innovation
System level innovationSystem level innovation
System level innovation
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
 
2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight2. Getvisibility. Innovative data governance, control & oversight
2. Getvisibility. Innovative data governance, control & oversight
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 

More from Curtis A. Carver Jr.

Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
Curtis A. Carver Jr.
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
Curtis A. Carver Jr.
 
Threat assessment new normal
Threat assessment new normalThreat assessment new normal
Threat assessment new normal
Curtis A. Carver Jr.
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
Curtis A. Carver Jr.
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
Curtis A. Carver Jr.
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
Curtis A. Carver Jr.
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
Curtis A. Carver Jr.
 
Deploying and utilizing statewide private cloud lessons learned
Deploying and utilizing statewide private cloud   lessons learnedDeploying and utilizing statewide private cloud   lessons learned
Deploying and utilizing statewide private cloud lessons learned
Curtis A. Carver Jr.
 
Emerging world order
Emerging world orderEmerging world order
Emerging world order
Curtis A. Carver Jr.
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
Curtis A. Carver Jr.
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Curtis A. Carver Jr.
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
Curtis A. Carver Jr.
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
Curtis A. Carver Jr.
 
Galileo at a Crossroads
Galileo at a CrossroadsGalileo at a Crossroads
Galileo at a Crossroads
Curtis A. Carver Jr.
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday
Curtis A. Carver Jr.
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to action
Curtis A. Carver Jr.
 
Is Technology Leading the Change?
Is Technology Leading the Change?Is Technology Leading the Change?
Is Technology Leading the Change?
Curtis A. Carver Jr.
 
AIIM 2013 conference curt_carver
AIIM 2013 conference curt_carverAIIM 2013 conference curt_carver
AIIM 2013 conference curt_carver
Curtis A. Carver Jr.
 

More from Curtis A. Carver Jr. (19)

100 day letter
100 day letter100 day letter
100 day letter
 
Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
 
Threat assessment new normal
Threat assessment new normalThreat assessment new normal
Threat assessment new normal
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
Deploying and utilizing statewide private cloud lessons learned
Deploying and utilizing statewide private cloud   lessons learnedDeploying and utilizing statewide private cloud   lessons learned
Deploying and utilizing statewide private cloud lessons learned
 
Emerging world order
Emerging world orderEmerging world order
Emerging world order
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
 
Galileo at a Crossroads
Galileo at a CrossroadsGalileo at a Crossroads
Galileo at a Crossroads
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to action
 
Is Technology Leading the Change?
Is Technology Leading the Change?Is Technology Leading the Change?
Is Technology Leading the Change?
 
AIIM 2013 conference curt_carver
AIIM 2013 conference curt_carverAIIM 2013 conference curt_carver
AIIM 2013 conference curt_carver
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Four important trends in it and security implications

  • 1. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Four Important Trends in Information Technology and their Impact on Organizational Security and Privacy Dr. Curtis A. Carver Jr. Vice Chancellor and Chief Information Officer University System of Georgia
  • 2.
  • 3. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • Shortage of IT personnel • Clouds and Economies of Scale • Consumerization of IT • Data, Big Data, Location-based computing and Data-Driven Decision-Making
  • 4. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123
  • 5. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • Less folks + less qualified folks = more work. • More salary will be necessary to attract folks. • Internal salary inequities will be difficult to manage. • You may need to take more risk in hiring employees (skillset, turnover, non-dedicated resources, etc.). Implications
  • 6. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Advantages of Statewide Network • Economies of Scale • Proactive Growth • Campus Agility • Traffic Prioritization
  • 7. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • Clouds and Economies of Scale – Market pressures are driving consolidation and moving IT services to private or public clouds. – Economy of scale pricing example: the cost of 35 colleges and universities HR contract is much less than the cost of two R1 institutions (Georgia Health Sciences University and Georgia Tech) combined. – Library consortiums are the same.
  • 8. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 HR •Shared Services •32/35 centralized •Outsourced to ADP Fin •GeorgiaFIRST •32/35 at ITS •34/35 PeopleSoft LMS •GeorgiaVIEW •31/35 at ITS soon to be 34/35 •34/35 BlB/D2L SIS •GeorgiaBEST •8/35 at ITS •34/35 Banner •520 GA Mods BI •USG123 •Being rebuilt •35/35 at ITS •Not fully utilized NET •PeachNet •35/35 at ITS •Extensive external state participation LIB •GALILEO & GIL •35/35 centralized • Extensive external participation State Ed Ecosystem USG Educational Cloud Race to the Top Public Cloud Public Cloud State Ed Ecosystem State Educational Cloud Now Soon Longer
  • 9. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Implications • Integration and protection of corporate data is going to be difficult. • All the eggs in one basket requires a really safe and secure basket. • Some standardization (lack of control) is required.
  • 10. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Consumerization of IT – Bring Your Own Device will change campus culture, security, and instructional delivery – Managed/Unmanaged Applications – Private/Work Split – Who Owns the data?
  • 11. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • How much loss of control is acceptable? • Protection of the data • Change Management of Personnel • Complexity is about to increase (need endpoint management and federated identity management) Implications
  • 12. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • Data…. • Big Data….. • Location-based Big Data….. • Big Data Driven Decision Making….. “On the Internet, the First Amendment is a local ordinance,” said Fred H. Cate, a law professor at Indiana University. What are folks saying about your organization on Facebook? What are doing about what they are saying? Do you even know? Need decisions now Requires a report Report requires a collection Collection requires months
  • 13. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 • Unknown: We don’t need no stink’in data governance. • Jack Burton: It is all in the reflexes. • Steve Wright: I don’t want to own everything. I would not know where to put it. Implications
  • 14. GALILEO GeorgiaBEST GeorgiaFIRST Georgia ONmyLINE GeorgiaVIEW GIL PeachNet USG123 Questions, Comments, A Conversation Dr. Curtis A. Carver Jr. Vice Chancellor and Chief Information Officer University System of Georgia