SlideShare a Scribd company logo
From Brainstorm
to Build
How leading law firm, MinterEllison,
built a highly secure client data
platform in AWS
‘We help aspiring
businesses, and their
people, win by using the
Cloud brilliantly’
Our Purpose
One of the Asia Pacific's leading law firms.
Operates with around 2000 staff in Australia, Hong Kong, mainland China, Mongolia, New
Zealand and the United Kingdom
$42 Bill Market Cap
50,000 Instances running in AWS
7 Billion Hours of Video per Quarter
$11 Billion Valuation
Migrated to AWS when only 12 staff
400 Terabytes of Data in AWS
Raised $1.5 Billion Funding round
Migrated to AWS in 2009
Serviced 25 million Guests Globally
‘In the future the ability to
screen, analyse and interpret
unprecedented volumes of data
will become just as critical to law
firms’ success as the ‘art’ of
delivering legal advice is now’
Technology is changing Law
Agile
Platform
Data
Growth
Platform that must support the changing needs of the Industry and Firm.
Amazon Web Services provides this platform.
Recognition of the need to Transform
Need for immediate secure storage of client data for processing. This is
required on-demand with little notice.
Increase in Industry-wide volume of data
Business
Analytics
Access to a platform that will support current and emerging trends in the
Legal Industry, increasing speed whilst lowering processing costs.
Trends in Analytics, Big Data and Machine Learning
From Brainstorm to Build
How leading law firm, MinterEllison, built a highly secure
client data platform in AWS – Data Solutions Group
––
Gary Adler, Chief Information Officer
Paul Harmat, Enterprise Architect
––
April 2017
How to overcome
barriers & obstacles
9
How to overcome barriers & obstacles
10
Step
3
Step
4
Step
5
Step
1
Step
2
WHY HOW EXECUTION WHAT’S NEXT
Cloud is ambiguous:
 Define its meaning very specifically for your organisation
 Remove the noise, focus on the ‘actual’ not the ‘anecdotal’
11
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
4
Step
5
Step
1
Step
2
Step
2
Work out real
risks versus
perceived risks
Perceived
 It’s unsecure
 Clients may leave you
 Performance, reliability issues
 Its an alternative option
Real
 Data sovereignty /
jurisdictional issues
 Data retrieval
 Security layer
 Client engagement letters
 Initial complexity
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
4
Step
5
Step
1
Construct
mitigations
for real risks
13
Mitigation
1. Ensure contractually, private data is not
permitted to leave Australia
2. Understand process before committing
3. Data fully encrypted end-to-end & hold keys
4. Review approach with GC & Tech Lawyers
5. Use of expert integrators, actively upskill IT
staff
Risk
1. Data sovereignty /
jurisdictional issues
2. Data retrieval
3. Security layer
4. Engagement letters
5. Initial complexity
WHY HOW EXECUTION WHAT’S NEXT
Step
2
Step
4
Step
5
Step
1
Step
3
Step
4
Step
3
1. GC/CRO – risk, liability
2. Executive – clients/customers, revenue, strategy
impact
3. IT – major paradigm shift especially for
infrastructure team
4. The other 200 bosses – what does it all mean?
14
Work out key
stakeholders and
their individual
interests
WHY HOW EXECUTION WHAT’S NEXT
Step
2
Step
5
Step
1
15
Start small
 It is indeed a very complex space – don’t go it alone!
 Find a safe and containerised first use case with both client and
business benefits (but keep an eye on the broader strategy to
avoid long term silos)
 Patience, commitment and acceptance of failure along the way
WHY HOW EXECUTION WHAT’S NEXT
Step
3
Step
2
Step
4
Step
1
Step
5
Step
4
What did we
execute?
16
MinterEllison Client Data: Problem and Challenges
Challenges
 On-premise infrastructure capacity
 Expense to support peak compute and storage
 Data back-up and protection requirements
 Operational isolation of state-based eDiscovery teams
 Risk, process and compliance
 3rd parties, matter life cycle and archiving
 Operational impact
 Legality and security in terms of technology and client protection
WHY HOW EXECUTION WHAT’S NEXT
Problem statement
Continued growth
of client data in legal
dispute resolution
places increasing
pressure on the ability
for IT to support the
eDiscovery team
Overview of solution
 Deployment of a secure and segregated AWS
infrastructure foundational layer
 Elasticity of storage and compute to resolve on premise
constraints
 Resiliency of backup and recovery of large amounts of
critical client data
 Deployment of security layers to protect and mitigate risk
for the organisation
 Citrix desktop and application virtualisation
 Operationally close to data
 Simplification of AWS complexity for end users through a
custom data transfer application
Deployed AWS Resources
WHY HOW EXECUTION WHAT’S NEXT
Integration with forensics suppliers and legal 3rd parties
SOLUTION
Execution through VPC peering, KMS
and S3 buckets for data sharing
 Utilise AWS native infrastructure and benefits
across AWS accounts with 3rd parties
 Encrypted and secured at rest and in transit
 Time reduced from days to minutes leveraging
AWS’ high speed network
 Remove the reliance on physical media
 No data double-handling
 Citrix ShareFile for ad-hoc sharing
 Deepen relationships with 3rd party vendors in
our AWS cloud journey
WHY HOW EXECUTION WHAT’S NEXT
Dedicated AWS Data Transfer Application Part 1 of 2
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
A custom AWS Data Transfer
Application that empowers our
eDiscovery teams
 Enables end users to operate AWS CLI
commands through a GUI to share data
 Operational unification of MinterEllison state-
based eDiscovery teams
 Encapsulates the encryption/decryption
of client data to 3rd party vendors
 Leverages the high capacity AWS network
 Alleviates eDiscovery team’s administrative
overhead in management of data
Dedicated AWS Data Transfer Application Part 2 of 2
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
The custom AWS Data Transfer
Application under the hood
 Web Application deployed on an
EC2 CentOS 7 instance
 Utilisation of python (boto3) API calls
to S3Transfer.Upload and
S3Transfer.Download
 Application interfacing across AWS EC2,
S3, SES, KMS and DynamoDB
Security in the Public Cloud
WHY HOW EXECUTION WHAT’S NEXT
SOLUTION
Blending AWS Security best practices
with MinterEllison’s requirements and
security policies
 Security through an AWS
infrastructure foundation
 A security design that is scalable,
auditable and has levels of redundancy
 Network Security
 Auditing
 Roles
What’s next?
23
The Journey Ahead
24
Strap yourself in for a long ride – 3 year transition
Internal
Test and development
environments
On prem to SaaS
Exchange, enterprise
collaboration tools
On prem to IaaS
Enterprise content
management systems,
Practice management systems
WHY HOW EXECUTION WHAT’S NEXT
Thank-you and
Questions…
Thank you!

More Related Content

What's hot

4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
DrRajapraveenkN
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
movinghats
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
jaredcarst
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
RapidScale
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the Enterprise
RapidScale
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Veritas Technologies LLC
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
University of San Francisco
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
vidhya dharmarajan
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
Mphasis
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?
HTS Hosting
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
PhD Services
 
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop VirtualizationTop Use Cases for Desktop Virtualization
Top Use Cases for Desktop Virtualization
Citrix
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
ragibhasan
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 

What's hot (18)

4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the Enterprise
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud security
Cloud security Cloud security
Cloud security
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop VirtualizationTop Use Cases for Desktop Virtualization
Top Use Cases for Desktop Virtualization
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 

Similar to From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions

Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
GSTF
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
gbroadbent67
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
RH
 
Future Commerce 2019
Future Commerce 2019 Future Commerce 2019
Future Commerce 2019
PT Datacomm Diangraha
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
Vaultastic
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
sampleid978
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
Vucci Technology Solutions
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
infosec train
 
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
Mithun T. Dhar
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud Today
GovCloud Network
 
The Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWSThe Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWS
Amazon Web Services
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
Connor Russo
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
Vincent Kwon
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Hira Zahan
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 

Similar to From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions (20)

Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Future Commerce 2019
Future Commerce 2019 Future Commerce 2019
Future Commerce 2019
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
SeattleUniv-IntroductionToCloudComputing-WinsowsAzure101
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud Today
 
The Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWSThe Carlyle Group Modernizes File Services with CTERA and AWS
The Carlyle Group Modernizes File Services with CTERA and AWS
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
B1802041217
B1802041217B1802041217
B1802041217
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 

Recently uploaded (20)

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 

From Brainstorm to Build: How leading law firm, Minter Ellison, built a highly secure client data platform in AWS – Data Solutions

  • 1. From Brainstorm to Build How leading law firm, MinterEllison, built a highly secure client data platform in AWS
  • 2. ‘We help aspiring businesses, and their people, win by using the Cloud brilliantly’ Our Purpose
  • 3. One of the Asia Pacific's leading law firms. Operates with around 2000 staff in Australia, Hong Kong, mainland China, Mongolia, New Zealand and the United Kingdom
  • 4. $42 Bill Market Cap 50,000 Instances running in AWS 7 Billion Hours of Video per Quarter $11 Billion Valuation Migrated to AWS when only 12 staff 400 Terabytes of Data in AWS Raised $1.5 Billion Funding round Migrated to AWS in 2009 Serviced 25 million Guests Globally
  • 5. ‘In the future the ability to screen, analyse and interpret unprecedented volumes of data will become just as critical to law firms’ success as the ‘art’ of delivering legal advice is now’ Technology is changing Law
  • 6. Agile Platform Data Growth Platform that must support the changing needs of the Industry and Firm. Amazon Web Services provides this platform. Recognition of the need to Transform Need for immediate secure storage of client data for processing. This is required on-demand with little notice. Increase in Industry-wide volume of data Business Analytics Access to a platform that will support current and emerging trends in the Legal Industry, increasing speed whilst lowering processing costs. Trends in Analytics, Big Data and Machine Learning
  • 7. From Brainstorm to Build How leading law firm, MinterEllison, built a highly secure client data platform in AWS – Data Solutions Group –– Gary Adler, Chief Information Officer Paul Harmat, Enterprise Architect –– April 2017
  • 8. How to overcome barriers & obstacles 9
  • 9. How to overcome barriers & obstacles 10 Step 3 Step 4 Step 5 Step 1 Step 2 WHY HOW EXECUTION WHAT’S NEXT
  • 10. Cloud is ambiguous:  Define its meaning very specifically for your organisation  Remove the noise, focus on the ‘actual’ not the ‘anecdotal’ 11 WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 4 Step 5 Step 1 Step 2
  • 11. Step 2 Work out real risks versus perceived risks Perceived  It’s unsecure  Clients may leave you  Performance, reliability issues  Its an alternative option Real  Data sovereignty / jurisdictional issues  Data retrieval  Security layer  Client engagement letters  Initial complexity WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 4 Step 5 Step 1
  • 12. Construct mitigations for real risks 13 Mitigation 1. Ensure contractually, private data is not permitted to leave Australia 2. Understand process before committing 3. Data fully encrypted end-to-end & hold keys 4. Review approach with GC & Tech Lawyers 5. Use of expert integrators, actively upskill IT staff Risk 1. Data sovereignty / jurisdictional issues 2. Data retrieval 3. Security layer 4. Engagement letters 5. Initial complexity WHY HOW EXECUTION WHAT’S NEXT Step 2 Step 4 Step 5 Step 1 Step 3
  • 13. Step 4 Step 3 1. GC/CRO – risk, liability 2. Executive – clients/customers, revenue, strategy impact 3. IT – major paradigm shift especially for infrastructure team 4. The other 200 bosses – what does it all mean? 14 Work out key stakeholders and their individual interests WHY HOW EXECUTION WHAT’S NEXT Step 2 Step 5 Step 1
  • 14. 15 Start small  It is indeed a very complex space – don’t go it alone!  Find a safe and containerised first use case with both client and business benefits (but keep an eye on the broader strategy to avoid long term silos)  Patience, commitment and acceptance of failure along the way WHY HOW EXECUTION WHAT’S NEXT Step 3 Step 2 Step 4 Step 1 Step 5 Step 4
  • 16. MinterEllison Client Data: Problem and Challenges Challenges  On-premise infrastructure capacity  Expense to support peak compute and storage  Data back-up and protection requirements  Operational isolation of state-based eDiscovery teams  Risk, process and compliance  3rd parties, matter life cycle and archiving  Operational impact  Legality and security in terms of technology and client protection WHY HOW EXECUTION WHAT’S NEXT Problem statement Continued growth of client data in legal dispute resolution places increasing pressure on the ability for IT to support the eDiscovery team
  • 17. Overview of solution  Deployment of a secure and segregated AWS infrastructure foundational layer  Elasticity of storage and compute to resolve on premise constraints  Resiliency of backup and recovery of large amounts of critical client data  Deployment of security layers to protect and mitigate risk for the organisation  Citrix desktop and application virtualisation  Operationally close to data  Simplification of AWS complexity for end users through a custom data transfer application Deployed AWS Resources WHY HOW EXECUTION WHAT’S NEXT
  • 18. Integration with forensics suppliers and legal 3rd parties SOLUTION Execution through VPC peering, KMS and S3 buckets for data sharing  Utilise AWS native infrastructure and benefits across AWS accounts with 3rd parties  Encrypted and secured at rest and in transit  Time reduced from days to minutes leveraging AWS’ high speed network  Remove the reliance on physical media  No data double-handling  Citrix ShareFile for ad-hoc sharing  Deepen relationships with 3rd party vendors in our AWS cloud journey WHY HOW EXECUTION WHAT’S NEXT
  • 19. Dedicated AWS Data Transfer Application Part 1 of 2 WHY HOW EXECUTION WHAT’S NEXT SOLUTION A custom AWS Data Transfer Application that empowers our eDiscovery teams  Enables end users to operate AWS CLI commands through a GUI to share data  Operational unification of MinterEllison state- based eDiscovery teams  Encapsulates the encryption/decryption of client data to 3rd party vendors  Leverages the high capacity AWS network  Alleviates eDiscovery team’s administrative overhead in management of data
  • 20. Dedicated AWS Data Transfer Application Part 2 of 2 WHY HOW EXECUTION WHAT’S NEXT SOLUTION The custom AWS Data Transfer Application under the hood  Web Application deployed on an EC2 CentOS 7 instance  Utilisation of python (boto3) API calls to S3Transfer.Upload and S3Transfer.Download  Application interfacing across AWS EC2, S3, SES, KMS and DynamoDB
  • 21. Security in the Public Cloud WHY HOW EXECUTION WHAT’S NEXT SOLUTION Blending AWS Security best practices with MinterEllison’s requirements and security policies  Security through an AWS infrastructure foundation  A security design that is scalable, auditable and has levels of redundancy  Network Security  Auditing  Roles
  • 23. The Journey Ahead 24 Strap yourself in for a long ride – 3 year transition Internal Test and development environments On prem to SaaS Exchange, enterprise collaboration tools On prem to IaaS Enterprise content management systems, Practice management systems WHY HOW EXECUTION WHAT’S NEXT