SlideShare a Scribd company logo
Embrace Shadow IT 
September 2014 
Chris Haddad 
@cobiacomm 
http://blog.cobia.net/cobiacomm
Embrace Shadow IT 
• Why Teams Lean Towards Shadow Activity 
• Trends Impacting IT Budget and Centralized 
Enterprise IT Authority 
• The Enterprise IT Delivery Gap 
• Building a Common Team Mindset
Who is Shadow IT? 
Image Source: : http://www.apriso.com/blog/wp-content/uploads/2012/08/Shadow_IT_continued.jpg/
Who is Shadow IT? 
YOU - Just Follow Human Nature 
EGO OWNERSHIP 
FREEDOM 
Image Source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/85/Aromatase_3EQM.png/1280px-Aromatase_3EQM.png
FREEDOM 
Shadow IT Teams value the freedom to 
• Create 
• Innovate 
• Set Development Pace and Scope 
• Choose Cost Structure
OWNERSHIP 
Manage and operate at your own pace under your 
own control. Shadow IT teams value: 
• Fast, iterative schedules 
• Low Cost Structure 
• Minimizing delivery hurdles 
– Easy to build and spin up a business solution
EGO: 
I know what I know. 
I am what I am. 
What I know is good enough 
to deliver business value. 
• Skills and Expertise 
• Best Practices 
• New 
– Tools 
– Patterns 
– Processes
Shadow IT Team View 
By operating independently, Shadow IT teams gain: 
• Immediate access to needed resources 
• Rapid, creative experimentation without red tape 
hurdles 
• An ability to tailor solution towards specific business 
requirements
Driving Shadow IT Growth 
Externalize, Consumerize, Democratize (ECD) Trend 
• Externalize 
– Capabilities sourced from outside your 
enterprise 
– Restrict to non-core business functions 
• Consumerize 
– Bring Your Own (BYO*) trend 
– Employees and partners expect a usable 
and rich user experience 
• Democratize 
– Everyone can perform task or acquire 
capability 
– Adoption hurdles removed
Driving Shadow IT Growth 
Externalize, Consumerize, and Democratize (ECD) Trend 
• Externalize (Cloud services) 
– Infrastructure: Amazon AWS 
– Dev Platform: WSO2 Cloud 
– Software: SalesForce.com 
• Consumerize (BYO*) 
– Smartphones: iPhone 
– File Sharing: DropBox, Flickr 
– Contact Lists: LinkedIn 
• Democratize (Lower cost/expertise) 
– Point and click development 
– Virtualization, containers
Are you delivering 
what business teams want? 
80% of executives today can name a critical piece of information 
they need but that IT is unable to provide 
• Source: http://www.informationweek.com/it-leadership/gartner-2013-tech-spending-to-hit-$37-trillion/d/d-id/1106985 
80% of the respondents said they used SaaS applications that 
had not been approved by IT 
• Source: http://www.computerworld.com/article/2598551/malware-vulnerabilities/shadow-cloud-services-pose-a-growing-risk- 
to-enterprises.html
Can you meet business team 
delivery date?
Shadow Solutions 
are within reach! 
Common Operating Principle: 
Beg for Forgiveness, 
Don’t Ask For Permission 
Source: http://upload.wikimedia.org/wikipedia/commons/thumb/2/26/Gingerbread_Cookies_1.jpg/1076px-Gingerbread_Cookies_1.jpg
Shadow IT Teams are Well-Funded 
14 
(and autonomous) 
35% of enterprise IT expenditures will happen 
outside of the corporate IT budget in 2015. 
37% of respondents say the rate of outside 
spending is on the rise, up from 22% last year. 
21% of CIOs retain full spending authority
Shadow IT Team Reality 
• Shadow IT project funding is outside Enterprise IT oversight. 
• Shadow IT infrastructure selection is outside Enterprise IT 
oversight. 
• Shadow IT team resource pool has limited interaction and 
collaboration with Enterprise IT. 
• Cloud services (IaaS, PaaS, SaaS) provide compelling and 
useful solutions for Shadow IT with few adoption barriers
The Enterprise IT – Shadow IT battle 
16 
Dev Teams 
Biz Users 
IT 
I have a solution, but can’t deploy 
I need a quick solution 
for problem ‘x’ 
Not compliant with the 
policies 
I can fund and provide 
hosting. 
?..#@$% 
CIO CFO 
♬♪ 
1 
2 
3 
4
Shadow IT Dangers 
• Security holes 
• Non-compliance with corporate policies 
• Poor Quality of Service (QoS) 
• Hidden costs (management, monitoring, security, agility)
Enterprise IT Exists To 
Protect Against IT Danger 
• Deliver exceptional quality of 
service at scale 
• Enforce corporate security policies 
• Control cost 
• Reduce IT management burden 
• Apply team resource pool, skills, 
infrastructure, and tools across 
multiple IT projects
Enterprise IT Challenges 
when working with Shadow 
IT teams 
• Architecture 
• Development Lifecycle Processes 
• Governance 
• Tooling
Enterprise IT Goals 
• Embrace Shadow IT by making the right 
thing to do the easy thing to do for 
Shadow IT. 
• Find common ground between Shadow 
IT goals and Enterprise IT goals 
• Bridge the divide between Enterprise IT 
compliance and Shadow IT 
experimentation
Enterprise IT Mandate 
• Address barriers preventing Shadow IT 
from adopting Enterprise IT standards 
• Extend Enterprise IT solution reach 
across heterogeneous Shadow IT teams 
• Merge Enterprise IT policy with Shadow 
IT development and run-time 
environments
Enterprise IT Roadmap 
1. Building easy to adopt Enterprise APIs [e.g. 
master data, business processes, identity] 
2. Extend your identity management model to 
embrace Shadow IT development agencies and 
Software as a Service identity repositories 
3. Add software development lifecycle processes, 
governance, and security models that are 
Shadow IT friendly 
4. Offer a DevOps PaaS enabling Shadow IT 
development. 
5. Offer approved Software as a Service, APIs, and 
applications via an Enterprise App Store
Building Block Evaluation 
Criteria 
• Provides On-demand Development Team Self-service 
• Fosters Team Collaboration 
• Adapts to multiple Governance Models 
• Conforms with Flexible Cost Models and Fiscal 
controls 
• Presents Project Visibility, Policy Compliance 
Dashboards, and Audit Trails 
• Establishes Enterprise Management and 
Monitoring across heterogeneous environments 
and infrastructure 
• Federates Identity and Access Control across 
multiple identity, attribute, and policy 
information points (PIP) 
• Promotes Re-use
Embrace Shadow IT 
• Understanding the Shadow IT mindset 
• Bridge the divide 
• Accelerate solution development 
• Empower every team to build in an enterprise-safe 
manner.

More Related Content

What's hot

Malware forensic
Malware forensicMalware forensic
Malware forensic
SumeraHangi
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
Dr. Prashant Vats
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
cyber security
cyber security cyber security
cyber security
sumitbajpeyee
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Phishing
PhishingPhishing
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Nist.sp.800 61r2
Nist.sp.800 61r2Nist.sp.800 61r2
Nist.sp.800 61r2
Jesús Yustas Romo
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Microsoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - AtidanMicrosoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - Atidan
David J Rosenthal
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
Lesha Bhansali
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 

What's hot (20)

Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
cyber security
cyber security cyber security
cyber security
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Phishing
PhishingPhishing
Phishing
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Nist.sp.800 61r2
Nist.sp.800 61r2Nist.sp.800 61r2
Nist.sp.800 61r2
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Microsoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - AtidanMicrosoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - Atidan
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 

Viewers also liked

Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise Architecture
Chris Haddad
 
Good To Geat Nasscom Fridays 2.0 36th Session
Good To Geat Nasscom Fridays 2.0 36th SessionGood To Geat Nasscom Fridays 2.0 36th Session
Good To Geat Nasscom Fridays 2.0 36th Session
OMcareers Community
 
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
OMcareers Community
 
Russia-EU PCA perspectives
Russia-EU PCA perspectivesRussia-EU PCA perspectives
Russia-EU PCA perspectives
Ivan Grigoriev
 
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
Tom Veeger
 
Promote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API ReachPromote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API Reach
Chris Haddad
 
Tabatha Lencioni
Tabatha LencioniTabatha Lencioni
Tabatha Lencioniguest83ef1
 
Inversitgating Socio-Technical Experiences of Disability in New Media
Inversitgating Socio-Technical Experiences of Disability in New MediaInversitgating Socio-Technical Experiences of Disability in New Media
Inversitgating Socio-Technical Experiences of Disability in New Media
Sarah Lewthwaite
 
Architecture portfolio tom veeger
Architecture portfolio tom veegerArchitecture portfolio tom veeger
Architecture portfolio tom veeger
Tom Veeger
 
Web 2.0 presentation
Web 2.0  presentationWeb 2.0  presentation
Web 2.0 presentationc2charro
 
Funnypic (1)
Funnypic (1)Funnypic (1)
Funnypic (1)rovuks
 
Curso tic
Curso ticCurso tic
Curso tic
Jhonny Díaz
 
Design thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and EmpathizeDesign thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and Empathize
Kameswaran Subbaraman
 
Wealthcare Case Study
Wealthcare Case StudyWealthcare Case Study
Wealthcare Case Study
Russ Thornton
 
Technogeeks Final Presentation
Technogeeks Final PresentationTechnogeeks Final Presentation
Technogeeks Final Presentation
technogeeks
 
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - FisicaStatistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
Paolo Valente
 
Sedlcarter
SedlcarterSedlcarter
Sedlcarterhdahedo
 
FELIZ VIDA 2009
FELIZ VIDA 2009FELIZ VIDA 2009
FELIZ VIDA 2009
Maje
 
Snips and snails and puppy dog tails: the need to preserve complexity in math...
Snips and snails and puppy dog tails: the need to preserve complexity in math...Snips and snails and puppy dog tails: the need to preserve complexity in math...
Snips and snails and puppy dog tails: the need to preserve complexity in math...
Universidade de Lisboa
 

Viewers also liked (20)

Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise Architecture
 
Good To Geat Nasscom Fridays 2.0 36th Session
Good To Geat Nasscom Fridays 2.0 36th SessionGood To Geat Nasscom Fridays 2.0 36th Session
Good To Geat Nasscom Fridays 2.0 36th Session
 
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
How Startups And Emerging Companies Can Benefit From Social Web And Enterpris...
 
Russia-EU PCA perspectives
Russia-EU PCA perspectivesRussia-EU PCA perspectives
Russia-EU PCA perspectives
 
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
Route 55 voorstel voor Masterplan voor Zwolle kunstroute station-centrum atel...
 
Promote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API ReachPromote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API Reach
 
Tabatha Lencioni
Tabatha LencioniTabatha Lencioni
Tabatha Lencioni
 
Inversitgating Socio-Technical Experiences of Disability in New Media
Inversitgating Socio-Technical Experiences of Disability in New MediaInversitgating Socio-Technical Experiences of Disability in New Media
Inversitgating Socio-Technical Experiences of Disability in New Media
 
Architecture portfolio tom veeger
Architecture portfolio tom veegerArchitecture portfolio tom veeger
Architecture portfolio tom veeger
 
Web 2.0 presentation
Web 2.0  presentationWeb 2.0  presentation
Web 2.0 presentation
 
Funnypic (1)
Funnypic (1)Funnypic (1)
Funnypic (1)
 
Curso tic
Curso ticCurso tic
Curso tic
 
Design thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and EmpathizeDesign thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and Empathize
 
Wealthcare Case Study
Wealthcare Case StudyWealthcare Case Study
Wealthcare Case Study
 
Technogeeks Final Presentation
Technogeeks Final PresentationTechnogeeks Final Presentation
Technogeeks Final Presentation
 
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - FisicaStatistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
Statistiche sull’abilitazione scientifica nazionale 2012 per l’Area 02 - Fisica
 
Miguel
MiguelMiguel
Miguel
 
Sedlcarter
SedlcarterSedlcarter
Sedlcarter
 
FELIZ VIDA 2009
FELIZ VIDA 2009FELIZ VIDA 2009
FELIZ VIDA 2009
 
Snips and snails and puppy dog tails: the need to preserve complexity in math...
Snips and snails and puppy dog tails: the need to preserve complexity in math...Snips and snails and puppy dog tails: the need to preserve complexity in math...
Snips and snails and puppy dog tails: the need to preserve complexity in math...
 

Similar to Shadow IT Risk and Reward

SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
Evan Hodges
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators
 
B2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWSB2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWS
Amazon Web Services
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CloudIDSummit
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
ITpreneurs
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
Perficient, Inc.
 
An AI Maturity Roadmap for Becoming a Data-Driven Organization
An AI Maturity Roadmap for Becoming a Data-Driven OrganizationAn AI Maturity Roadmap for Becoming a Data-Driven Organization
An AI Maturity Roadmap for Becoming a Data-Driven Organization
David Solomon
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Concept Searching, Inc
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
Amazon Web Services
 
The Cloud and You - the 'as a service' disruption you can't ignore
The Cloud and You - the 'as a service' disruption you can't ignoreThe Cloud and You - the 'as a service' disruption you can't ignore
The Cloud and You - the 'as a service' disruption you can't ignore
John Head
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu DuttAWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
Amazon Web Services Korea
 
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptxWeek 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
Dibyesh1
 
Acs conference sep 2015 - Information Professionals
Acs conference sep 2015 - Information ProfessionalsAcs conference sep 2015 - Information Professionals
Acs conference sep 2015 - Information Professionals
Informpros
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weather
todd.lewis
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
AIIM International
 
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
Zia Consulting
 
Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
Denny Muktar
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
asyma
 

Similar to Shadow IT Risk and Reward (20)

SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
B2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWSB2 - Integrating on-premises workloads with AWS
B2 - Integrating on-premises workloads with AWS
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
An AI Maturity Roadmap for Becoming a Data-Driven Organization
An AI Maturity Roadmap for Becoming a Data-Driven OrganizationAn AI Maturity Roadmap for Becoming a Data-Driven Organization
An AI Maturity Roadmap for Becoming a Data-Driven Organization
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
The Cloud and You - the 'as a service' disruption you can't ignore
The Cloud and You - the 'as a service' disruption you can't ignoreThe Cloud and You - the 'as a service' disruption you can't ignore
The Cloud and You - the 'as a service' disruption you can't ignore
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu DuttAWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
 
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptxWeek 5 Building Digital Capabilites in Workforce and Organization.pptx
Week 5 Building Digital Capabilites in Workforce and Organization.pptx
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Acs conference sep 2015 - Information Professionals
Acs conference sep 2015 - Information ProfessionalsAcs conference sep 2015 - Information Professionals
Acs conference sep 2015 - Information Professionals
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weather
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
 
Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
 

More from Chris Haddad

High Productivity Platform
High Productivity PlatformHigh Productivity Platform
High Productivity Platform
Chris Haddad
 
Lightweight ESB Alternatives
Lightweight ESB AlternativesLightweight ESB Alternatives
Lightweight ESB Alternatives
Chris Haddad
 
Eight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware SystemsEight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware Systems
Chris Haddad
 
Cloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesCloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral Zones
Chris Haddad
 
Steampunk App Servers in
Steampunk App Servers in Steampunk App Servers in
Steampunk App Servers in
Chris Haddad
 
Bring N-Tier Apps to containers 2015 ContainerCon
Bring N-Tier Apps to containers  2015 ContainerConBring N-Tier Apps to containers  2015 ContainerCon
Bring N-Tier Apps to containers 2015 ContainerCon
Chris Haddad
 
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software DeliveryOvercome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Chris Haddad
 
Who is Accessing My API?
Who is Accessing My API?Who is Accessing My API?
Who is Accessing My API?
Chris Haddad
 
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache StratosDeploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Chris Haddad
 
Merging microservices architecture with SOA practices
Merging microservices architecture with SOA practicesMerging microservices architecture with SOA practices
Merging microservices architecture with SOA practices
Chris Haddad
 
Connected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected WorldConnected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected World
Chris Haddad
 
Java PaaS Apache Stratos
Java PaaS   Apache StratosJava PaaS   Apache Stratos
Java PaaS Apache Stratos
Chris Haddad
 
Spreadsheets To API
Spreadsheets To APISpreadsheets To API
Spreadsheets To APIChris Haddad
 
Six Steps To Build A Successful API
Six Steps To Build A Successful APISix Steps To Build A Successful API
Six Steps To Build A Successful API
Chris Haddad
 
Gaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaSGaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaS
Chris Haddad
 
Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...
Chris Haddad
 
Business driven IT design
Business driven IT designBusiness driven IT design
Business driven IT designChris Haddad
 
SOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and TacticsSOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and Tactics
Chris Haddad
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected BusinessChris Haddad
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Chris Haddad
 

More from Chris Haddad (20)

High Productivity Platform
High Productivity PlatformHigh Productivity Platform
High Productivity Platform
 
Lightweight ESB Alternatives
Lightweight ESB AlternativesLightweight ESB Alternatives
Lightweight ESB Alternatives
 
Eight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware SystemsEight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware Systems
 
Cloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesCloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral Zones
 
Steampunk App Servers in
Steampunk App Servers in Steampunk App Servers in
Steampunk App Servers in
 
Bring N-Tier Apps to containers 2015 ContainerCon
Bring N-Tier Apps to containers  2015 ContainerConBring N-Tier Apps to containers  2015 ContainerCon
Bring N-Tier Apps to containers 2015 ContainerCon
 
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software DeliveryOvercome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
 
Who is Accessing My API?
Who is Accessing My API?Who is Accessing My API?
Who is Accessing My API?
 
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache StratosDeploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache Stratos
 
Merging microservices architecture with SOA practices
Merging microservices architecture with SOA practicesMerging microservices architecture with SOA practices
Merging microservices architecture with SOA practices
 
Connected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected WorldConnected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected World
 
Java PaaS Apache Stratos
Java PaaS   Apache StratosJava PaaS   Apache Stratos
Java PaaS Apache Stratos
 
Spreadsheets To API
Spreadsheets To APISpreadsheets To API
Spreadsheets To API
 
Six Steps To Build A Successful API
Six Steps To Build A Successful APISix Steps To Build A Successful API
Six Steps To Build A Successful API
 
Gaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaSGaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaS
 
Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...
 
Business driven IT design
Business driven IT designBusiness driven IT design
Business driven IT design
 
SOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and TacticsSOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and Tactics
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected Business
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...
 

Recently uploaded

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 

Recently uploaded (20)

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 

Shadow IT Risk and Reward

  • 1. Embrace Shadow IT September 2014 Chris Haddad @cobiacomm http://blog.cobia.net/cobiacomm
  • 2. Embrace Shadow IT • Why Teams Lean Towards Shadow Activity • Trends Impacting IT Budget and Centralized Enterprise IT Authority • The Enterprise IT Delivery Gap • Building a Common Team Mindset
  • 3. Who is Shadow IT? Image Source: : http://www.apriso.com/blog/wp-content/uploads/2012/08/Shadow_IT_continued.jpg/
  • 4. Who is Shadow IT? YOU - Just Follow Human Nature EGO OWNERSHIP FREEDOM Image Source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/85/Aromatase_3EQM.png/1280px-Aromatase_3EQM.png
  • 5. FREEDOM Shadow IT Teams value the freedom to • Create • Innovate • Set Development Pace and Scope • Choose Cost Structure
  • 6. OWNERSHIP Manage and operate at your own pace under your own control. Shadow IT teams value: • Fast, iterative schedules • Low Cost Structure • Minimizing delivery hurdles – Easy to build and spin up a business solution
  • 7. EGO: I know what I know. I am what I am. What I know is good enough to deliver business value. • Skills and Expertise • Best Practices • New – Tools – Patterns – Processes
  • 8. Shadow IT Team View By operating independently, Shadow IT teams gain: • Immediate access to needed resources • Rapid, creative experimentation without red tape hurdles • An ability to tailor solution towards specific business requirements
  • 9. Driving Shadow IT Growth Externalize, Consumerize, Democratize (ECD) Trend • Externalize – Capabilities sourced from outside your enterprise – Restrict to non-core business functions • Consumerize – Bring Your Own (BYO*) trend – Employees and partners expect a usable and rich user experience • Democratize – Everyone can perform task or acquire capability – Adoption hurdles removed
  • 10. Driving Shadow IT Growth Externalize, Consumerize, and Democratize (ECD) Trend • Externalize (Cloud services) – Infrastructure: Amazon AWS – Dev Platform: WSO2 Cloud – Software: SalesForce.com • Consumerize (BYO*) – Smartphones: iPhone – File Sharing: DropBox, Flickr – Contact Lists: LinkedIn • Democratize (Lower cost/expertise) – Point and click development – Virtualization, containers
  • 11. Are you delivering what business teams want? 80% of executives today can name a critical piece of information they need but that IT is unable to provide • Source: http://www.informationweek.com/it-leadership/gartner-2013-tech-spending-to-hit-$37-trillion/d/d-id/1106985 80% of the respondents said they used SaaS applications that had not been approved by IT • Source: http://www.computerworld.com/article/2598551/malware-vulnerabilities/shadow-cloud-services-pose-a-growing-risk- to-enterprises.html
  • 12. Can you meet business team delivery date?
  • 13. Shadow Solutions are within reach! Common Operating Principle: Beg for Forgiveness, Don’t Ask For Permission Source: http://upload.wikimedia.org/wikipedia/commons/thumb/2/26/Gingerbread_Cookies_1.jpg/1076px-Gingerbread_Cookies_1.jpg
  • 14. Shadow IT Teams are Well-Funded 14 (and autonomous) 35% of enterprise IT expenditures will happen outside of the corporate IT budget in 2015. 37% of respondents say the rate of outside spending is on the rise, up from 22% last year. 21% of CIOs retain full spending authority
  • 15. Shadow IT Team Reality • Shadow IT project funding is outside Enterprise IT oversight. • Shadow IT infrastructure selection is outside Enterprise IT oversight. • Shadow IT team resource pool has limited interaction and collaboration with Enterprise IT. • Cloud services (IaaS, PaaS, SaaS) provide compelling and useful solutions for Shadow IT with few adoption barriers
  • 16. The Enterprise IT – Shadow IT battle 16 Dev Teams Biz Users IT I have a solution, but can’t deploy I need a quick solution for problem ‘x’ Not compliant with the policies I can fund and provide hosting. ?..#@$% CIO CFO ♬♪ 1 2 3 4
  • 17. Shadow IT Dangers • Security holes • Non-compliance with corporate policies • Poor Quality of Service (QoS) • Hidden costs (management, monitoring, security, agility)
  • 18. Enterprise IT Exists To Protect Against IT Danger • Deliver exceptional quality of service at scale • Enforce corporate security policies • Control cost • Reduce IT management burden • Apply team resource pool, skills, infrastructure, and tools across multiple IT projects
  • 19. Enterprise IT Challenges when working with Shadow IT teams • Architecture • Development Lifecycle Processes • Governance • Tooling
  • 20. Enterprise IT Goals • Embrace Shadow IT by making the right thing to do the easy thing to do for Shadow IT. • Find common ground between Shadow IT goals and Enterprise IT goals • Bridge the divide between Enterprise IT compliance and Shadow IT experimentation
  • 21. Enterprise IT Mandate • Address barriers preventing Shadow IT from adopting Enterprise IT standards • Extend Enterprise IT solution reach across heterogeneous Shadow IT teams • Merge Enterprise IT policy with Shadow IT development and run-time environments
  • 22. Enterprise IT Roadmap 1. Building easy to adopt Enterprise APIs [e.g. master data, business processes, identity] 2. Extend your identity management model to embrace Shadow IT development agencies and Software as a Service identity repositories 3. Add software development lifecycle processes, governance, and security models that are Shadow IT friendly 4. Offer a DevOps PaaS enabling Shadow IT development. 5. Offer approved Software as a Service, APIs, and applications via an Enterprise App Store
  • 23. Building Block Evaluation Criteria • Provides On-demand Development Team Self-service • Fosters Team Collaboration • Adapts to multiple Governance Models • Conforms with Flexible Cost Models and Fiscal controls • Presents Project Visibility, Policy Compliance Dashboards, and Audit Trails • Establishes Enterprise Management and Monitoring across heterogeneous environments and infrastructure • Federates Identity and Access Control across multiple identity, attribute, and policy information points (PIP) • Promotes Re-use
  • 24. Embrace Shadow IT • Understanding the Shadow IT mindset • Bridge the divide • Accelerate solution development • Empower every team to build in an enterprise-safe manner.

Editor's Notes

  1. Shadow IT (also called rogue IT) brings risk and reward to IT business solution development. Because ECD (externalization, consumerization, and democratization) trends are driving significant Shadow IT project growth, Enterprise IT teams must adapt and address Shadow IT requirements, autonomy, and goals. By understanding the Shadow IT mindset and bridging the divide between the two groups, Enterprise IT teams can embrace Shadow IT as a beneficial solution development partner. In this presentation, learn: Why Teams Lean Towards Shadow Activity Trends Impacting IT Budget and Centralized Enterprise IT Authority The Enterprise IT Delivery Gap Steps to Build a Common Team Mindset
  2. Who is Shadow IT? Any team building or deploying mobile, API, micro-service, analytics, data, or applications using non-sanctioned enterprise tools, languages, infrastructure or environments. Image Source: : http://www.apriso.com/blog/wp-content/uploads/2012/08/Shadow_IT_continued.jpg/
  3. Shadow IT is you (even if you are in enterprise IT). Human nature dictates that we all desire freedom, ownership, and satisfying our ego. We all desire to color outside the lines. Image Source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/85/Aromatase_3EQM.png/1280px-Aromatase_3EQM.png
  4. Human nature craves freedom. IT teams desire the freedom to Create Innovate Set Development Pace and Scope Choose Cost Structure
  5. Shadow IT teams desire to manage and operate at their own pace under their own control. Shadow IT teams value: Fast, iterative schedules Low Cost Structure Minimizing delivery hurdles Easy to build and spin up a business solution
  6. Another major hurdle to adopting enterprise IT solutions, teams may not have the skills and best practice knowledge to use new tools, patterns, and processes. Enterprise IT must lower the adoption hurdle. Source: http://rap.genius.com/Xeezy-x-man-lyrics#note-1312310
  7. By operating independently, Shadow IT teams gain: Immediate access to needed resources Rapid, creative experimentation without red tape hurdles An ability to tailor solution towards specific business requirements
  8. For the last decade, IT has been trending towards the ECD pattern. IT capabilities and services are being Externalized, Consumerized, and Democratized. The ECD trend is driving and accelerating Shadow IT growth. Externalize Capabilities sourced from outside your enterprise Restrict to non-core business functions Consumerize Bring Your Own (BYO*) trend Employees and partners expect a usable and rich user experience Democratize Everyone can perform task or acquire capability Adoption hurdles removed
  9. Enterprise IT Mandate: Embrace Shadow IT by making the right thing to do the easy thing to do for Shadow IT. Find common ground between Shadow IT goals and Enterprise IT goals Bridge the divide between Enterprise IT compliance and Shadow IT experimentation
  10. An enterprise roadmap: Address barriers preventing Shadow IT from adopting Enterprise IT standards Extend Enterprise IT solution reach across heterogeneous Shadow IT teams Merge Enterprise IT policy with Shadow IT development and run-time environments
  11. Enterprise IT teams can follow a five-step roadmap empowering Shadow IT teams with pre-built, building blocks and solution accelerator packs. Focus on externalizing enterprise infrastructure as building block services and offering a self-service environment that provides useful solution accelerators. A five-step roadmap should include: Building easy to adopt Enterprise APIs [e.g. master data, business processes, identity] Extend your identity management model to embrace Shadow IT development agencies and Software as a Service identity repositories Add software development lifecycle processes, governance, and security models that are Shadow IT friendly Offer a DevOps PaaS enabling Shadow IT development. Offer approved Software as a Service, APIs, and applications via an Enterprise App Store
  12. By ensuring building blocks address Shadow IT autonomy, freedom, ownership, and ego, Enterprise IT can encourage adoption of approved infrastructure, frameworks, and environments. Before presenting a building block to a Shadow IT team, carefully evaluate it against the following evaluation criteria: Provides On-demand Development Team Self-service Fosters Team Collaboration Adapts to multiple Governance Models Conforms with Flexible Cost Models and Fiscal controls Presents Project Visibility, Policy Compliance Dashboards, and Audit Trails Establishes Enterprise Management and Monitoring across heterogeneous environments and infrastructure Federates Identity and Access Control across multiple identity, attribute, and policy information points (PIP) Promotes Re-use
  13. understanding the Shadow IT mindset, you can bridge the divide, accelerate solution development, and empower every team to build in an enterprise-safe manner.