SlideShare a Scribd company logo
1 of 88
Download to read offline
1
STKI’s IT as a Service
(ITaaS) initiative
For a while" is a
phrase whose
length can't be
measured.At least
by the person
who's waiting.
— Haruki Murakami
STKI’s IT as a Service
(ITaaS) initiative
2
2What is IT as a Service?
IT delivery:
Infrastructure &
Operations as a Service
3
3
IT as a Service Initiative destination
Gaining the adaptive
ability to deliver IT at
the speed of change
Current IT delivery is considered expensive, in-efficient,
rigid, old fashioned and holding back the business
Focused, reliable,
efficient, secure and
responsive IT
operations
ITaaS
4
4
The core of ITaaS has not changed
• Reducing IT costs
• Improving cost transparency
• Streamlining how IT services are
provisioned, governed and managed
• Increasing visibility and control over IT
infrastructure
• Providing speed and scalability
• Increasing ability of strategic innovation
Source: IBM STKI modification
5
5
6
6
So…
What’s different today
than what we did for so many years?
7
We will provide concrete recommendations
8
9
How can ITaaS become focused?
By setting up goals and establish metrics!!
10
10
Trek name:
Define ITaaS goals and metrics / measurements
Set availability
reliability metrics
Set IT support
metrics
Set business agility /
responsiveness metrics
Set cyber security
metrics
Set delivery
efficiency metrics
11
11
Availability, service & efficiency metrics are common
Business responsiveness and cyber metrics are much less common
Don’t stay with a metric
too long
12
12
Define role :"business technology availability"
One part of his role :“handle failures"
Measure availability objectively
with user experience tools
13
13
Another important role: "change & maintenance manager"
14
14
Only "availability minded gatekeeper" can improve ITaaS reliability
The "business technology
availability" person is the "change
& maintenance manager"
15
15
STKI’s DevSecOps measurement manifesto:
sec
ops
dev
Measure productivityquality
Measure cyberMeasure ops
(availability, etc…)
16
16
STKI’s DevSecOps measurement manifesto:
sec
ops
dev
Measure productivityquality along with cyber
Measure cyber
Measure ops along
with cyber
17
17
STKI’s DevSecOps measurement manifesto:
sec
ops
dev
Measure productivityquality along with cyber
& ops
Measure cyber along
with ops & dev
productivity
Measure ops along
with cyber & dev
productivity
18
18
Trek name:
Build new Data Center
Set Open API
Re-build integration platform
Set DC new
principles
Build container
infrastructure
Optimize the
foundation
19
19
http://thessdguy.com/wdc-no-ssdhdd-crossover/?utm_campaign=shareaholic&utm_medium=linkedin&utm_source=socialnetwork
20
20HCI – hyperconverged infrastructure
Source: wikibon
21
21
Hyperscale infrastructure
Based on basic standard HW components setting up specific SW (sometimes
opensource) configuration for large scale computing. Integrator & customer check if this
specific server will work with this specific network HW  opensource network OS,
specific disks work with specific storage file system, etc.
22
22
SD-WAN is an acronym for software-defined networking in a wide area network (WAN)
An SD-WAN simplifies the management and operation of aWAN by decoupling (separating) the
networking hardware from its control mechanism.
… allow companies to build higher-performanceWANs using lower-cost and commercially
available internet access, enabling businesses to partially or wholly replace more expensive private
WAN connection technologies such as MPLS
23
23
Set DC new architecture principles:
o Build new technology lab preferably on cloud
o Software defined based (programmable) technology
o Maximize open source business value
o Strive towards immutable infrastructure (servers)
24
24
In a traditional mutable server infrastructure, servers are continually updated and modified in place.
In immutable infrastructure servers are never modified after they're deployed.
If something needs to be updated, fixed, or modified in any way new servers built with the appropriate
changes are provisioned to replace the old ones.
Immutable infrastructure
Source: digitalocean
Pets vs. Cattle
25
25
Internal integration
ESB
External (specific API)
API gateway
Cloud integration
IPaaSadvanced ESB
External partners
API management
developer portal
Standard content definition
Open API standards
Microservices connectivity
Service Mesh
The evolution of integration patterns
26
26
Will API management replace ESB?
It shouldn't – no oorchestration, no transformation, no
adapters ( tech and content), no messaging, no guarantee
delivery, etc,
Still – green filed organizations (enterprises and startups) are
not using ESB at all
27
27
https://medium.com/microservices-in-practice/service-mesh-for-microservices-
2953109a3c9a
service mesh pattern
28
28
https://medium.com/microservices-in-practice/service-mesh-
for-microservices-2953109a3c9a
service mesh pattern
29
29
Trek name:
ITaaS Operations, organization and processes
Implement Devops
and automation
Redefine sourcing
and finance
Re-organize
ITaaS
Reshape DC
operations
Retire technologies
and contain technical debt
30
30
Redefine sourcing and finance
co-location, outsourcing, cloud
plan transition from capex to opex
non-perpetual procurement
embrace sourced services
Cloud communications platform for
building SMS, Voice & Messaging
applications on an API
31
31
Re-organize ITaaS: new team for new technologydomain
• New dedicated team (for converged, cloud, devops, etc.) , with skills differentiated, into the same
department
System Network
DC
Storage Cloud
Network
Storage
System
Easy but BAD!!
32
32
33
33Re-organize ITaaS: combine old teams for delivering new
technologydomain
System Network DC Storage
Production
faults
Sizing-
architecture
DR
Cloud
Challenging but GOOD!!
34
34
RE-invent Organization
Network of agile teams
35
35
Delivery
Manager
DBMS
Network
DC
System
Network
WAN
SBC
RE-invent Organization: ITaaS
Network of agile teams
36
36
“I have many bosses”
What will managers do?
New organizations challenges
37
37
Refresh
devtest
data Project
budgeting
and
chargeback
Asset
management
Moving
environment
from dev to
test to prod
Change
management Architecture
and sizing of
new apps
NOCITOC
and SOC
procedures –
“run books”
Self service
portal for
developers
DRBCP
Implement Devops and
automation
Reshape DC operations
Size of circle: how different
from current process
38
38
Rack #3, server #10
Power: PDU #17, #23
Storage array #2 , LUN #2 (please define
asynchronies replication to DR array #3, LUN
#2
SQL server ver. 2016 13.0.4001.0 use dbms
image #2
network: add toVLAN #8
FW: open ports….
DBMS: endpoint :examplecluster.abc123xyz789.us-
west-2.redshift.amazonaws.com port:5439
database:dev
Virtual network: Name: myVnet Address space
10.0.0.0/16 Subnet name: Public Subnet address range
10.0.0.0/24
new project architecture (shopping list):
39
39
Implement devops, automation and reshape DC operations and
procedures: service tagging
40
40
Implement devops, automation and reshape DC operations and
procedures
How will change management look in devops?
41
41
The CI/CD (devops) team
Use the existing team that builds/refreshes
test environments as the foundation for
CICD team
Delivery Dev
Devops
Team
42
42
retire old technologies and avoid technical debt
43
43
Trek name:
Zero ticketing
Improve self
service
Introduce bots and
virtual agent
Auto-Detect + notification
to the user for action
needed
Auto-Detect + auto
resolution
Improve system
reliability & self healing
44
44
Wow!!
Don’t need to
look for
specific
solution
Don’t need to
wait
Automation, Self Service and User happiness
☺
 Support by 2nd & 3rd level
Support by 1st level
Self Service : ITSM/Portal/Search
Self Service : (Virtual Assistant -
Chatbot) or by other tools
Auto-Detect + notification to the
user + automated resolution
Auto-Detect &
Auto-Healing
ITSTKI
modifications
Too long, too
many people in
the process
Need to wait
for support
Do we have
support?
45
45User uploads a screenshot
of an error (ocr…)
Known error is matched
with a solution
AyTee suggests a solution
IT
46
46
Auto-Classify
Incidents to
specific product
and ops
categories for
more accurate
analytics
Auto-assign the
incident based on
past assignments
Auto-Route
incidents
Remedy Powered By Cognitive
47
47
Dynamic Automation integrates into existing ITSM tools to automate use
cases on platforms, database, middleware apps, network, and storage
47
Event
Management
System (e.g.
Netcool)
Incident Ticketing
System (e.g. ICD,
ServiceNow,
Remedy)
Integration
Services
IBM Dynamic
Automation
Jump host*
Unix
Intel
Client Devices
Managed
Server #2
Managed
Server #1
Dynamic Automation
“Virtual Engineer”
(System
Administrator)
Escalate to
Human EngineersYes No
Remediate
Diagnose
Virtual engineers behave
very much like a human
system administrator.
Escalate it to a
human system
administrator to
complete the
resolution.
48
48
ITaaS
DC co-location
racks over blades
rack scale architecture
sw packages delivered on
containers
SD-WAN
GPU
Intent based
networking
immutable
infrastructure
(servers)
Open source
NVME storage
49
Market presence / perception
Localsupport
EMC
IBM
Kaminario
NETAPP
HDS
All storage vendors have AFA
offerings
HPE
Vendors to watch:
E8storage (NVME)
Purestorage
All Flash Array (AFA)- Israeli market enterprise presence 1Q118
50
Market presence / perception
Localsupport
50
Nutanix
VMWARE (vsan)
Vendors to watch:
HDS
Netapp
Fujitsu
The leading
brand in the
deal. Other
related brands
(servers,
hypervisor) are
not listed
HPE
DellEMC
CISCO
HCI hyper converged- Israeli market enterprise presence 1Q118
51
Market presence / perception
Localsupport
51
Redhat
IBM
Pivotal
Application Platform as a Service (APaaS) on prem option-
Israeli market enterprise presence 1Q118
52
Market presence / perception
Localsupport
52
Dell EMC
IBM
Veritas
HPE
Commvault
Actifio*
Vendors to watch:
Cloud backup alternatives
VEEAM*
Acrserve *
Rubrick*
* Not really apples to
apples
Enterprise Backup/data protection SW - Israeli
market enterprise presence 1Q118
53
53
Pini’s model for technology selection/forecasting adoption:
2 new technologies
giving the same benefit and cost (effort) the same.
q: which technology should I choose?
a: the technology that has better chances to catch!!
so, how can I forecast technology adoption?
Internet companies-
startups
How many developers (company size) will benefit this now technology?
The smaller number wins!!
54
54
54
Cloud technologies and
processes are part of ITaaS
practice enabling true hybrid
cloud
Focused, reliable, efficient, secure and responsive to business
needs
Zero ticketing
Supporting development
5555
56
STKI’s Cyber
Governance initiative
Life is like riding a
bicycle.To keep
your balance, you
must keep
moving."
— Albert Einstein
STKI’s Cyber
Governance initiative
57
57
It’s well known that so many
companies get hacked
Yet many executives believe it
will not affect them
Even the largest and most
prestigious ones
58
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
5858
Cyber’s Problematic Reputation
“Cyber is holding us back from achieving all other initiatives”
59
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
5959
Cyber governance initiative destination
Striking a balance between
the business needs and cyber,
risk & compliance needsCyber, governance & compliance are crucial for the survival of organizations
But they are also holding organizations back in many ways.
Executives don’t fully comprehend the importance of cyber security and their
personal responsibility.
60
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6060
Cyber Governance Initiative
61
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
61
61
Demonstrate CEO
BOARD their cyber
responsibility
Determine business cyber
main principles
Allocate cyber budget,
head count & org.
structure
Trek name:
Zero trust security: Get top management on board
62
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6262
Source: STKI staffing report
Number of Employees/ Cyber personnel
Implement STKI’s market data &
best practices to receive
appropriate budgets and personnel!
63
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
63
Build risk & cyber multi-
year program
Build cyber resilience
program
Trek name:
Design a Cyber Governance Plan
Design holistic cyber
measurement program
Use “Israel National Cyber
Directorate” guidance and tools
64
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6464
Israel National Cyber Directorate guidance
will boost cyber security in Israel!
Especially for non-regulated enterprises
Non-regulated CISO
I don’t have enough
budget and resources
I can’t explain this to the
CEOBoard
65
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
65
65
66
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
66
66
Organizations that want to participate in the betta program can contact tora@pmo.gov.il
67
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
67
Don’t forget to secure the ENTIRE supply chain!
68
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
68
STKI expects new regulation based on Israel National
Cyber Directorate guidance in several industries
Take a deep breath.We’ve only just started.
69
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6969
Of boards are not trained to
deal with cyber security incidents!
Source: Einat Meyron cyber resilience consultant & The Cyber Security Source - 2017
70
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7070
CEO  board member nightmare:
One Innocent phone call
71
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7171
‫הגנה‬ ‫כלי‬ ‫איזה‬
‫מותקנים‬
‫אצלכם‬?
‫זה‬ ‫איך‬
‫קרה‬?
‫פיצוי‬ ‫יהיה‬
‫ללקוחות‬?
‫תוכלו‬ ‫שלא‬ ‫אומרים‬
‫ימים‬ ‫כמה‬ ‫לעבוד‬
‫יש‬‫תוכנית‬
‫חלופית‬?
‫הכנסתם‬
‫מו‬ ‫מנהל‬"‫מ‬
‫לתמונה‬?
‫אחריות‬
‫מי‬ ‫של‬?
‫לכם‬ ‫פרצו‬ ‫כבר‬
‫בעבר‬?
‫מייעץ‬ ‫מי‬
‫לכם‬?
‫זו‬ ‫אם‬ ‫ידוע‬
‫עבודה‬
‫פנימית‬?
‫את‬ ‫תפסיקו‬
‫המסחר‬
‫במניה‬?
‫רוצה‬ ‫אני‬
‫עם‬ ‫לדבר‬
‫המנכל‬
‫קיבלתם‬
‫איומים‬
‫מקדימים‬?
‫כמה‬
‫דורשים‬?
‫משפיע‬ ‫זה‬ ‫איך‬
‫הלקוחות‬ ‫על‬?
‫כי‬ ‫קרה‬ ‫זה‬
‫חסכתם‬
‫בעלויות‬?
‫כמה‬
‫מחשבים‬
‫נפגעו‬?
‫תעדכנו‬ ‫איך‬
‫אותנו‬?
‫היה‬ ‫איפה‬
‫הכשל‬?
‫המנכל‬ ‫אדוני‬,
‫תתפטר‬?
‫המלצות‬ ‫יישמתם‬
‫רגולטור‬?
‫לאחרונה‬ ‫מתי‬
‫את‬ ‫בדקתם‬
‫המערכות‬?
‫העובדים‬
‫שאין‬ ‫אומרים‬
‫מושג‬ ‫להם‬
‫קורה‬ ‫מה‬
‫תחזרו‬ ‫מתי‬
‫לפעילות‬?
‫איזה‬ ‫לכם‬ ‫ידוע‬
‫נדבקו‬ ‫מעגלים‬
‫בגללכם‬?
‫מידע‬ ‫נגנב‬
‫לקוחות‬ ‫של‬?
‫לא‬ ‫שלכם‬ ‫העובדים‬
‫לענות‬ ‫מה‬ ‫יודעים‬
‫ללקוחות‬
‫קשר‬ ‫יצרתם‬
‫עם‬‫ההאקר‬?
‫מוודאים‬ ‫הלקוחות‬ ‫איך‬
‫נפגעו‬ ‫שלא‬?
‫על‬ ‫משפיע‬ ‫זה‬ ‫איך‬
‫הדו‬"‫הרבעוני‬ ‫ח‬?
‫מיוחד‬ ‫משהו‬ ‫היה‬
‫בדרישה‬?
‫את‬ ‫כבר‬ ‫עדכנתם‬
‫להגנת‬ ‫הרשות‬
‫הסייבר‬?
‫צריכים‬ ‫לקוחות‬
‫תוכנה‬ ‫להתקין‬
‫אצלם‬ ‫חדשה‬?
‫ריגול‬ ‫זה‬
‫עסקי‬?
Source: Einat Meyron cyber resilience consultant
72
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7272
‫המפתח‬ ‫היא‬ ‫שגרה‬ ‫בזמן‬ ‫החלטות‬ ‫קבלת‬
‫המשבר‬ ‫את‬ ‫שינהל‬ ‫הצוות‬ ‫מי‬‫מייד‬‫מדווח‬ ‫כשהוא‬?
‫מתקפה‬ ‫בזמן‬ ‫יעיל‬ ‫לתפקוד‬ ‫הקריטיות‬ ‫השאלות‬ ‫מהן‬?
‫נמוכה‬ ‫סיכון‬ ‫ברמת‬ ‫יסווג‬ ‫ומה‬ ‫דרמה‬ ‫נחשב‬ ‫מה‬?
‫ביטוח‬ ‫פוליסת‬ ‫יש‬ ‫האם‬?‫אומרת‬ ‫היא‬ ‫מה‬?
‫יותר‬ ‫נרחב‬ ‫משפטי‬ ‫יעוץ‬ ‫נדרש‬ ‫האם‬?
‫מוכרים‬ ‫הרלוונטי‬ ‫לרגולטור‬ ‫הדיווח‬ ‫נהלי‬ ‫האם‬?
‫ה‬ ‫עם‬ ‫קשר‬ ‫לביסוס‬ ‫מהלכים‬ ‫נעשו‬ ‫האם‬-CERT‫הלאומי‬?
‫הספקים‬ ‫עם‬ ‫הקשר‬ ‫מנוהל‬ ‫איך‬‫הלקוחות‬‫המניות‬ ‫בעלי‬?
‫הכופר‬ ‫תשלום‬ ‫לאפשרות‬ ‫מתייחס‬ ‫הארגון‬ ‫איך‬?
‫הכופר‬ ‫לתשלום‬ ‫הכסף‬ ‫מגיע‬ ‫מאיפה‬?
Source: Einat Meyron cyber resilience consultant
73
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7373
Leverage the similarities between BCP & Cyber Resilience
BCP
(Business
Continuity Plan)
Cyber
Resilience
And make them work together in collaboration
74
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7474
Trek name:
Adopt to changing regulations
Keep up with existing
regulations
Look as GDPR
becomes standard
Implement Privacy
Protection Regulation
75
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7575
GDPR Hype
GDPR is searched more
than Cyber Security
GDPR
Cyber Security
76
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7676
77
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7777
What does GDPR mean to our business? A lot!
The right to data portability allows individuals to obtain and reuse their
personal data for their own purposes across different services.
It allows them to move, copy or transfer personal data easily from one IT
environment to another in a safe and secure way, without hindrance to usability
78
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
78
It will also change many processes and interaction methods.
Example first engagement with client and his consent to continue with the process:
79
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7979
Consent Management
One of the new tools needed to maintain compliance
80
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8080
Some organizations will have to appoint a DPO under
GDPR law
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-officers/
The first point of contact for supervisory
authorities and for individuals whose data is
processed
Informs and advises the organization and its employees
about their obligations to comply with GDPR and other
data protection laws
Monitors compliance with GDPR and other data
protection laws, including managing internal data
protection activities
Advises on data protection impact assessments
Trains staff and conducts internal audits.
81
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8181
source: konfidas
GDPR and Israeli privacy act are touching the same areas
82
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8282
Eventually, it will come… So be prepared
83
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8383
Trek name:
Cyber Security Operations
Enforce patches
Applying to new devices
(watches, pumps, cars, etc.)
Embrace new technologies and
prepare for new vulnerabilities
Re-adjust cyber security program
Embrace
DevSecOps
Automate Cyber
Operations and Use
AIML
84
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8484
DevSecOps Manifesto:
85
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8585
DevSecOps tools - Embed SDLC (Secure Dev. life cycle) tools
into CICD:
• Static analysis tools
• Dynamic scanning (auto pen. tests)
• Embed operations data (logs, customer inputs) with security inputs
86
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
86
Cyber governance
GDPR, Israel
privacy law:continue
GDPR, Israel
privacy law: start
Blockchain based
identity
DPO - data privacy
officer
Anonymization for cloud
Blockchain based
general tools
(DBMS, etc.)
Cloud security
tools
Cloud tokenization
87
87
87
Balance between business
needs and cyber, risk &
compliance needs
8888

More Related Content

What's hot

Cisco cloud enablement services
Cisco cloud enablement servicesCisco cloud enablement services
Cisco cloud enablement servicesEvgeni Tsonev
 
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...Dana Gardner
 
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...Chad Lawler
 
Time for Converged Infrastructure? Executives Discuss the Operational and Str...
Time for Converged Infrastructure? Executives Discuss the Operational and Str...Time for Converged Infrastructure? Executives Discuss the Operational and Str...
Time for Converged Infrastructure? Executives Discuss the Operational and Str...EMC
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center TransformationArraya Solutions
 
IT service transformation with hybrid cloud: Buy or build?
IT service transformation with hybrid cloud: Buy or build?IT service transformation with hybrid cloud: Buy or build?
IT service transformation with hybrid cloud: Buy or build?Principled Technologies
 
Data Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyData Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyCisco Canada
 
Case Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsCase Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsSURE!
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
The Datacenter Of The Future
The Datacenter Of The FutureThe Datacenter Of The Future
The Datacenter Of The FutureCTRLS
 
Cloud Computing And Citrix C3 - July 2009
Cloud Computing And Citrix C3 - July 2009Cloud Computing And Citrix C3 - July 2009
Cloud Computing And Citrix C3 - July 2009Michael Harries
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionAndreja Pucihar
 
The Journey Toward the Software-Defined Data Center
The Journey Toward the Software-Defined Data CenterThe Journey Toward the Software-Defined Data Center
The Journey Toward the Software-Defined Data CenterCognizant
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 

What's hot (20)

Cisco cloud enablement services
Cisco cloud enablement servicesCisco cloud enablement services
Cisco cloud enablement services
 
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
 
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...
An Executive View on Cloud Service Brokers - Cloud Solutions in a CSB Model C...
 
Time for Converged Infrastructure? Executives Discuss the Operational and Str...
Time for Converged Infrastructure? Executives Discuss the Operational and Str...Time for Converged Infrastructure? Executives Discuss the Operational and Str...
Time for Converged Infrastructure? Executives Discuss the Operational and Str...
 
Software defined data center
Software defined data centerSoftware defined data center
Software defined data center
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center Transformation
 
Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
 
IT service transformation with hybrid cloud: Buy or build?
IT service transformation with hybrid cloud: Buy or build?IT service transformation with hybrid cloud: Buy or build?
IT service transformation with hybrid cloud: Buy or build?
 
Data Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyData Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud Journey
 
Case Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsCase Study of SURE! Unified Communications
Case Study of SURE! Unified Communications
 
WTM Technical Writing example.pdf
WTM Technical Writing example.pdfWTM Technical Writing example.pdf
WTM Technical Writing example.pdf
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
The Datacenter Of The Future
The Datacenter Of The FutureThe Datacenter Of The Future
The Datacenter Of The Future
 
Cloud Computing And Citrix C3 - July 2009
Cloud Computing And Citrix C3 - July 2009Cloud Computing And Citrix C3 - July 2009
Cloud Computing And Citrix C3 - July 2009
 
Microsoft Cloud Computing E-Book
Microsoft Cloud Computing E-BookMicrosoft Cloud Computing E-Book
Microsoft Cloud Computing E-Book
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoption
 
The Journey Toward the Software-Defined Data Center
The Journey Toward the Software-Defined Data CenterThe Journey Toward the Software-Defined Data Center
The Journey Toward the Software-Defined Data Center
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 

Similar to Stkisummi18 i taa_s_cybergov_long_version_v2

Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityRed Hat India Pvt. Ltd.
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld
 
Data to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesData to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesAsanka Abeysinghe
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptxjisogo
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11Dileep Bhandarkar
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfNukala Gopala Krishna Murthy
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterHemraj Singh Chouhan
 
Accelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationAccelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationCognizant
 
Value Team Cloud Computing
Value Team Cloud ComputingValue Team Cloud Computing
Value Team Cloud ComputingGianpiero Meazza
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxadad129366
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 

Similar to Stkisummi18 i taa_s_cybergov_long_version_v2 (20)

STKI Summit 2018 ITaaS Initiative
STKI Summit 2018 ITaaS InitiativeSTKI Summit 2018 ITaaS Initiative
STKI Summit 2018 ITaaS Initiative
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center
 
Data to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilitiesData to Consumer : end to end middleware capabilities
Data to Consumer : end to end middleware capabilities
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
Internship Presentation.pptx
Internship Presentation.pptxInternship Presentation.pptx
Internship Presentation.pptx
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
 
Open Digital Framework from TMFORUM
Open Digital Framework from TMFORUMOpen Digital Framework from TMFORUM
Open Digital Framework from TMFORUM
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal Chapter
 
Accelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationAccelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud Automation
 
Computer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU LectureComputer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU Lecture
 
Value Team Cloud Computing
Value Team Cloud ComputingValue Team Cloud Computing
Value Team Cloud Computing
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptx
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 

More from Pini Cohen

Cto 2021 markets v2
Cto 2021 markets v2Cto 2021 markets v2
Cto 2021 markets v2Pini Cohen
 
Workato integrators corrections stki Israeli VAS market research 2020 v1
Workato integrators corrections stki Israeli VAS  market research 2020 v1Workato integrators corrections stki Israeli VAS  market research 2020 v1
Workato integrators corrections stki Israeli VAS market research 2020 v1Pini Cohen
 
It procurement 2019 v3
It procurement 2019 v3It procurement 2019 v3
It procurement 2019 v3Pini Cohen
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019Pini Cohen
 
STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3Pini Cohen
 
Dev trends 18_q1
Dev trends 18_q1Dev trends 18_q1
Dev trends 18_q1Pini Cohen
 
Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Pini Cohen
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2Pini Cohen
 
IT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsIT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsPini Cohen
 
IT procurement v2
IT procurement v2IT procurement v2
IT procurement v2Pini Cohen
 
Summit 2017 cyber delivery v4 long version
Summit 2017 cyber delivery v4 long versionSummit 2017 cyber delivery v4 long version
Summit 2017 cyber delivery v4 long versionPini Cohen
 
Cyber ratios 2017 v1
Cyber ratios 2017 v1Cyber ratios 2017 v1
Cyber ratios 2017 v1Pini Cohen
 
Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Pini Cohen
 
Ratios 2016 v1
Ratios 2016 v1Ratios 2016 v1
Ratios 2016 v1Pini Cohen
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5Pini Cohen
 
Positioning stki pini 2015 v1
Positioning stki  pini 2015 v1Positioning stki  pini 2015 v1
Positioning stki pini 2015 v1Pini Cohen
 
Stki ratios 2015 v1
Stki ratios 2015 v1Stki ratios 2015 v1
Stki ratios 2015 v1Pini Cohen
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 piniPini Cohen
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsPini Cohen
 
STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014Pini Cohen
 

More from Pini Cohen (20)

Cto 2021 markets v2
Cto 2021 markets v2Cto 2021 markets v2
Cto 2021 markets v2
 
Workato integrators corrections stki Israeli VAS market research 2020 v1
Workato integrators corrections stki Israeli VAS  market research 2020 v1Workato integrators corrections stki Israeli VAS  market research 2020 v1
Workato integrators corrections stki Israeli VAS market research 2020 v1
 
It procurement 2019 v3
It procurement 2019 v3It procurement 2019 v3
It procurement 2019 v3
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019
 
STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3
 
Dev trends 18_q1
Dev trends 18_q1Dev trends 18_q1
Dev trends 18_q1
 
Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2
 
IT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsIT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandations
 
IT procurement v2
IT procurement v2IT procurement v2
IT procurement v2
 
Summit 2017 cyber delivery v4 long version
Summit 2017 cyber delivery v4 long versionSummit 2017 cyber delivery v4 long version
Summit 2017 cyber delivery v4 long version
 
Cyber ratios 2017 v1
Cyber ratios 2017 v1Cyber ratios 2017 v1
Cyber ratios 2017 v1
 
Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1
 
Ratios 2016 v1
Ratios 2016 v1Ratios 2016 v1
Ratios 2016 v1
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5
 
Positioning stki pini 2015 v1
Positioning stki  pini 2015 v1Positioning stki  pini 2015 v1
Positioning stki pini 2015 v1
 
Stki ratios 2015 v1
Stki ratios 2015 v1Stki ratios 2015 v1
Stki ratios 2015 v1
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 pini
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Stkisummi18 i taa_s_cybergov_long_version_v2

  • 1. 1 STKI’s IT as a Service (ITaaS) initiative For a while" is a phrase whose length can't be measured.At least by the person who's waiting. — Haruki Murakami STKI’s IT as a Service (ITaaS) initiative
  • 2. 2 2What is IT as a Service? IT delivery: Infrastructure & Operations as a Service
  • 3. 3 3 IT as a Service Initiative destination Gaining the adaptive ability to deliver IT at the speed of change Current IT delivery is considered expensive, in-efficient, rigid, old fashioned and holding back the business Focused, reliable, efficient, secure and responsive IT operations ITaaS
  • 4. 4 4 The core of ITaaS has not changed • Reducing IT costs • Improving cost transparency • Streamlining how IT services are provisioned, governed and managed • Increasing visibility and control over IT infrastructure • Providing speed and scalability • Increasing ability of strategic innovation Source: IBM STKI modification
  • 5. 5 5
  • 6. 6 6 So… What’s different today than what we did for so many years?
  • 7. 7 We will provide concrete recommendations
  • 8. 8
  • 9. 9 How can ITaaS become focused? By setting up goals and establish metrics!!
  • 10. 10 10 Trek name: Define ITaaS goals and metrics / measurements Set availability reliability metrics Set IT support metrics Set business agility / responsiveness metrics Set cyber security metrics Set delivery efficiency metrics
  • 11. 11 11 Availability, service & efficiency metrics are common Business responsiveness and cyber metrics are much less common Don’t stay with a metric too long
  • 12. 12 12 Define role :"business technology availability" One part of his role :“handle failures" Measure availability objectively with user experience tools
  • 13. 13 13 Another important role: "change & maintenance manager"
  • 14. 14 14 Only "availability minded gatekeeper" can improve ITaaS reliability The "business technology availability" person is the "change & maintenance manager"
  • 15. 15 15 STKI’s DevSecOps measurement manifesto: sec ops dev Measure productivityquality Measure cyberMeasure ops (availability, etc…)
  • 16. 16 16 STKI’s DevSecOps measurement manifesto: sec ops dev Measure productivityquality along with cyber Measure cyber Measure ops along with cyber
  • 17. 17 17 STKI’s DevSecOps measurement manifesto: sec ops dev Measure productivityquality along with cyber & ops Measure cyber along with ops & dev productivity Measure ops along with cyber & dev productivity
  • 18. 18 18 Trek name: Build new Data Center Set Open API Re-build integration platform Set DC new principles Build container infrastructure Optimize the foundation
  • 20. 20 20HCI – hyperconverged infrastructure Source: wikibon
  • 21. 21 21 Hyperscale infrastructure Based on basic standard HW components setting up specific SW (sometimes opensource) configuration for large scale computing. Integrator & customer check if this specific server will work with this specific network HW opensource network OS, specific disks work with specific storage file system, etc.
  • 22. 22 22 SD-WAN is an acronym for software-defined networking in a wide area network (WAN) An SD-WAN simplifies the management and operation of aWAN by decoupling (separating) the networking hardware from its control mechanism. … allow companies to build higher-performanceWANs using lower-cost and commercially available internet access, enabling businesses to partially or wholly replace more expensive private WAN connection technologies such as MPLS
  • 23. 23 23 Set DC new architecture principles: o Build new technology lab preferably on cloud o Software defined based (programmable) technology o Maximize open source business value o Strive towards immutable infrastructure (servers)
  • 24. 24 24 In a traditional mutable server infrastructure, servers are continually updated and modified in place. In immutable infrastructure servers are never modified after they're deployed. If something needs to be updated, fixed, or modified in any way new servers built with the appropriate changes are provisioned to replace the old ones. Immutable infrastructure Source: digitalocean Pets vs. Cattle
  • 25. 25 25 Internal integration ESB External (specific API) API gateway Cloud integration IPaaSadvanced ESB External partners API management developer portal Standard content definition Open API standards Microservices connectivity Service Mesh The evolution of integration patterns
  • 26. 26 26 Will API management replace ESB? It shouldn't – no oorchestration, no transformation, no adapters ( tech and content), no messaging, no guarantee delivery, etc, Still – green filed organizations (enterprises and startups) are not using ESB at all
  • 29. 29 29 Trek name: ITaaS Operations, organization and processes Implement Devops and automation Redefine sourcing and finance Re-organize ITaaS Reshape DC operations Retire technologies and contain technical debt
  • 30. 30 30 Redefine sourcing and finance co-location, outsourcing, cloud plan transition from capex to opex non-perpetual procurement embrace sourced services Cloud communications platform for building SMS, Voice & Messaging applications on an API
  • 31. 31 31 Re-organize ITaaS: new team for new technologydomain • New dedicated team (for converged, cloud, devops, etc.) , with skills differentiated, into the same department System Network DC Storage Cloud Network Storage System Easy but BAD!!
  • 32. 32 32
  • 33. 33 33Re-organize ITaaS: combine old teams for delivering new technologydomain System Network DC Storage Production faults Sizing- architecture DR Cloud Challenging but GOOD!!
  • 36. 36 36 “I have many bosses” What will managers do? New organizations challenges
  • 37. 37 37 Refresh devtest data Project budgeting and chargeback Asset management Moving environment from dev to test to prod Change management Architecture and sizing of new apps NOCITOC and SOC procedures – “run books” Self service portal for developers DRBCP Implement Devops and automation Reshape DC operations Size of circle: how different from current process
  • 38. 38 38 Rack #3, server #10 Power: PDU #17, #23 Storage array #2 , LUN #2 (please define asynchronies replication to DR array #3, LUN #2 SQL server ver. 2016 13.0.4001.0 use dbms image #2 network: add toVLAN #8 FW: open ports…. DBMS: endpoint :examplecluster.abc123xyz789.us- west-2.redshift.amazonaws.com port:5439 database:dev Virtual network: Name: myVnet Address space 10.0.0.0/16 Subnet name: Public Subnet address range 10.0.0.0/24 new project architecture (shopping list):
  • 39. 39 39 Implement devops, automation and reshape DC operations and procedures: service tagging
  • 40. 40 40 Implement devops, automation and reshape DC operations and procedures How will change management look in devops?
  • 41. 41 41 The CI/CD (devops) team Use the existing team that builds/refreshes test environments as the foundation for CICD team Delivery Dev Devops Team
  • 42. 42 42 retire old technologies and avoid technical debt
  • 43. 43 43 Trek name: Zero ticketing Improve self service Introduce bots and virtual agent Auto-Detect + notification to the user for action needed Auto-Detect + auto resolution Improve system reliability & self healing
  • 44. 44 44 Wow!! Don’t need to look for specific solution Don’t need to wait Automation, Self Service and User happiness ☺  Support by 2nd & 3rd level Support by 1st level Self Service : ITSM/Portal/Search Self Service : (Virtual Assistant - Chatbot) or by other tools Auto-Detect + notification to the user + automated resolution Auto-Detect & Auto-Healing ITSTKI modifications Too long, too many people in the process Need to wait for support Do we have support?
  • 45. 45 45User uploads a screenshot of an error (ocr…) Known error is matched with a solution AyTee suggests a solution IT
  • 46. 46 46 Auto-Classify Incidents to specific product and ops categories for more accurate analytics Auto-assign the incident based on past assignments Auto-Route incidents Remedy Powered By Cognitive
  • 47. 47 47 Dynamic Automation integrates into existing ITSM tools to automate use cases on platforms, database, middleware apps, network, and storage 47 Event Management System (e.g. Netcool) Incident Ticketing System (e.g. ICD, ServiceNow, Remedy) Integration Services IBM Dynamic Automation Jump host* Unix Intel Client Devices Managed Server #2 Managed Server #1 Dynamic Automation “Virtual Engineer” (System Administrator) Escalate to Human EngineersYes No Remediate Diagnose Virtual engineers behave very much like a human system administrator. Escalate it to a human system administrator to complete the resolution.
  • 48. 48 48 ITaaS DC co-location racks over blades rack scale architecture sw packages delivered on containers SD-WAN GPU Intent based networking immutable infrastructure (servers) Open source NVME storage
  • 49. 49 Market presence / perception Localsupport EMC IBM Kaminario NETAPP HDS All storage vendors have AFA offerings HPE Vendors to watch: E8storage (NVME) Purestorage All Flash Array (AFA)- Israeli market enterprise presence 1Q118
  • 50. 50 Market presence / perception Localsupport 50 Nutanix VMWARE (vsan) Vendors to watch: HDS Netapp Fujitsu The leading brand in the deal. Other related brands (servers, hypervisor) are not listed HPE DellEMC CISCO HCI hyper converged- Israeli market enterprise presence 1Q118
  • 51. 51 Market presence / perception Localsupport 51 Redhat IBM Pivotal Application Platform as a Service (APaaS) on prem option- Israeli market enterprise presence 1Q118
  • 52. 52 Market presence / perception Localsupport 52 Dell EMC IBM Veritas HPE Commvault Actifio* Vendors to watch: Cloud backup alternatives VEEAM* Acrserve * Rubrick* * Not really apples to apples Enterprise Backup/data protection SW - Israeli market enterprise presence 1Q118
  • 53. 53 53 Pini’s model for technology selection/forecasting adoption: 2 new technologies giving the same benefit and cost (effort) the same. q: which technology should I choose? a: the technology that has better chances to catch!! so, how can I forecast technology adoption? Internet companies- startups How many developers (company size) will benefit this now technology? The smaller number wins!!
  • 54. 54 54 54 Cloud technologies and processes are part of ITaaS practice enabling true hybrid cloud Focused, reliable, efficient, secure and responsive to business needs Zero ticketing Supporting development
  • 55. 5555
  • 56. 56 STKI’s Cyber Governance initiative Life is like riding a bicycle.To keep your balance, you must keep moving." — Albert Einstein STKI’s Cyber Governance initiative
  • 57. 57 57 It’s well known that so many companies get hacked Yet many executives believe it will not affect them Even the largest and most prestigious ones
  • 58. 58 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 5858 Cyber’s Problematic Reputation “Cyber is holding us back from achieving all other initiatives”
  • 59. 59 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 5959 Cyber governance initiative destination Striking a balance between the business needs and cyber, risk & compliance needsCyber, governance & compliance are crucial for the survival of organizations But they are also holding organizations back in many ways. Executives don’t fully comprehend the importance of cyber security and their personal responsibility.
  • 60. 60 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 6060 Cyber Governance Initiative
  • 61. 61 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 61 61 Demonstrate CEO BOARD their cyber responsibility Determine business cyber main principles Allocate cyber budget, head count & org. structure Trek name: Zero trust security: Get top management on board
  • 62. 62 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 6262 Source: STKI staffing report Number of Employees/ Cyber personnel Implement STKI’s market data & best practices to receive appropriate budgets and personnel!
  • 63. 63 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 63 Build risk & cyber multi- year program Build cyber resilience program Trek name: Design a Cyber Governance Plan Design holistic cyber measurement program Use “Israel National Cyber Directorate” guidance and tools
  • 64. 64 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 6464 Israel National Cyber Directorate guidance will boost cyber security in Israel! Especially for non-regulated enterprises Non-regulated CISO I don’t have enough budget and resources I can’t explain this to the CEOBoard
  • 65. 65 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 65 65
  • 66. 66 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 66 66 Organizations that want to participate in the betta program can contact tora@pmo.gov.il
  • 67. 67 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 67 Don’t forget to secure the ENTIRE supply chain!
  • 68. 68 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 68 STKI expects new regulation based on Israel National Cyber Directorate guidance in several industries Take a deep breath.We’ve only just started.
  • 69. 69 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 6969 Of boards are not trained to deal with cyber security incidents! Source: Einat Meyron cyber resilience consultant & The Cyber Security Source - 2017
  • 70. 70 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7070 CEO board member nightmare: One Innocent phone call
  • 71. 71 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7171 ‫הגנה‬ ‫כלי‬ ‫איזה‬ ‫מותקנים‬ ‫אצלכם‬? ‫זה‬ ‫איך‬ ‫קרה‬? ‫פיצוי‬ ‫יהיה‬ ‫ללקוחות‬? ‫תוכלו‬ ‫שלא‬ ‫אומרים‬ ‫ימים‬ ‫כמה‬ ‫לעבוד‬ ‫יש‬‫תוכנית‬ ‫חלופית‬? ‫הכנסתם‬ ‫מו‬ ‫מנהל‬"‫מ‬ ‫לתמונה‬? ‫אחריות‬ ‫מי‬ ‫של‬? ‫לכם‬ ‫פרצו‬ ‫כבר‬ ‫בעבר‬? ‫מייעץ‬ ‫מי‬ ‫לכם‬? ‫זו‬ ‫אם‬ ‫ידוע‬ ‫עבודה‬ ‫פנימית‬? ‫את‬ ‫תפסיקו‬ ‫המסחר‬ ‫במניה‬? ‫רוצה‬ ‫אני‬ ‫עם‬ ‫לדבר‬ ‫המנכל‬ ‫קיבלתם‬ ‫איומים‬ ‫מקדימים‬? ‫כמה‬ ‫דורשים‬? ‫משפיע‬ ‫זה‬ ‫איך‬ ‫הלקוחות‬ ‫על‬? ‫כי‬ ‫קרה‬ ‫זה‬ ‫חסכתם‬ ‫בעלויות‬? ‫כמה‬ ‫מחשבים‬ ‫נפגעו‬? ‫תעדכנו‬ ‫איך‬ ‫אותנו‬? ‫היה‬ ‫איפה‬ ‫הכשל‬? ‫המנכל‬ ‫אדוני‬, ‫תתפטר‬? ‫המלצות‬ ‫יישמתם‬ ‫רגולטור‬? ‫לאחרונה‬ ‫מתי‬ ‫את‬ ‫בדקתם‬ ‫המערכות‬? ‫העובדים‬ ‫שאין‬ ‫אומרים‬ ‫מושג‬ ‫להם‬ ‫קורה‬ ‫מה‬ ‫תחזרו‬ ‫מתי‬ ‫לפעילות‬? ‫איזה‬ ‫לכם‬ ‫ידוע‬ ‫נדבקו‬ ‫מעגלים‬ ‫בגללכם‬? ‫מידע‬ ‫נגנב‬ ‫לקוחות‬ ‫של‬? ‫לא‬ ‫שלכם‬ ‫העובדים‬ ‫לענות‬ ‫מה‬ ‫יודעים‬ ‫ללקוחות‬ ‫קשר‬ ‫יצרתם‬ ‫עם‬‫ההאקר‬? ‫מוודאים‬ ‫הלקוחות‬ ‫איך‬ ‫נפגעו‬ ‫שלא‬? ‫על‬ ‫משפיע‬ ‫זה‬ ‫איך‬ ‫הדו‬"‫הרבעוני‬ ‫ח‬? ‫מיוחד‬ ‫משהו‬ ‫היה‬ ‫בדרישה‬? ‫את‬ ‫כבר‬ ‫עדכנתם‬ ‫להגנת‬ ‫הרשות‬ ‫הסייבר‬? ‫צריכים‬ ‫לקוחות‬ ‫תוכנה‬ ‫להתקין‬ ‫אצלם‬ ‫חדשה‬? ‫ריגול‬ ‫זה‬ ‫עסקי‬? Source: Einat Meyron cyber resilience consultant
  • 72. 72 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7272 ‫המפתח‬ ‫היא‬ ‫שגרה‬ ‫בזמן‬ ‫החלטות‬ ‫קבלת‬ ‫המשבר‬ ‫את‬ ‫שינהל‬ ‫הצוות‬ ‫מי‬‫מייד‬‫מדווח‬ ‫כשהוא‬? ‫מתקפה‬ ‫בזמן‬ ‫יעיל‬ ‫לתפקוד‬ ‫הקריטיות‬ ‫השאלות‬ ‫מהן‬? ‫נמוכה‬ ‫סיכון‬ ‫ברמת‬ ‫יסווג‬ ‫ומה‬ ‫דרמה‬ ‫נחשב‬ ‫מה‬? ‫ביטוח‬ ‫פוליסת‬ ‫יש‬ ‫האם‬?‫אומרת‬ ‫היא‬ ‫מה‬? ‫יותר‬ ‫נרחב‬ ‫משפטי‬ ‫יעוץ‬ ‫נדרש‬ ‫האם‬? ‫מוכרים‬ ‫הרלוונטי‬ ‫לרגולטור‬ ‫הדיווח‬ ‫נהלי‬ ‫האם‬? ‫ה‬ ‫עם‬ ‫קשר‬ ‫לביסוס‬ ‫מהלכים‬ ‫נעשו‬ ‫האם‬-CERT‫הלאומי‬? ‫הספקים‬ ‫עם‬ ‫הקשר‬ ‫מנוהל‬ ‫איך‬‫הלקוחות‬‫המניות‬ ‫בעלי‬? ‫הכופר‬ ‫תשלום‬ ‫לאפשרות‬ ‫מתייחס‬ ‫הארגון‬ ‫איך‬? ‫הכופר‬ ‫לתשלום‬ ‫הכסף‬ ‫מגיע‬ ‫מאיפה‬? Source: Einat Meyron cyber resilience consultant
  • 73. 73 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7373 Leverage the similarities between BCP & Cyber Resilience BCP (Business Continuity Plan) Cyber Resilience And make them work together in collaboration
  • 74. 74 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7474 Trek name: Adopt to changing regulations Keep up with existing regulations Look as GDPR becomes standard Implement Privacy Protection Regulation
  • 75. 75 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7575 GDPR Hype GDPR is searched more than Cyber Security GDPR Cyber Security
  • 76. 76 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7676
  • 77. 77 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7777 What does GDPR mean to our business? A lot! The right to data portability allows individuals to obtain and reuse their personal data for their own purposes across different services. It allows them to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way, without hindrance to usability
  • 78. 78 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 78 It will also change many processes and interaction methods. Example first engagement with client and his consent to continue with the process:
  • 79. 79 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 7979 Consent Management One of the new tools needed to maintain compliance
  • 80. 80 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8080 Some organizations will have to appoint a DPO under GDPR law https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-officers/ The first point of contact for supervisory authorities and for individuals whose data is processed Informs and advises the organization and its employees about their obligations to comply with GDPR and other data protection laws Monitors compliance with GDPR and other data protection laws, including managing internal data protection activities Advises on data protection impact assessments Trains staff and conducts internal audits.
  • 81. 81 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8181 source: konfidas GDPR and Israeli privacy act are touching the same areas
  • 82. 82 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8282 Eventually, it will come… So be prepared
  • 83. 83 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8383 Trek name: Cyber Security Operations Enforce patches Applying to new devices (watches, pumps, cars, etc.) Embrace new technologies and prepare for new vulnerabilities Re-adjust cyber security program Embrace DevSecOps Automate Cyber Operations and Use AIML
  • 84. 84 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8484 DevSecOps Manifesto:
  • 85. 85 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 8585 DevSecOps tools - Embed SDLC (Secure Dev. life cycle) tools into CICD: • Static analysis tools • Dynamic scanning (auto pen. tests) • Embed operations data (logs, customer inputs) with security inputs
  • 86. 86 Copyright@STKI_2018 Do not remove source or attribution from any slide or graph 86 Cyber governance GDPR, Israel privacy law:continue GDPR, Israel privacy law: start Blockchain based identity DPO - data privacy officer Anonymization for cloud Blockchain based general tools (DBMS, etc.) Cloud security tools Cloud tokenization
  • 87. 87 87 87 Balance between business needs and cyber, risk & compliance needs
  • 88. 8888