20141112 apps world_no_vid
TRANSCRIPT
Mobile: The up and downside of risk “Opportunities multiply as they are seized.”
Sun Tzu
Alliander IT CIO Office Michel de Goede
1. Introduction
1. Introduction
“European electricity consumers have the right to enjoy universal service
that is the right to be supplied with electricity of a specified quality … at
reasonable, easily and clearly comparable and transparent prices.”
1. Introduction
• Electric Vehicles
• Two way traffic
• Smart metering and home automation
• Smart city initiatives
• Smart grid
2. Innovation: sixth Schumpeter / Kondratiev wave of innovation
2. Innovation: The semantic wave?
2. Innovation: Venture capital dry powder
2. Innovation: Predictions are as follows
Source: Sogeti VINT
2. Innovation: And then there is also.....
Source: Sogeti VINT
2. Innovation: Biohackables (implanted bio chip)
Source: Motherboard
2. Innovation: Biohackables (Dean Kamen’s Luke Arm)
Source: Wired
2. Innovation: Biohackables (exoskeleton)
2. Innovation: Biohackables (hearing colour)
Source PSFK
2. Innovation: Augmentables (Motorola wearable computer)
Source Motorola
2. Innovation: Augmentables (Oculus Rift)
2. Innovation: Enchantables (Glow Caps)
Source: Glow Caps
2. Innovation: Swallowables (colonoscopy camera pill)
Source: PSFK
2. Innovation: Swallowables (Google Motorola password pill)
Source: secretsofthefed.com
2. Innovation: Wearables (Hexoskin biometric shirt)
Source: Hexoskin
2. Innovation: Wearables (Google & Motorola’s lie detector tattoo)
Source: PSFK
2. Innovation: Wearables (Bionym Nimy Heartbeat authentication)
Source: Bionym
2. Innovation: Surroundables (Nissan Nismo Watch)
Source: Nissan
The ultimate device is YOU!
Business Processes
4. Security: So here is your Internet of Everything!!!
Virtual World Personal
Devices
Home Automation Operational Technology
IT Connected
Organizations
Crime
3. Security: Gartner 2020 planning assumptions
• 80% of digital access will be shaped by new mobile and non-PC
architectures, up from 5% today.
• 60% of all digital identities interacting with enterprises will come from external
identity providers through a competitive marketplace, up from <10% today.
• over 80% of enterprises will allow unrestricted access to non-critical assets,
up from <5% today, reducing spending on IAM by 25%.
• 70% of all businesses will use attribute-based access control (ABAC) as the
dominant mechanism to protect critical assets, up from <5% today.
• identity analytics and intelligence (IAI) tools will deliver direct business value*
in 60% of enterprises, up from <5% today.
• the Internet of Things will redefine the concept of "identity management" to
include what people own, share, and use.
Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)
4. Four measures to master mobile developments
1. Separate systems of engagement (more mobile) from systems of record (more data center) and specify interacions on the interface level. Choose standards.
2. Orchestrate over an increasing number of business partners, devices, protocols and formats
3. Be resilient to all types of risk in the automated landscape under your responsibility
4. Carefully choose your anti lock-in strategy
Speed up!
4. Four measures to master mobile developments
- Separate systems of engagement from systems of record
Internet (open)
Access Management
(access layer) Representation
(presentation layer)
Authorization Management
(application layer)
Application
1
Application
n
May I enter the house?
What goods and services
am I allowed to
use in these rooms?
Any device
Offices (closed)
For which rooms do you
give me the key(s)?
What goods and services
am I allowed to
use in these rooms?
Protocol and data-
format decoupling
such as: Citrix,
HTML 5, JSON, XML,
Sybase SUP and so
on
Application
2 Application
3
Leverage
cloud
© Wim Bouman, Alliander IT
Needs semantics
4. Four measures to master mobile developments
- Orchestrate
Compliance
starts here
4. Four measures to master mobile developments
- Be resilient
Resilience can be obtained by moving away from typical barrier enhancement
risk-measures. Consider the following options:
• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;
• Accept, the potential impact of some risks may be deemed acceptable to your
organization;
• Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking
app;
• Transfer, use insurance or subcontracting to transfer potential consequences of risk;
• Avoid, not entering the type of business that may incur potential risk impact deemed too
high;
• Exploit, risk is also an opportunity and high risk investments may yield high returns.
4. Four measures to master mobile developments
- Be resilient
• Counter the ‘wave of appliances’ and lock-in wars with open
source orchestration
• Use standardization to minimize the number of supported
protocols and file formats as much as possible
• Keep risk acceptable
4. Four measures to master mobile developments
- Choose your anti lock-in strategy
The beauty of it all?
• Seize the opportunities of Mobile
• Maximize the upside of risk
Alliander IT CIO Office Michel de Goede
Thank you!