SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
DIGITAL TRANSFORMATION IN THE CLOUD: WHAT THEY
DON’T ALWAYS TELL YOU
ITCAMP – ONLINE COMMUNITY MEETUP
JULY 9TH, 2020
 Co-founder @ ITCamp & ITCamp Community
 Cloud and Datacenter Management MVP (Microsoft)
 Certified Ethical Hacker (EC-Council)
 Certified Security Professional (CQURE)
 Contact: tudy.tel
TUDOR DAMIAN
 The Pitfalls of Digital Transformation
 Digital Transformation trends, mistakes and solutions
 Why the Cloud?
 Defining a strategy to move to the Cloud
 I’m there, now what?
 Governance & Security in the Cloud
 Example: MCRA
 What’s next?
 Key takeaways & next steps
OBJECTIVES
(THE MIRAGE OF) DIGITAL TRANSFORMATION
Step 1
Perform Digital Transformation
Step 2
Profit
HOW COMPANIES VIEW DIGITAL TRANSFORMATION
Step 1
Perform Digital
Transformation
Step 2
???
Step 3
Profit
HOW DIGITAL TRANSFORMATION REALLY WORKS
The main focus should be on what you do here
 Over 70% of all Digital Transformation
initiatives do not reach their goals
 Yearly spending estimates: $1.2 - $1.3 trillion
 Digital Transformation doesn’t fail because
of a shortage of “tech”
 Most digital technologies provide possibilities for
efficiency gains
 If people lack the right mindset to change and if
current organizational practices are flawed, DT
will only magnify those flaws
THE PITFALLS OF DIGITAL TRANSFORMATION
https://blogs.wsj.com/riskandcompliance/2018/12/05/businesses-predict-digital-transformation-to-be-biggest-risk-factors-in-2019/
https://www.forbes.com/sites/forbestechcouncil/2018/03/13/why-digital-transformations-fail-closing-the-900-billion-hole-in-enterprise-strategy/#4f74e9207b8b
https://www.forbes.com/sites/forbesinsights/2019/07/20/think-going-to-the-moon-was-tough-50-years-ago-try-digitally-transforming-a-corporation-because-72-of-us-are-failing-at-it/
Failed
72%
Successful
28%
Digital Transformation
initiatives (2019, Forbes)
 #1 – The Changing Customer Experience
 Solution: Assess your current presence and find ways to improve the level of enjoyment of each
customer’s experience (measure your CSAT)
 #2 – Employee Pushback
 Solution: Build customer service, employee training and company culture around your customers’
needs
 #3 – Omnichannel Adaptation
 Solution: Adopting a robust customer engagement system
 #4 – Failing or Poor Analytics
 Solution: AI, Big Data, Machine Learning
 #5 – Lagging, Legacy Business Models
 Solution: Find ways to innovate and ditch your old systems and processes
THE CHALLENGES OF DIGITAL TRANSFORMATION
 #6 – The “Starting Blind” Challenge
 Solution: Identify where the company is in the transformation journey and what is needed before
starting (collect user & customer data)
 #7 – Short-Term View
 Solution: Go beyond 3-6 months planning, but also plan for project fatigue
 #8 – Culture Change
 Solution: Leaders must be intentional in building a digital culture, including changing legacy
technology and structures that hinder transformation
 #9 – Aligning Business and IT
 Solution: Balance business needs, new technology and retraining people
 #10 – The Data Challenge
 Solution: Infrastructure (AI, Cloud, Machine Learning), Information Management & Governance are key
THE CHALLENGES OF DIGITAL TRANSFORMATION
 Evolving Technology
 Books, music, shopping, banking, education, insurance, transportation – they’ve already transformed
right in front of our eyes; and it’s mostly about data
 Accessing resources is more important than owning or creating resources
 Sharing content, resources & intellectual property is more effective than accumulating them
 Decentralizing, distributing, and copying is more powerful than stockpiling originals
 Connectivity and flow of data is the starting point for innovation and socializing
 Evolving People
 Start with engagement – put people at the center of your DT (employees, partners, customers)
 Once you understand who your business serves, you’ll be able to easily transform things
 Evolving Processes
 Don’t rush to try new tech without considering the broader organizational strategy
 Tools expansion without a strategy rarely aligns with business needs
WHAT IS THERE TO DO?
SO, WHY THE CLOUD?
28.2% CAGR from
2017 to 20205
80% of CIOs
migrating their datacenters
CLOUD MIGRATION WILL CONTINUE TO GROW
COMPANIES ARE ALREADY IN THE CLOUD
time required
to manage apps by 80% time
to deploy a new app by 50%
Top 2
 Cost control: Utility services cost less even though they cost more
 Higher cost per unit time than leasing or upfront purchase
 Zero cost when not used
 Efficiency & scalability: on-demand is better than prediction
 Forecasting is estimative, often wrong, sometimes impossible
 Better to be able to scale up or down “immediately” depending on demand
 Workloads: address odd workload patterns
 On-and-off, growing fast, unpredictable bursting, predictable bursting
 Innovation: access to technology not available on-premises
 Making use of some Cloud-native solutions (e.g. AI, ML, Analytics, DBs, storage)
 Consolidating platforms, technologies, expertise
 Starting up: new company, startup, spinoff, new market, etc.
 Security & compliance: GDPR, data protection, data classification, etc.
WHY THE CLOUD? (EXAMPLES)
 Identity & Data
 Data Classification & Labeling, Data Protection
 Monitoring & Response
 Geography
 Multi-geo deployments & GDPR
 Latency
 Financials
 OPEX vs CAPEX
 Understand cloud business models (e.g. PAYG vs CSP vs EA vs MCA)
 Understand constants and variables in Cloud consumption
 Apply relevant tools for cost visualization, control and budgeting
 Governance
 Cloud subscriptions will get very messy very quickly without proper governance
 Locks, Groups, Tags, Policies, Auditing & Monitoring – it all has little value unless properly understood and employed
 Process
 This is not a walk in the park, it’s a lengthy and rather complex project
COMMON CLOUD CHALLENGES
THE MICROSOFT CLOUD ADOPTION FRAMEWORK
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
Analysis
• Review existing
application
architecture
• Map with Azure
features
Application
Migration
• Implement changes
• Convert to Azure roles
• Application already
working in a VM;
upload this VM to
Azure as a .vhd
• Build a VM in Azure,
then install app inside
VM
Data Migration
• Move non-relational
data to Azure Table,
Blob, Queue, etc.
• Move relational data
to Azure SQL DB
• Data already in VM:
upload this VM to
Azure as a .vhd
• Build a VM in azure;
either upload data in a
.vhd file or migrate
data using DB
management tools
Optimization and
Testing
• Identify and resolve
bottlenecks
• Functional testing
• Performance testing
Operation and
Management
• Monitor app
performance
• Manage data recovery
plan
AZURE MIGRATION STRATEGY: TRADITIONAL APP
RESPONSIBILITY ZONES IN THE CLOUD
THE SECURITY & COMPLIANCE TALK
 Governance, Risk Management & Compliance (GRC) are three facets that
help to ensure that an organization meets its objectives
 Goals:
 Keeping risk at acceptable levels
 Maintaining availability to systems and services
 Complying with relevant laws and regulations
 Protecting customer and internal data
GRC – ARE YOU DOING IT TODAY?
Governance, Risk management & Compliance
 Regulatory compliance (e.g. PCI-DSS, HIPAA, CDSA, MPAA, etc.)
 Data governance (e.g. DLP, encrypting PII, geo location, etc.)
 Financial governance (e.g. CAPEX vs OPEX, prediction, cost centers, etc.)
 Change management (e.g. DevOps, user & organization readiness, etc.)
 Business & market changes and challenges
 ITIL, COBIT & the Cloud
 Strategy, Design, Transition, Operation & Improvement
 Ensure clear ownership & responsibilities
 Better manage IT investments
 Identify & handle IT risk
GRC – ITEMS IN FOCUS
Governance, Risk management & Compliance
UNDERSTANDING CLOUD SECURITY CONTROLS
What does the Cloud do for me? What do I still need to do?
On-premises IaaS PaaS SaaS
1. Security Strategy, Governance, and Operationalization: Provide clear vision, standards and guidance for the company
2. Administrative Control: Defend against loss of control of your Cloud services and on-premises systems
3. Data: Identify and protect your most important information assets
4. User Identity and Device Security: Strengthen protection for accounts and devices
5. Application Security: Ensure application code is resilient to attacks
6. Network: Ensure connectivity, isolation, and visibility into anomalous attacks
7. OS and Middleware: Protect integrity of (virtual) hosts
8. On-prem / private
environments: Secure
the foundation
 3rd and 4th party risk
 Customers: responsible for implementing security in the cloud application
 SaaS providers: responsible for the security in the cloud
 Cloud service providers: responsible for the security of the cloud
 Analyze costs and benefits of Cloud migration
 Operational consistency
 Information visibility
 Advanced threats
CLOUD SECURITY & COMPLIANCE CHALLENGES
 Understanding your business challenge
 Data-centric threat defense
 Proactive risk management
 Continuous security & compliance
 Resolving your business challenge
 Secure the Data, not the Cloud
 Manage risk proactively, including doing an initial
assessment
 Implement foundational security, with compliance as
a by-product
BUILDING A CLOUD-READY SECURITY STRATEGY
KEEP IN MIND, IT CAN GET VERY COMPLEX
E x a m p l e : T h e M i c r o s o f t C y b e r s e c u r i t y R e f e r e n c e A r c h i t e c t u r e
Securing Privileged Access
Office 365 Security
Rapid Cyberattacks
(Wannacrypt/Petya)
https://aka.ms/MCRA Video Recording Strategies
Office 365
Dynamics 365
+Monitor
Azure Sentinel – Cloud Native SIEM and SOAR
SQL Encryption &
Data Masking
Data Loss Protection
Data Governance
eDiscovery
Securing Privileged Access
Office 365 Security
Rapid Cyberattacks
(Wannacrypt/Petya)
https://aka.ms/MCRA Video Recording Strategies
Office 365
Dynamics 365
+Monitor
Azure Sentinel – Cloud Native SIEM and SOAR
SQL Encryption &
Data Masking
Data Loss Protection
Data Governance
eDiscovery
WRAPPING UP
 So, we’ve (briefly) discussed:
 The challenges and pitfalls of Digital Transformation initiatives
 Why look at the Cloud in your DT strategy?
 How to approach a Cloud Strategy initiative
 GRC (Governance, Risk Management & Compliance) in the Cloud
 First steps:
 Don’t do Digital Transformation for the sake of doing it, do it because you’ve identified a real business need
that can be addressed
 Remember: it’s rarely about tech, it’s more often about company culture, processes, and people’s mindset
 Ensure you have a clear Cloud Strategy (including Security & Governance)
 Discover what you’ve got and where you’re starting from
 Don’t forget, you’re mostly just extending your practices to the Cloud
 Consider all the details – culture shift, onboarding, identity, geography, financials, monitoring, operations, etc.
SUMMARY
Q & A

Más contenido relacionado

La actualidad más candente

To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Livingstone Advisory
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of ThingsTripwire
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Brian K. Dickard
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
John Mancini's Predictions for Information Management in 2015
John Mancini's Predictions for Information Management in 2015John Mancini's Predictions for Information Management in 2015
John Mancini's Predictions for Information Management in 2015AIIM International
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Cloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementCloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementVSR *
 

La actualidad más candente (20)

Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
bishu pdf1
bishu pdf1bishu pdf1
bishu pdf1
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
John Mancini's Predictions for Information Management in 2015
John Mancini's Predictions for Information Management in 2015John Mancini's Predictions for Information Management in 2015
John Mancini's Predictions for Information Management in 2015
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Cloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementCloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project Management
 

Similar a Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]

Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data GovernanceTrillium Software
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdfAnil
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
Why You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsWhy You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsStave
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cloud Adaption and Migration - Raghvendra Prabhu
Cloud Adaption and Migration - Raghvendra PrabhuCloud Adaption and Migration - Raghvendra Prabhu
Cloud Adaption and Migration - Raghvendra PrabhuRaghavendra Prabhu
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 

Similar a Digital Transformation in the Cloud: What They Don’t Always Tell You [2020] (20)

AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Why You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsWhy You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow Clouds
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cloud Adaption and Migration - Raghvendra Prabhu
Cloud Adaption and Migration - Raghvendra PrabhuCloud Adaption and Migration - Raghvendra Prabhu
Cloud Adaption and Migration - Raghvendra Prabhu
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 

Más de Tudor Damian

Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themTudor Damian
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure StackTudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion TechniquesTudor Damian
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
Azure Site Recovery and System Center
Azure Site Recovery and System Center Azure Site Recovery and System Center
Azure Site Recovery and System Center Tudor Damian
 
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Tudor Damian
 
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2Tudor Damian
 
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudComparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudTudor Damian
 
What's new in Windows 8
What's new in Windows 8What's new in Windows 8
What's new in Windows 8Tudor Damian
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyTudor Damian
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 OverviewTudor Damian
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's nextTudor Damian
 
Hosting your virtual private cloud
Hosting your virtual private cloudHosting your virtual private cloud
Hosting your virtual private cloudTudor Damian
 
Linux sub Hyper-V R2
Linux sub Hyper-V R2Linux sub Hyper-V R2
Linux sub Hyper-V R2Tudor Damian
 
White Hat Hacking #3
White Hat Hacking #3White Hat Hacking #3
White Hat Hacking #3Tudor Damian
 
White Hat Hacking #1
White Hat Hacking #1White Hat Hacking #1
White Hat Hacking #1Tudor Damian
 

Más de Tudor Damian (20)

Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure Stack
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion Techniques
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Azure Site Recovery and System Center
Azure Site Recovery and System Center Azure Site Recovery and System Center
Azure Site Recovery and System Center
 
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
 
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
 
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudComparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
 
What's new in Windows 8
What's new in Windows 8What's new in Windows 8
What's new in Windows 8
 
Linux on Hyper-V
Linux on Hyper-VLinux on Hyper-V
Linux on Hyper-V
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 Overview
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's next
 
Hosting your virtual private cloud
Hosting your virtual private cloudHosting your virtual private cloud
Hosting your virtual private cloud
 
Linux sub Hyper-V R2
Linux sub Hyper-V R2Linux sub Hyper-V R2
Linux sub Hyper-V R2
 
White Hat Hacking #3
White Hat Hacking #3White Hat Hacking #3
White Hat Hacking #3
 
White Hat Hacking #1
White Hat Hacking #1White Hat Hacking #1
White Hat Hacking #1
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]

  • 1. DIGITAL TRANSFORMATION IN THE CLOUD: WHAT THEY DON’T ALWAYS TELL YOU ITCAMP – ONLINE COMMUNITY MEETUP JULY 9TH, 2020
  • 2.  Co-founder @ ITCamp & ITCamp Community  Cloud and Datacenter Management MVP (Microsoft)  Certified Ethical Hacker (EC-Council)  Certified Security Professional (CQURE)  Contact: tudy.tel TUDOR DAMIAN
  • 3.  The Pitfalls of Digital Transformation  Digital Transformation trends, mistakes and solutions  Why the Cloud?  Defining a strategy to move to the Cloud  I’m there, now what?  Governance & Security in the Cloud  Example: MCRA  What’s next?  Key takeaways & next steps OBJECTIVES
  • 4. (THE MIRAGE OF) DIGITAL TRANSFORMATION
  • 5.
  • 6. Step 1 Perform Digital Transformation Step 2 Profit HOW COMPANIES VIEW DIGITAL TRANSFORMATION
  • 7. Step 1 Perform Digital Transformation Step 2 ??? Step 3 Profit HOW DIGITAL TRANSFORMATION REALLY WORKS The main focus should be on what you do here
  • 8.  Over 70% of all Digital Transformation initiatives do not reach their goals  Yearly spending estimates: $1.2 - $1.3 trillion  Digital Transformation doesn’t fail because of a shortage of “tech”  Most digital technologies provide possibilities for efficiency gains  If people lack the right mindset to change and if current organizational practices are flawed, DT will only magnify those flaws THE PITFALLS OF DIGITAL TRANSFORMATION https://blogs.wsj.com/riskandcompliance/2018/12/05/businesses-predict-digital-transformation-to-be-biggest-risk-factors-in-2019/ https://www.forbes.com/sites/forbestechcouncil/2018/03/13/why-digital-transformations-fail-closing-the-900-billion-hole-in-enterprise-strategy/#4f74e9207b8b https://www.forbes.com/sites/forbesinsights/2019/07/20/think-going-to-the-moon-was-tough-50-years-ago-try-digitally-transforming-a-corporation-because-72-of-us-are-failing-at-it/ Failed 72% Successful 28% Digital Transformation initiatives (2019, Forbes)
  • 9.  #1 – The Changing Customer Experience  Solution: Assess your current presence and find ways to improve the level of enjoyment of each customer’s experience (measure your CSAT)  #2 – Employee Pushback  Solution: Build customer service, employee training and company culture around your customers’ needs  #3 – Omnichannel Adaptation  Solution: Adopting a robust customer engagement system  #4 – Failing or Poor Analytics  Solution: AI, Big Data, Machine Learning  #5 – Lagging, Legacy Business Models  Solution: Find ways to innovate and ditch your old systems and processes THE CHALLENGES OF DIGITAL TRANSFORMATION
  • 10.  #6 – The “Starting Blind” Challenge  Solution: Identify where the company is in the transformation journey and what is needed before starting (collect user & customer data)  #7 – Short-Term View  Solution: Go beyond 3-6 months planning, but also plan for project fatigue  #8 – Culture Change  Solution: Leaders must be intentional in building a digital culture, including changing legacy technology and structures that hinder transformation  #9 – Aligning Business and IT  Solution: Balance business needs, new technology and retraining people  #10 – The Data Challenge  Solution: Infrastructure (AI, Cloud, Machine Learning), Information Management & Governance are key THE CHALLENGES OF DIGITAL TRANSFORMATION
  • 11.  Evolving Technology  Books, music, shopping, banking, education, insurance, transportation – they’ve already transformed right in front of our eyes; and it’s mostly about data  Accessing resources is more important than owning or creating resources  Sharing content, resources & intellectual property is more effective than accumulating them  Decentralizing, distributing, and copying is more powerful than stockpiling originals  Connectivity and flow of data is the starting point for innovation and socializing  Evolving People  Start with engagement – put people at the center of your DT (employees, partners, customers)  Once you understand who your business serves, you’ll be able to easily transform things  Evolving Processes  Don’t rush to try new tech without considering the broader organizational strategy  Tools expansion without a strategy rarely aligns with business needs WHAT IS THERE TO DO?
  • 12. SO, WHY THE CLOUD?
  • 13. 28.2% CAGR from 2017 to 20205 80% of CIOs migrating their datacenters CLOUD MIGRATION WILL CONTINUE TO GROW COMPANIES ARE ALREADY IN THE CLOUD time required to manage apps by 80% time to deploy a new app by 50% Top 2
  • 14.  Cost control: Utility services cost less even though they cost more  Higher cost per unit time than leasing or upfront purchase  Zero cost when not used  Efficiency & scalability: on-demand is better than prediction  Forecasting is estimative, often wrong, sometimes impossible  Better to be able to scale up or down “immediately” depending on demand  Workloads: address odd workload patterns  On-and-off, growing fast, unpredictable bursting, predictable bursting  Innovation: access to technology not available on-premises  Making use of some Cloud-native solutions (e.g. AI, ML, Analytics, DBs, storage)  Consolidating platforms, technologies, expertise  Starting up: new company, startup, spinoff, new market, etc.  Security & compliance: GDPR, data protection, data classification, etc. WHY THE CLOUD? (EXAMPLES)
  • 15.  Identity & Data  Data Classification & Labeling, Data Protection  Monitoring & Response  Geography  Multi-geo deployments & GDPR  Latency  Financials  OPEX vs CAPEX  Understand cloud business models (e.g. PAYG vs CSP vs EA vs MCA)  Understand constants and variables in Cloud consumption  Apply relevant tools for cost visualization, control and budgeting  Governance  Cloud subscriptions will get very messy very quickly without proper governance  Locks, Groups, Tags, Policies, Auditing & Monitoring – it all has little value unless properly understood and employed  Process  This is not a walk in the park, it’s a lengthy and rather complex project COMMON CLOUD CHALLENGES
  • 16. THE MICROSOFT CLOUD ADOPTION FRAMEWORK https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
  • 17. Analysis • Review existing application architecture • Map with Azure features Application Migration • Implement changes • Convert to Azure roles • Application already working in a VM; upload this VM to Azure as a .vhd • Build a VM in Azure, then install app inside VM Data Migration • Move non-relational data to Azure Table, Blob, Queue, etc. • Move relational data to Azure SQL DB • Data already in VM: upload this VM to Azure as a .vhd • Build a VM in azure; either upload data in a .vhd file or migrate data using DB management tools Optimization and Testing • Identify and resolve bottlenecks • Functional testing • Performance testing Operation and Management • Monitor app performance • Manage data recovery plan AZURE MIGRATION STRATEGY: TRADITIONAL APP
  • 19. THE SECURITY & COMPLIANCE TALK
  • 20.  Governance, Risk Management & Compliance (GRC) are three facets that help to ensure that an organization meets its objectives  Goals:  Keeping risk at acceptable levels  Maintaining availability to systems and services  Complying with relevant laws and regulations  Protecting customer and internal data GRC – ARE YOU DOING IT TODAY? Governance, Risk management & Compliance
  • 21.  Regulatory compliance (e.g. PCI-DSS, HIPAA, CDSA, MPAA, etc.)  Data governance (e.g. DLP, encrypting PII, geo location, etc.)  Financial governance (e.g. CAPEX vs OPEX, prediction, cost centers, etc.)  Change management (e.g. DevOps, user & organization readiness, etc.)  Business & market changes and challenges  ITIL, COBIT & the Cloud  Strategy, Design, Transition, Operation & Improvement  Ensure clear ownership & responsibilities  Better manage IT investments  Identify & handle IT risk GRC – ITEMS IN FOCUS Governance, Risk management & Compliance
  • 22. UNDERSTANDING CLOUD SECURITY CONTROLS What does the Cloud do for me? What do I still need to do? On-premises IaaS PaaS SaaS 1. Security Strategy, Governance, and Operationalization: Provide clear vision, standards and guidance for the company 2. Administrative Control: Defend against loss of control of your Cloud services and on-premises systems 3. Data: Identify and protect your most important information assets 4. User Identity and Device Security: Strengthen protection for accounts and devices 5. Application Security: Ensure application code is resilient to attacks 6. Network: Ensure connectivity, isolation, and visibility into anomalous attacks 7. OS and Middleware: Protect integrity of (virtual) hosts 8. On-prem / private environments: Secure the foundation
  • 23.  3rd and 4th party risk  Customers: responsible for implementing security in the cloud application  SaaS providers: responsible for the security in the cloud  Cloud service providers: responsible for the security of the cloud  Analyze costs and benefits of Cloud migration  Operational consistency  Information visibility  Advanced threats CLOUD SECURITY & COMPLIANCE CHALLENGES
  • 24.  Understanding your business challenge  Data-centric threat defense  Proactive risk management  Continuous security & compliance  Resolving your business challenge  Secure the Data, not the Cloud  Manage risk proactively, including doing an initial assessment  Implement foundational security, with compliance as a by-product BUILDING A CLOUD-READY SECURITY STRATEGY
  • 25. KEEP IN MIND, IT CAN GET VERY COMPLEX E x a m p l e : T h e M i c r o s o f t C y b e r s e c u r i t y R e f e r e n c e A r c h i t e c t u r e
  • 26. Securing Privileged Access Office 365 Security Rapid Cyberattacks (Wannacrypt/Petya) https://aka.ms/MCRA Video Recording Strategies Office 365 Dynamics 365 +Monitor Azure Sentinel – Cloud Native SIEM and SOAR SQL Encryption & Data Masking Data Loss Protection Data Governance eDiscovery
  • 27. Securing Privileged Access Office 365 Security Rapid Cyberattacks (Wannacrypt/Petya) https://aka.ms/MCRA Video Recording Strategies Office 365 Dynamics 365 +Monitor Azure Sentinel – Cloud Native SIEM and SOAR SQL Encryption & Data Masking Data Loss Protection Data Governance eDiscovery
  • 29.  So, we’ve (briefly) discussed:  The challenges and pitfalls of Digital Transformation initiatives  Why look at the Cloud in your DT strategy?  How to approach a Cloud Strategy initiative  GRC (Governance, Risk Management & Compliance) in the Cloud  First steps:  Don’t do Digital Transformation for the sake of doing it, do it because you’ve identified a real business need that can be addressed  Remember: it’s rarely about tech, it’s more often about company culture, processes, and people’s mindset  Ensure you have a clear Cloud Strategy (including Security & Governance)  Discover what you’ve got and where you’re starting from  Don’t forget, you’re mostly just extending your practices to the Cloud  Consider all the details – culture shift, onboarding, identity, geography, financials, monitoring, operations, etc. SUMMARY
  • 30. Q & A