SlideShare uma empresa Scribd logo
1 de 28
1
Cloud adoption in Europe
- an analyst's perspective
Mike Davis
Principal Analyst
June 2013
© All images acknowledged
© msmd advisors Ltd 2013
responsive, credible, flexible
2
© msmd advisors Ltd 2013
Running order
The issues around Cloud are not new
The thirst for cloud solutions (to problems)
9 questions and myths that need to be burst
The things businesses haven't thought of
How does legislation impact
Cloud adoption?
EU examples and initiatives
Which legislation?
4
© msmd advisors Ltd 2013
The thirst for and benefits from cloud
adoption
• Rapid adoption – learnt the lessons from web apps
• Rapid updates – without the pain of downtime
• Flex and scale – without “Yee cannot break the laws of
physics Captain”
• Addressed more needs than originally envisaged
• Scales exponentially (within contract and budget)
• Allowed IT to focus on solutions rather than 'plumbing'
• Better uptime than in house
5
These are all Cloud companies by design
© msmd advisors Ltd 2013
6
© msmd advisors Ltd 2013
9 questions/myths about Cloud for
EU CIOs
1. “I won't have control of my data”
2. “What if my provider get hacked?”
3. “How can I trust people I don't know to look after my data?”
4. “How can I be sure of my provider's privacy controls?”
5. “Can you guarantee it will be cheaper?”
6. “We can't use a generic platform, our business is unique, we need
significant customisation of our software to address our business
needs.”
7. “Why shouldn't I keep doing all our processing internally?” (It boosts my
staff numbers, my salary and my profile)
8. “My regulator says I can't have personal data stored outside the country”
9. “All the Cloud service providers are American, thus they are subject to
the Patriot Act and the US Government can size the data.”
7
© msmd advisors Ltd 2013
Control
8
© msmd advisors Ltd 2013
1. “I won't have control of my data”
– Yes you will, and as a corporate entity you still
have responsibility for your data too, no matter
where it is and who is processing/storing on
your behalf. If you are concerned about the
controls, look closer at the contracts and do
better due diligence. Banks and retailers do not
have qualms about security companies
transporting their cash.
9
© msmd advisors Ltd 2013
How secure is cloud?
10
© msmd advisors Ltd 2013
2. “What if my provider gets hacked?”
– There was a recent exercise on social engineering
hacking undertaken by so-called 'ethical hackers'.
Of the 25 well known corporations they targeted, the
majority were ‘captured’ within 15 minutes. The only
successful defendant was Google. Unless you are the
US government, you can't afford to invest in as much
training and infrastructure as a provider.
The real questions to ask are: 'How big is my security
team?' 'How quickly can they respond to a threat?'
More relevantly from a business perspective, 'How
sensitive is the vast majority of information in my
businesses systems?' I refer again to the canteen
menu.
11
© msmd advisors Ltd 2013
3. “How can I trust people I don't
know to look after my data?”
– The question is 'Do you put the database management
and backup responsibility in the hands of people who
work for an organisation, whose only purpose is to
deliver a trusted service? Or to your intern, who is at
best paid the minimum wage (probably nothing at all),
and when his/her partner says “can you come to the
cinema now?” will choose the popcorn over the
mandated procedure'.
12
© msmd advisors Ltd 2013
4. “How can I be sure of my
provider's privacy controls?”
– Because unless you are the intelligence service, they
are better at it than you are. It's their focus and
credibility. Like you they are subject to privacy laws,
and should have the ISO 27001 and equivalent
certification(s) (as should you).
13
© msmd advisors Ltd 2013
What do you NEED to keep private?
Menus for the canteen
Contracts?
Payroll?
Operating manuals?
Sales figures?
Research findings?
Canteen menus?
14
© msmd advisors Ltd 2013
Cloud is cheap!
15
© msmd advisors Ltd 2013
5. “Can you guarantee it will be
cheaper?”
– NO. It should be - because the providers have
economies of scale in terms of hardware, networks,
and expertise. The real business question is 'Can it
give me a better service within my current budget
envelope?'. It should do - because in most instances it
is likely to be more efficient, robust, accessible, and
secure than an on-premise service.
However, just as with the IT Facilities Management
contracts of the 1980/90s beware of the costs of
changes to service/processes/volumes that the
provider will charge. In addition moving to cloud
services is not a 'fire and forget' issue. You need to
have robust and regular monitoring of all areas of the
service provided.
16
© msmd advisors Ltd 2013
6. “We can't use a generic platform,
our business is unique”
– If you move to a cloud service you can take all your
idiosyncrasies with you, but don't expect the service to
be cheaper, because your provider will have to
incorporate and train their staff on all those 'tweaks'.
60% + of the western world uses Google as their
internet search engine, less than 1% of those
customise the interface because the 'vanilla' product
gives them the majority of what they need. The pareto
principle (80-20) applies in information management/IT
just as much as it does in the rest of life.
17
© msmd advisors Ltd 2013
7. “Why shouldn't I keep doing all our
processing internally?”
– Look at the previous 6 answers. Your job security and
progression really depends on addressing the
business needs of your organisation. If you cannot
provide the service the organisation requires, it will find
someone who can.
18
© msmd advisors Ltd 2013
The EU perspective – personal data
19
© msmd advisors Ltd 2013
Data Protection Act 1998 - 8th
principle
“Personal data shall not be transferred to a country or
territory outside the European Economic Area unless
that country or territory ensures an adequate level of
protection for the rights and freedoms of data subjects
in relation to the processing of personal data”.”
20
© msmd advisors Ltd 2013
'No go' zones for cloud adoption?
X
X
X
21
© msmd advisors Ltd 2013
8. “My regulator says I can’t have
personal data stored outside the country”
– So? That becomes an explicit contractual requirement,
a focus of due diligence and then on-going monitoring.
No different technically than stating the cleaning
contractor should wash the toilet floors twice a day.
Chose a provider that can address that requirement,
and remember the geographic restriction only applies
to personal data or that specified by national security.
You can store your canteen menus anywhere in the
world.
22
© msmd advisors Ltd 2013
EU examples and initiatives
23
© msmd advisors Ltd 2013
Whose legislation is going to hold back
cloud adoption?
24
© msmd advisors Ltd 2013
Whose legislation is going to hold back
cloud adoption?
26
© msmd advisors Ltd 2013
9. “All the cloud service providers are
subject the Patriot Act and the US
government can seize the data”
– There are a lot of scare stories around the Act. Yes if
your data is on US soil there is a risk it could be
seized, if it poses a threat to US national security. But
how many businesses will that apply to? More
importantly there are many other providers of managed
services or cloud provision in different geographies
who are not subject to the Act. Look at the real issues
of service delivery and expected outcomes, and as
with all business decisions make pragmatic trade-offs
of the risks and benefits.
27
© msmd advisors Ltd 2013
Issues around cloud adoption
We use procurement models for kit. not services (talk to the
facilities manager)
Bring your own (BYOx) can cause issues (though it shouldn't)
Solution vendors don't like cloud (unless its their own – vertical
integration = margins)
Organisations need to keep/develop in house support (cloud is
VANILLA)
3rd
party add-ons not always available for cloud
Granular Security can present challenges
- apps designed for companies have a specific security mode
Federated security for hybrid not yet addressed
28
Thank you
miked@msmd-advisors.com
www.msmd-advisors.com
@mikemasseydavis
responsive, credible, flexible
© msmd advisors Ltd 2013

Mais conteúdo relacionado

Mais procurados

Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope CGI
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
When and why to use blockchain technology
When and why to use blockchain technology When and why to use blockchain technology
When and why to use blockchain technology Blockchain Council
 
Asean 1017 ezine_14pp
Asean 1017 ezine_14ppAsean 1017 ezine_14pp
Asean 1017 ezine_14ppPekerja lepas
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield EraPaul Hastings
 
Regulatory and compliance forum cloud computing for law firms
Regulatory and compliance forum   cloud computing for law firmsRegulatory and compliance forum   cloud computing for law firms
Regulatory and compliance forum cloud computing for law firmsDatabarracks
 
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20Kasia Szkuta
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 aIT Strategy Group
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceDavid Jones
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of ThingsPaul Hastings
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 

Mais procurados (20)

Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
When and why to use blockchain technology
When and why to use blockchain technology When and why to use blockchain technology
When and why to use blockchain technology
 
Asean 1017 ezine_14pp
Asean 1017 ezine_14ppAsean 1017 ezine_14pp
Asean 1017 ezine_14pp
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era
 
The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
Regulatory and compliance forum cloud computing for law firms
Regulatory and compliance forum   cloud computing for law firmsRegulatory and compliance forum   cloud computing for law firms
Regulatory and compliance forum cloud computing for law firms
 
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security Alliance
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 

Destaque

PostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb ProjectPostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb ProjectEmanuele Zamprogno
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analyticsMike Davis
 
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza   versione slideshareLe soluzioni digitali a supporto dei progetti di aderenza   versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshareMarco Morandi
 
Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!gitanesantaeuliaron
 
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...Maria Livia Rizzo
 
La responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealthLa responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealthMaria Livia Rizzo
 
Come affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3DCome affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3DMaria Livia Rizzo
 
Aspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicinaAspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicinaMaria Livia Rizzo
 
The Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and FriendsThe Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and FriendsStacy Kvernmo
 

Destaque (11)

PostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb ProjectPostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb Project
 
La salute e i big data
La salute e i big dataLa salute e i big data
La salute e i big data
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza   versione slideshareLe soluzioni digitali a supporto dei progetti di aderenza   versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshare
 
Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!
 
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
 
La responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealthLa responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealth
 
Come affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3DCome affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3D
 
Aspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicinaAspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicina
 
S.M. Iacus - Social Media, Big Data & Statistics
S.M. Iacus - Social Media, Big Data & StatisticsS.M. Iacus - Social Media, Big Data & Statistics
S.M. Iacus - Social Media, Big Data & Statistics
 
The Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and FriendsThe Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and Friends
 

Semelhante a Cloud adoption in the EU - and analyst's perspective (revised)

#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Jacklin Berry
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the CloudIron Mountain
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and ChainsTim Swanson
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR complianceSalim Benadel
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdfLaLaBlaGhvgT
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docxdurantheseldine
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksCloudMask inc.
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 

Semelhante a Cloud adoption in the EU - and analyst's perspective (revised) (20)

#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Cloud adoption in the EU - and analyst's perspective (revised)

  • 1. 1 Cloud adoption in Europe - an analyst's perspective Mike Davis Principal Analyst June 2013 © All images acknowledged © msmd advisors Ltd 2013 responsive, credible, flexible
  • 2. 2 © msmd advisors Ltd 2013 Running order The issues around Cloud are not new The thirst for cloud solutions (to problems) 9 questions and myths that need to be burst The things businesses haven't thought of How does legislation impact Cloud adoption? EU examples and initiatives Which legislation?
  • 3.
  • 4. 4 © msmd advisors Ltd 2013 The thirst for and benefits from cloud adoption • Rapid adoption – learnt the lessons from web apps • Rapid updates – without the pain of downtime • Flex and scale – without “Yee cannot break the laws of physics Captain” • Addressed more needs than originally envisaged • Scales exponentially (within contract and budget) • Allowed IT to focus on solutions rather than 'plumbing' • Better uptime than in house
  • 5. 5 These are all Cloud companies by design © msmd advisors Ltd 2013
  • 6. 6 © msmd advisors Ltd 2013 9 questions/myths about Cloud for EU CIOs 1. “I won't have control of my data” 2. “What if my provider get hacked?” 3. “How can I trust people I don't know to look after my data?” 4. “How can I be sure of my provider's privacy controls?” 5. “Can you guarantee it will be cheaper?” 6. “We can't use a generic platform, our business is unique, we need significant customisation of our software to address our business needs.” 7. “Why shouldn't I keep doing all our processing internally?” (It boosts my staff numbers, my salary and my profile) 8. “My regulator says I can't have personal data stored outside the country” 9. “All the Cloud service providers are American, thus they are subject to the Patriot Act and the US Government can size the data.”
  • 7. 7 © msmd advisors Ltd 2013 Control
  • 8. 8 © msmd advisors Ltd 2013 1. “I won't have control of my data” – Yes you will, and as a corporate entity you still have responsibility for your data too, no matter where it is and who is processing/storing on your behalf. If you are concerned about the controls, look closer at the contracts and do better due diligence. Banks and retailers do not have qualms about security companies transporting their cash.
  • 9. 9 © msmd advisors Ltd 2013 How secure is cloud?
  • 10. 10 © msmd advisors Ltd 2013 2. “What if my provider gets hacked?” – There was a recent exercise on social engineering hacking undertaken by so-called 'ethical hackers'. Of the 25 well known corporations they targeted, the majority were ‘captured’ within 15 minutes. The only successful defendant was Google. Unless you are the US government, you can't afford to invest in as much training and infrastructure as a provider. The real questions to ask are: 'How big is my security team?' 'How quickly can they respond to a threat?' More relevantly from a business perspective, 'How sensitive is the vast majority of information in my businesses systems?' I refer again to the canteen menu.
  • 11. 11 © msmd advisors Ltd 2013 3. “How can I trust people I don't know to look after my data?” – The question is 'Do you put the database management and backup responsibility in the hands of people who work for an organisation, whose only purpose is to deliver a trusted service? Or to your intern, who is at best paid the minimum wage (probably nothing at all), and when his/her partner says “can you come to the cinema now?” will choose the popcorn over the mandated procedure'.
  • 12. 12 © msmd advisors Ltd 2013 4. “How can I be sure of my provider's privacy controls?” – Because unless you are the intelligence service, they are better at it than you are. It's their focus and credibility. Like you they are subject to privacy laws, and should have the ISO 27001 and equivalent certification(s) (as should you).
  • 13. 13 © msmd advisors Ltd 2013 What do you NEED to keep private? Menus for the canteen Contracts? Payroll? Operating manuals? Sales figures? Research findings? Canteen menus?
  • 14. 14 © msmd advisors Ltd 2013 Cloud is cheap!
  • 15. 15 © msmd advisors Ltd 2013 5. “Can you guarantee it will be cheaper?” – NO. It should be - because the providers have economies of scale in terms of hardware, networks, and expertise. The real business question is 'Can it give me a better service within my current budget envelope?'. It should do - because in most instances it is likely to be more efficient, robust, accessible, and secure than an on-premise service. However, just as with the IT Facilities Management contracts of the 1980/90s beware of the costs of changes to service/processes/volumes that the provider will charge. In addition moving to cloud services is not a 'fire and forget' issue. You need to have robust and regular monitoring of all areas of the service provided.
  • 16. 16 © msmd advisors Ltd 2013 6. “We can't use a generic platform, our business is unique” – If you move to a cloud service you can take all your idiosyncrasies with you, but don't expect the service to be cheaper, because your provider will have to incorporate and train their staff on all those 'tweaks'. 60% + of the western world uses Google as their internet search engine, less than 1% of those customise the interface because the 'vanilla' product gives them the majority of what they need. The pareto principle (80-20) applies in information management/IT just as much as it does in the rest of life.
  • 17. 17 © msmd advisors Ltd 2013 7. “Why shouldn't I keep doing all our processing internally?” – Look at the previous 6 answers. Your job security and progression really depends on addressing the business needs of your organisation. If you cannot provide the service the organisation requires, it will find someone who can.
  • 18. 18 © msmd advisors Ltd 2013 The EU perspective – personal data
  • 19. 19 © msmd advisors Ltd 2013 Data Protection Act 1998 - 8th principle “Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data”.”
  • 20. 20 © msmd advisors Ltd 2013 'No go' zones for cloud adoption? X X X
  • 21. 21 © msmd advisors Ltd 2013 8. “My regulator says I can’t have personal data stored outside the country” – So? That becomes an explicit contractual requirement, a focus of due diligence and then on-going monitoring. No different technically than stating the cleaning contractor should wash the toilet floors twice a day. Chose a provider that can address that requirement, and remember the geographic restriction only applies to personal data or that specified by national security. You can store your canteen menus anywhere in the world.
  • 22. 22 © msmd advisors Ltd 2013 EU examples and initiatives
  • 23. 23 © msmd advisors Ltd 2013 Whose legislation is going to hold back cloud adoption?
  • 24. 24 © msmd advisors Ltd 2013 Whose legislation is going to hold back cloud adoption?
  • 25.
  • 26. 26 © msmd advisors Ltd 2013 9. “All the cloud service providers are subject the Patriot Act and the US government can seize the data” – There are a lot of scare stories around the Act. Yes if your data is on US soil there is a risk it could be seized, if it poses a threat to US national security. But how many businesses will that apply to? More importantly there are many other providers of managed services or cloud provision in different geographies who are not subject to the Act. Look at the real issues of service delivery and expected outcomes, and as with all business decisions make pragmatic trade-offs of the risks and benefits.
  • 27. 27 © msmd advisors Ltd 2013 Issues around cloud adoption We use procurement models for kit. not services (talk to the facilities manager) Bring your own (BYOx) can cause issues (though it shouldn't) Solution vendors don't like cloud (unless its their own – vertical integration = margins) Organisations need to keep/develop in house support (cloud is VANILLA) 3rd party add-ons not always available for cloud Granular Security can present challenges - apps designed for companies have a specific security mode Federated security for hybrid not yet addressed