FIA Prague Preparation February 6, 2008. Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Achieve Benefit from IT Projects. Aim This presentation is prepared to support and give a general overview of the ‘How to Achieve Benefits from IT Projects’
The Role of Environmental Monitoring in the Green Economy Strategy K Nathan Hill March 2010.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Creating Collaborative Partnerships in Business
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.
Jose Jimenez Director. International Programmes Telefónica Digital Future INTERNET – SMART CITIES Advancing the global competitiveness of the EU economy.
David Kaufman Associate Administrator for Policy, Program Analysis, and International Affairs Toward More Resilient Futures: Putting Strategic Foresight.
MIS 648 Lecture 131 MIS 648 Presentation Notes: Lecture 13 Managing IT Offshoring: Is it a good thing?
Nick Wainwright HP Labs / Effectsplus project. The report of a consultation of the Future Internet Assembly – a cross disciplinary assembly of researchers.
How are service providers helping their customers to deliver IT as a Service? Peter Glock – Orange Business Services 18 May 2011, presentation to Europe.
A Survey of Risk: Federated ID Management in Cloud and Grid Computing Presentation by Andy Wood (P )
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Unify and Simplify: Security Management
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Multi-faceted Cyber Security Research Group edited strategy.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Dr. Jana Jagodick Polytechnic of Namibia, 2012 Project Management Chapter 3 Project Management for Strategic Goal Achievement.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Plug-In B17 Organizational Architecture Trends.
© 2011 The SESERV Consortium 1 SESERV and Privacy Socio-Economic SERVices for European research projects Eric Meyer University of Oxford FIA Budapest,
Real Time Communications: An Enterprise View Rodger M. Will Ford Motor Company Wednesday, April 21, 2004.
1 SECURITIES REGULATION: TRENDS AND CHALLENGES Washington D.C., April, 15 th 2003 Dr. Doğan CANSIZLAR Chairman of the Capital Markets Board of Turkey Chairman.
Enterprise Cybersecurity Strategy
Ken Brumfield | Premier Field Engineer Ward Ralston| Group Product Manager Microsoft Corporation.
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Security Vulnerabilities in A Virtual Environment
Digital Ecosystems Re-tuning the user requirements after 3 years Digital Ecosystems Re-tuning the user requirements after 3 years Towards Business Cases.
Describe the potential of IT to improve internal and external communications By Jim Green.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
NREN Trust and Identity Strategy Ann Harding, SWITCH Cambridge July 2014.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
“From GRID research to GRID business” Francesco Giglio
IS3220 Information Technology Infrastructure Security
THE FUTURE INTERNET PPP User-driven Innovation Future Internet Conference October 24, 2011 Nuria de Lama Representative of Atos Research & Innovation.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
G-Cloud - The Delivery of a Shared Computing Platform for Government Ian Osborne Director, Digital Systems KTN Intellect.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Business, Operations and Supply Chain Strategy (MS 911) Global logistics and risk management.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Information Technology Sector
IPv6 within the Australian Government
Compliance with hardening standards
Standards for success in city IT and construction projects
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
BLACKVARD MANAGEMENT CONSULTING, LLC
How to Mitigate the Consequences What are the Countermeasures?
Smart Learning concepts to enhance SMART Universities in Africa
1/18/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
2/15/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
Cloud adoption NECOOST Advisory | June 2017.
Cloud Computing: Concepts
The MobileIron® Threat Detection difference:
Convergence “must haves” Common ICT ETP Challenges
Presentation transcript:

FIA Prague Preparation February 6, 2008

Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers and influencers... We do understand the drivers and influencers... We aim to articulate the space of possibilities We aim to articulate the space of possibilities... to develop a strategy that is robust to many possible futures... to develop a strategy that is robust to many possible futures

We are here Our approach for Trust, Security, Privacy in FI Identify key drivers Identify key drivers Describe high level scenario Describe high level scenario Illustrate possible outcomes Illustrate possible outcomes Describe TSP issues and challenges Describe TSP issues and challenges Develop technical roadmap Develop technical roadmap

Trust & security scenarios What if all ICT infrastructure is shared and service oriented? What if business is dispersed to a global ecosystem of service providers deep process and information integration ? What if the Future Internet develops into and information economy? What if people trust devices they own and hold, not services? What if the future internet is subject to relentless attacks from cyber criminals?

Infrastructure-centric scenario IT becomes a service or ‘utility’ Cost reduction a driver Cost reduction a driver Green agenda Green agenda Business model issues? Business model issues?  After bankruptcies of several IT utilities, companies realise these are business- critical functions Dependability Dependability Security of provision Security of provision Business model Business model Trusted in service provider Trusted in service provider Compartment- alisation Compartment- alisation

Service-ecosystem scenario: Business moves into the cloud Entire service value chain is delivered through the Internet, via dynamic composition of ad-hoc services Entire service value chain is delivered through the Internet, via dynamic composition of ad-hoc services Deep integration of process and data Deep integration of process and data Dynamic service trading through exchanges Dynamic service trading through exchanges Accountability Accountability Transparency Transparency Responsibility Responsibility  Where is my data?  Who is liable?  What is the jurisdictional state?  Who controls exchanges?  Real world devices?

Information-centric scenario Information is the foundation of services Capture, management and exploitation of data and information is the foundation for services Capture, management and exploitation of data and information is the foundation for services  Issues of privacy  Digital trail  User generated content  Information sensed from the real world Information stewardship Information stewardship User centricity User centricity Revocability Revocability Scale Scale Interaction with real world Interaction with real world

Client centric scenario Trust the physical, mistrust the virtual Personal information turned to personal devices, acting as mediator  People trust devices not services  reaction to years of breaches, information misuse, …  User centric position   personal devices implement separation of concerns  data minimisation concept (minimal disclosure)  widely accepted by federation of services, social networks,  Enabler of peer-peer interaction,  ‘real world’ client interaction

Threat-centric scenario The Future Internet is an unsafe place,.. Dependence on ICT so critical (remember that even today hackers keep the networks running because it benefits them more than tearing these down) Dependence on ICT so critical (remember that even today hackers keep the networks running because it benefits them more than tearing these down)  Dark scenario of what would happen if threats such as the Estonian scenario would take place future-proofing against known and currently unknown threats and vulnerabilities, future-proofing against known and currently unknown threats and vulnerabilities, assessing and managing risks, liabilities assessing and managing risks, liabilities managing oversight and control, including at a state level managing oversight and control, including at a state level evolutionary and predictive threat models, evolutionary and predictive threat models, self-organising and self- healing security mechanisms self-organising and self- healing security mechanisms......

Trust & security scenarios

Next steps Identify Drivers Generate Many Scenarios Consolidate Scenarios Research Challenges and technologies We are here