Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
4. Multi-cloud security “Maybe I’m old school, but I don’t think the CIO
should be worried about directly generating
When exploring new cloud-based services, CIOs revenue,” Fuhrman says. “I’m starting to see this pop
now need to ask about security across multiple up more and more among my peers. To stay
platforms, says Laurent Gil, security product strategy relevant as a CIO, many are working to try and
architect at Oracle Cloud Infrastructure. productize themselves. While there are benefits to
thinking that way, I think it can also be a recipe for
“Traditionally, multi-cloud leads the enterprise to defocusing the team and the boardroom. When it
manage many different, often incompatible and comes to revenue-generating opportunities, the
inconsistent security systems,” Gil says. “We think place the CIO belongs is focusing on those projects
that selecting cross-cloud, cloud-agnostic security and digitizing the business into an automated
platforms is now fundamental in ensuring platform at scale. We need to stay focused on
consistency, and most importantly completeness of driving costs out of the business and scaling from a
securing enterprise-wide assets regardless of where go-to-market perspective. That’s how a CIO should
these assets are living.” focus on revenue.”
According to Gartner data, about two-thirds of Organizations that aim to incorporate agile methods
business leaders think their companies need to sometimes end up limping along in a sort of hybrid
speed up their digital transformation or face losing model that incorporates agile practices but also
ground to competitors. more linear “waterfall” methods. In short, the worst of
both worlds.
Most companies will continue on the same path until
they’re forced to do otherwise, says Merrick Olives, Tangoe’s Murray lays it out: “Developers are coding
managing partner at cloud consulting firm Candid to specific spec sheets with little conceptual
Partners. understanding of how this button or feature fits within
the overall user experience. A disciplined approach
“Tying IT spend to strategic business capabilities is needed to pull this off, where the solution to
and answering the question ‘How will this make us specific problems are addressed within a certain
more competitive?’ is essential,” Olives says. “Value release. Each release is then coordinated for a set of
stream-based funding models as opposed to project- sprints so that a comprehensive solution that adds to
based funding are becoming more and more the UX is achieved with every release and not just a
effective at tying board-level objectives to budgetary collection of requested features that may or may not
influences. The cost structures and process support one another.”
efficiencies of legacy vs. a nimble digital capability
are much different — nimble is less expensive and
much more efficient.” 8. Outsourcing risks
In addition to quality concerns, outsourcing opens up “Issues such as privacy, security and device
security threats that are well known. “The specific addiction must be addressed immediately by big and
threats for CIOs that should be top of mind are the small players in the industry,” Wong says. “As a
insider and the contractor,” says French Caldwell, sector we have to be responsible corporate citizens.
chief evangelist with MetricStream and a former We need to show that we care about the people we
White House cybersecurity advisor. “Until we move claim to be serving and act in their best interest.
away from passwords for credentials, humans will People trusted us and we should be very respectful
continue to be the biggest threat.” in honoring that.”
9. Business results
Matt Wilson, chief information security advisor at MANAGING PRIVACY IN THE DIGITAL ERA
BTB Security, says there’s a disconnect between Sharing has become second nature.
what’s set aside for the IT budget and measurable
- The more our lives become digital, the more our
results for the business.
personal data travels. We share everything,
through browsing, purchases, social activities
“Most organizations haven't taken a hard, brutally
and all the services we subscribe to.
honest, look at their current spend,” Wilson says.
“There's often too much momentum behind the way We learnt the hard way we are exposed!
things are currently done, the solutions already
- At a time when privacy is increasingly fleeting,
acquired, and the processes built over a decade to
we want to regain control and we are demanding
allow for any meaningful change. Instead,
new rights to protect ourselves.
organizations may cobble together partial solutions
-
that can't ever fully address the root of the IT
challenge — for example, Equifax not patching a 3 REASONS TO BELIEVE IT
known vulnerability. We live with IT pain. We waste
1. Constant Tracking
dollars. We frustrate our talented resources with
- Technologies, always more evolved and
solvable problems that are rendered completely
invisible, follow us everywhere. Beyond our
impossible in our companies by momentum. For
digital activities, we track everything including
2019, we should refuse to be captive to history.”
our bodies’ functions, we know, EVERYTHING
about ourselves and others.
10. Tools for a digital native workforce
Illustrations:
Between 2000 and 2010, computers’ ability to
Christian Teismann, SVP of global enterprise
recognize people in photos improved by 3 orders
business at Lenovo, argues that a new workforce of
of magnitude.
employees who grew up with digital technology
demands new ways of working that will boost the
44% of people are less inclined to shop in a
bottom line.
place they know they are tracked.
“Gen Z, for instance, expects control over the types
With the rise of sensors, biometrics, drones &
of technology available to them,” Teismann says.
more, it’s getting almost impossible to remain off
“They favor the technology they grew up with and
the grid. Anonymity is becoming elusive. […] As
use in other spheres of their lives in the workplace
we move further into the digital age, we’re
— as well as a recognition of personal and cultural
starting to both fear and resent technology.
elements. Tech-enriched, assistive spaces that are
configurable and flexible will continue to trend.”
2. The Fear of BIG BROTHER
- Edward Snowden’s revelations about PRISM - If we remain eager to share everything, we seek
raised the fears of state surveillance. A question to better control the data we let slip into the
is now on or minds: if tech giants collaborate digital world. We use simple strategies and new
with governments, what else are they doing with sharing tools to compose our private and public
our data? With the proliferation of hacking information.
scandals, fears are getting stronger and Sharing more to hide more
generate tensions around the notion of privacy. - Danah Boyd, American researcher on
social networks, explains that teenagers
Illustrations: protect their privacy by sharing just a
In the few months following the PRISM scandal, tiny bit of information about themselves.
American cloud companies suffered a los The attention is focused on the few
estimated around 35 billions of dollars on their things they share and the rest if left
sales. alone. Their private life remains private
this way.
41% of French people declare that on social Junk Email Address
networks, nothing can be re-establish their trust - Many email services are only
(not privacy policies, nor technical guarantees, accessible online in exchange for
nor reputation, …) personal data: we sometimes give them
false information to avoid being tracked.
Today, on our market, it’s an asset not to be At a time we have more and more email
America! Clients are mostly interested by the addresses per person (75% of French
products, but professionals are more sensitive to people have several), we often use one
who owns the data, and where. for junk emails and sometimes using
one of the many disposable email
3. Growing Demands services available online.
- Right to transparency, right to oblivion, right to Privacy Policies
know and understand privacy policies: we are - Instead of giving up social networks, we
getting organized, in order not to lose control just use them is more clever ways.
over our private lives. We demand more power, Friends’ lists, privacy settings
against governments and tech giants, who are restrictions: in 2013, 77% of people
using us as products, selling our data. changed their privacy settings on
Facebook.
Illustrations: New Types of Network
75% of people think it’s useful to know what - When massive social platforms seem
brands make their data. more and more suspicious, we prefer
using new social networks, which seem
Smartphone users are ready to pay 5$ on to better protect our privacy.
average for an app that would guarantee their
privacy. Alternative Tools
- We are conscious the exploitation of our
While we’ve concentrated on the growth in size personal data is becoming abusing and we want
of our networks, even if it means leaking large to act. New solutions and alternatives exist to
quantities of data, we now favor their quality and avoid tools like Google, to better protect
their security. ourselves.
Knowing to control better
MANIFESTATIONS ON THE CONSUMER SIDE - Tools that are able to gather information
on the traces we leave behind are
Popular Movements multiplying, allowing us more power on
- Because we don’t really know what states and managing our connections.
companies make of our personal data, a Advertising Blocks
movement of discontent is growing. We are - Targeted advertising get criticized often
getting organized and we are claiming our right about the (lack of) respect of personal
to anonymity and privacy. data. A lot of applications, like AdBlock
- E.g., Right to Oblivion in Europe, The “Stop are now available and widely used
Watching Us” Petition (more than 250M downloads and more
than 20M daily users in April 2014 for
Thoughtful Sharing
AdBlock Plus), in order to avoid the
diffusion of pop-up windows, banners consumers. From the first contact, it is crucial to
and other invading advertising formats. explain and justify each question, each request of
Alternative Browsing information.
- To avoid using Google, we can turn to GOOGLE
new solutions, DuckDuckGo, IxQuick, - Google produced a video to clearly
or Qwant are new web browsers which explain the processes that would permit
keep our searches really private. them to share personal information with
governments. The brand attempts to re-
Digital Invisibility Cloak
establish trust with its users, giving
- If you are suspicious about technology, you details about the process and the
might just as well seek to disappear entirely. We different barriers they try to put to avoid
can choose extreme but efficient solutions, revealing information. An interesting
which are used more and more, to guarantee first initiative from the tech giant.
our complete anonymity. This way, we’ll be able APPLE
to discuss, exchange and surf the web in a pitch- - The brand published its first «
black environment. Transparency Report » in November
All Encrpyted 2013. Like Google, they detail and
- Military-graded encryption is becoming explain how they came to share data
the new norm. thanks to innovative with governments. They also try to
products and services, we protect our reassure consumers, telling their model
communication from outsiders’ is not based on the collection of data
intrusions more efficiently. and it will never be.
- The Blackphone, Encrypted emails,
Wickr.
Anonymity’s Glory #2 INSISTING ON SECURITY
- Anonymity, on networks and on various
- At a time when most brands are developing
web platforms we use, is not always
connected objects, thinking about the internet
guaranteed. New solutions allow us to
security is more than crucial: 84% of French people
turn this around for good.
see them as a progress and 60% want to use them
- Safer connections, obscure
for their personal security*. Thus, reassuring people
transactions.
about privacy and security will be the key to
nurturing a new relationship with the ever more
connected consumers.
IF THERE IS A GROWING AWARENESS, THERE’S
ENCRYPTION RACE AT YAHOO
ALSO A TRUE PARADOX:
- After PRISM, Yahoo decided to encrypt
39% of people found it was useful to share personal everything. After making all connections
information with a brand. HTTPS, the company has encrypted
the totality of email accounts data since
61% of internet users would trade privacy for truly
January 2014 and the data from its data
personalized offers.
centers since March 2014. At the
beginning of April, the Chief of Security
also announced the intention to encrypt
IMPACT ON RELATIONSHIPS WITH CONSUMERS
the whole Yahoo platform. They are
IN THE AGE OF «BIG DATA», RELEVANCE AND pushing security in their development,
MODERATION ARE THE KEYS TO SUCCESS. to re-establish trust from users.
Today, if companies focus only on volume and
the accumulation of data, it is necessary that they
#3 GIVE UP CONTROL
change their approach. To (re)establish a lasting
relationship of trust with consumers, brands need to - To reassure consumers, brands have to transfer the
become clever with their personal data collection. control of the relationship from their hands to the
consumers’. Allowing them to know what data they
own, who uses it and what they do with it, will be an
#1 PROMOTING TRANSPARENCY efficient means to avoid a doubt crisis towards
- Brands need to be clear and explain what they make brands.
of personal data – this can be a way to allow them to «MYDATA» PROJECT
rebuild a relationship of mutual trust with their
- From CRM, are we going towards Technology is an ever-changing playing field
VRM ? The consumer will soon be able and those wanting to remain at the helm of innovation
to manage his relationships toward have to adapt. The consumer journey is charting a new
brands, rather than the contrary. In the course and customers and companies alike are
UK, the « MYDATA » project is going in embracing emerging technologies. As the IT industry
this direction. With the support of the trends such as cloud computing and SaaS become more
government and many brands (HSBC, pervasive, the world will look to brands who can deliver
MasterCard, Google, T-Mobile,…), the with accuracy and real-time efficiency.
program would allow consumers to
keep a perfect track of what data is
known by which brand. They could then To help meet the demands of a technology-
control and keep a trace of what brands enabled consumer base, businesses and solution
know about them. providers must also turn toward the latest trends and
FACEBOOK REINVENTS ITS possibilities provided by emerging innovations to realize
CONNECTIONS their full potential. But, where to begin? These are the
- During the F8 conference, Facebook emerging trends businesses need to keep their eyes on
announced two major changes to come in 2020.
regarding the management of personal
data. Users will be able to precisely
select which data they are willing to AI
share and an anonymous FB login will Artificial intelligence holds significant potential
be created to register on apps. The for businesses. While we have yet to achieve the full
company is now clearly aware of the spectrum of capabilities frequently at the center of
real need of reassuring the public and is futuristic cinema, AI is poised as a tool of choice for
looking for efficient answers, to businesses and solution providers. As is often seen with
preserve its hegemonic position on the social media, AI, combined with machine learning, can
web. be a powerful combination. Businesses can use AI to
achieve cost-saving benefits, streamline workflows,
enable more efficient communications, improve
#4 BRING ADDED VALUE customer satisfaction, and provide insight into
- When brands ask for personal data, consumers purchasing behavior.
expect them to use it in the most clever way
possible, to receive relevant offers, with a real
added-value. Brands have the capacity to be of a Additionally, machine learning can analyze large
better service to their consumers and to respond to datasets and provide scaled insight. We are currently
their needs, in a more than ever personalized way. just scratching the surface of how machine learning and
BURBERRY « CUSTOMER 360 » artificial intelligence can work together to enable
- Pioneer of the luxury digital store, businesses. (Think of IT-industry giants such as Google
Burberry also developed an interesting and Amazon.) Current applications provide huge growth
customer experience. They offer their potential for solution providers who can fully understand
consumers the possibility to create a the capabilities of AI and tailor solutions to meet
profile where they can define their business demands. Businesses can also employ AI to
preferences and their fashion phobias, identify new product and service opportunities.
as well as tracking their trials and
purchases. Consulting their profiles,
sales persons can advise them. A Blockchain
personal shopper who knows you better Past discussions of blockchain are often hinged
than anyone, at the moment you enter on cryptocurrency, but the real power lies in the
the door: this is a real extraordinary immutability and transparency of a blockchain. Due to
shopping experience. the fixed and highly visible nature of blockchains, this
trend has been widely accepted to have financial
applications, and often informs discussions of bitcoin.
However, the business benefits are much more far
10 EMERGING TRENDS IN INFORMATION reaching.
TECHNOLOGY FOR 2020
The blockchain is an information system that
holds promise for supply chain management, enabling
Edge Computing
transparency into the origin and journey of materials
from origin to product. Blockchain technology will also Edge computing is a decentralized model which
allow for better record management, providing a places computing nodes closer to the source of
snapshot of any record from its origination. This could be interaction. Gartner defines edge computing as a model
used to verify orders, purchases, returns, receipt of where “information processing and content collection
product, you name it. and delivery are placed closer to the sources,
repositories and consumers of this information.” This
model optimizes technological interactions and reduces
Another cryptocurrency utilizing blockchain latency at the point of origin to enable more effective and
technology is Ethereum. This cryptocurrency uses smart real-time data consumption. Edge computing is quickly
contracts to ensure delivery of conditions. Smart becoming the most efficient path for localized
contracts release data when both participants have met interactions.
the criteria of an agreement. Smart contracts offer
endless capabilities for ensuring agreements are carried
out and therefor can help position you as a trusted IoT
brand.
As the world becomes more and more digitized,
informed business is the key to success and internet of
things provides greater clarity into consumer behavior.
Cybersecurity as Critical Business Function
The Internet of Things is increasingly offering business
Cybersecurity will no longer operate as an opportunities in the form of data collection and analysis.
addendum in the world of information technology. As In fact, IoT is the most widely adopted technology in
companies leverage emerging trends and move more CompTIA’s emerging tech track.
toward cloud computing, cybersecurity will become a
critical business functionality and will be an integral
business process. Unlike traditional data collection methods of the
past, the Internet of Things is a conglomeration of
devices that interact, providing substantially greater
Data protections and PII are real-world concerns insight into how products and services are being applied
that are steadily creeping to the forefront as media for everyday tasks. As more devices become IoT
coverage of data breaches affect our trust in brands. enabled, businesses will be able to design products with
Making information security an operational necessity will a greater understanding of pain points.
position a business as a trusted entity and ensure
smooth delivery of products and services.
Quantum Computing
Quantum computing offers unique opportunities
Drones
for predictive analysis that extend beyond the capacity of
Drones are helping to transform certain verticals, conventional computing. Quantum computers leverage
giving an edge over competitors and offering a the principles of superposition and entanglement to
technologically powered physical connection between process information on an exponential scale. While
businesses and end users. The remote capabilities of Google came on the scene in 2017 with a promise of the
drones coupled with AI applications are transforming largest quantum computer, IBM has actually made it
business in the industrial, public safety, construction, and possible for businesses to leverage this technology.
insurance sectors, just to name a few.
3D Printing
The business applications for 3D printing are
endless. The ability to customize a product according to
personalized specifications will allow businesses to
provide nearly limitless possibilities. In recent years,
providing this kind of customization required either
significant reprogramming or manual intervention. With
3D printing, personalization is now one more task that
can be automated. 3D printing also enables the use of
various materials that offer cost-saving and
environmentally sustainable benefits.
5G
The speeds accomplished with 5G greatly
outpace those seen with previous networks. 5G offers
the supporting foundation that businesses can leverage
to embrace emerging technologies. When
unencumbered by latency issues, businesses can
provide greater capabilities and service. Reaching
consumer bases via mobile devices and smartphones
will soar to new heights as the IT infrastructure for 5G
expands and becomes more pervasive.