Towards High Performance Secure Tech Savvy Organisation - Chandrasekhar

Preview:

DESCRIPTION

Towards High Performance Secure High Tech Savvy Organisation

Citation preview

Towards a High Performing, Secure and Tech Savvy

Organization - Every CIO's Goal

V Chandrasekhar

Change – Every One is Loosing Control

Fast Changing Technologies Younger population in china / india Older Generation manning enterprises Fast changing business models Destructive competition Emergence of younger organisation Old order gives way for new Impact of technology has never been greater in

history of business and society than it is now It can only accelerate We are all bloody lucky that something hasn't

obliterated IT on earth Connected world 9/11, SARS.

CIO Current - Challenges

Size Digital Divide – customers,

employees Strategy – Tactical, Strategic Tactical - Minimization of

operational risk in legacy systems Data Quality MIS Quality Security Frauds

CIO Future - Challenges Complexity Integration New Systems Integration of Legacy with New Systems IT enabled transformation Identify costs Improve efficiency BPR Incremental business to pay for IT

CIO Future - Challenges CRM DWH HRIS Compliance - Basel, SOX, AML, Patriot

etc M&A Retaining Talent Educator Role to Top Mgt Enhancing Business Value of IT

CIO in PSB Technology selection issues Unequal competing platforms May be we go thru two or three cycles of

implementations Process, organisation , business issues not

addressed No change in business models or

organisation structure Internalisation of change

CIO Role Service Provider Organisation – COO CIO to CEO More of Service Integration Vendor / Contract Management In Indian Banking Sector – ISV did not

know business and Business did not know IT. Most purchases are PPT driven / Consultant Driven rather by enlightened decision making process.

CIO

CIO to PIO - process information officer

BIO - Business Information Officer CIO – CEO Opportunities Part of Business Career as CIO is over Skill retention issues

Service on Demand

People donot want computers they want to execute programs

Access to IT Services Computers will be only in Data

Centers End point - only information access

devices and authentication

New SW Selection Integrate ( with existing legacy SW ), Co

exist, Replace High availability and scalability to be able to

support increased trade volume. Silos continue to exist as long business and

IT get misaligned Middleware will thrive for some more time Web Services will emerge Need for ERP for banking industry

Business Sophistication of customer Smart employees Operational Efficiency 360 degree view of enterprise Industrialisation of banking – through

application of technology to handle volumes IT for creating Agile Enterprise Adaptive Enterprise / Zero Latency Enterprise by

building business processes via simplification, standardization, modularization, and integration

Enabling Environment Sustained - Vision, Goal and Passion Continuous measurement – Benchmark Strategy, Plan, Implementation is easy Still to come out of compliance culture We operate in a world where every business

decision triggers a series of IT events The link between business and IT has never

been more essential, nor has it ever been more complex.

Opinions can change Strategies

Financial district Location Data centers Location Accounting standards Process standards Charter of accounts M&A

Compliance Basel II – Risk Mgt ( Credit, Mkt, Operational),

Capital Adequacy , Supervisory Controls to manage risk and capital, Corporate Governance – disclosure norms (Tracking, Modelling, Disclosure of Risk and Capital Adequacy)

AML, Patriot Act ( 2001), SOX ( 2002) , eMail Retention Rules ( SEC 2003)

Needs Data Integration, Application Integration STP – Seamless Txn Data Compatibility,

Standards, Eliminate Manual interventions, Enabler for faster settlement cycles, Reduces Operational Risk. ISO 15022 Messaging Std for STP by Swift

Security – COBIT ( ISACA), BS 7799

CIO in PSB

Political pressures – be fair Technology changes donot impact my

decisions as much as top mgt changes in PSBs

Skill Levels, Retention Issues Frequent Transfers

IT in PSBs

Infrastructure Cost of doing business Still to emerge as Weapon to counter

competition or reduce costs or increase operational efficiency

IT is not IT procurement – provide desktops or servers

Technology issues

Create a standards based computing environment

Convergence of computing and communications – disruptive computing

IT no more confined to glass houses like MF

Explosion of Information Information Life Cycle Mgt Creation of Dynamic Architectures

Technology issues

Computing becoming ubiquitous Utility model TCO

Top CIO challenges – people, process,

technology Getting right sponsor Getting right talent – skill identification,

competency mapping Retaining right talent Deploy right talent – role clarity Getting right technology Vendor selection Issues Deploying right technology under poor

infrastructure conditions Getting right business leaders for getting

right BPR done Getting right business value

Top CIO challenges – people, process,

technology

IT administration Project mgt Vendor mgt Technology is the challenge Poor infrastructure Security CIO like two or three wild

horses – still staying alive – technology, business , consultant

Top CIO challenges – people, process,

technology

IT administration Project mgt Vendor mgt Technology is the challenge Poor infrastructure Security CIO like two or three wild

horses – still staying alive – technology, business , consultant

CIO Challenge

Every thing is possible, given the right Time Cost Power CIO – change agent

New Focus BI KM DWH CRM RISK ALM

Content mgt Portal designs Collaboration Workflow

automation

CIO Challenges Fragmented views Integration Enterprise view Data as asset Mining of data DSS Transaction systems to information

mgt systems

Future Rural India Subsidising the Urban

India This imbalance should be corrected Use of IT for appropriate tasks WTO etc to provide access to Asian

markets Basel-II , Risk Mgt etc – to provide

comfort level for western investors into Asian Companies

Future Architecture Audio Visual Computing Very Large Databases Graphics & Rendering Machine Learning Work Load Mgt Dynamic Reconfiguration Self Healing Architecture Seamless Wireless Computing On Chip / Board Integration – Cache, Memory,

LAN, Modem, Graphics, I/O Ports, Device Drivers

Future Architecture

RFID IP Telephony Video Conferencing Sensor Based Computing Robotics Machine Intelligence

Client / Server

Machine Proliferation Loss of Control Complexity

On Demand Introduction to the Grid The Business Case Early Adopters Panel Technology Futures Panel On-Demand Data Storage: Is the Future Bright or Hopeless? The Truth About Virtualization Road Map for Automation On-Demand Case Study On-Demand Servers Networking On-Demand Autonomic Computing On-Demand and the Data Center

MF

Single Manageable Resource Bullet Proof Manageable

Infrastructure Re-Architecture

Re-Architecture of Legacy Systems ( Transaction Oriented / Batch )

Security 15% of Annual IT Budget now it is less than 5% Data volume continues to grow by a factor of 2x every 12

to 18 months must harness as a corporate asset. Business solution integration must migrate to a plug and

play platform CIOs need an environment founded on modularity,

standardization, automation and end-to-end manageability."

Infrastructure Re-Architecture

Storage Consolidation Server Consolidation Data Center Consolidation Network Consolidation Single Sign on PKI DRS BCP Wireless Office

Architecture

Computing Platform Convergence Storage Platform Printer Consolidation Communication Platform Security Platform Virtualisation for better utilisation

basic requirement for on demand computing

Less is more - Consolidation To reduce IT costs To reduce complexity To improve resource management To improve availability . . . with up to

99.999%availability To improve mission-critical application

performance by up to 80% To reduce IT staffing expenses by up to 85% To recover your investment in as little as one year

Infrastructure

MF to Open Systems HRIS Centralised Authentication

Technologies Portal Design Security / Vulnerability Application to Service Orientation Web Services

Infrastructure Re-Architecture

Infrastructure Mgt Asset Mgt SW Updates Security Monitoring NIST Security Check List Security & Efficiency / Agility DWH BI Framework

Infrastructure Re-Architecture

Architecture migration of a running system

Wireless and Mobility Security Windows Platform On Demand Computing The Digital Enterprise Web Services

ISV - IT & Business

IT Blindness – inability of IT layers to deliver business results

Business Blindness – inability by business to articulate its IT needs

Consultants Blindness Customer Blindness ?? Or is he

smart

IS Architecture

IS organizations in enterprises need to adopt a framework to manage the boarder picture than just providing transaction oriented systems and utilizing interfaces available to access the transaction systems through Data warehousing.

SOA Producer, Consumer, Registration of Service Location transperancy / Code Mobility ( across any

network) Uses Published Interface - Network Addressability of

Service ( Intranet / Internet) Interoperable - Web Services consist of four

technologies in combination that provide an implementation of an SOA.

You can use Web Services to provide all of the properties necessary to build a service. Web Services include HTTP as the primary network protocol, SOAP/XML for the payload format, UDDI for service registry, and WSDL to describe the service interfaces.

Dynamic Self Discovery & Reuse

Semantic Web First envisioned by Tim Berners-Lee, the

Semantic Web is complementary to the World Wide Web and consists of machine-usable information

Semantic Web services are an extension of Web services

Web Service Description Language (WSDL) provides a description of how a Web service will communicate, whereas Semantic markup provides details about what a service provides and why.

Security Threat Perceptions

SOHO Enterprise High Security

Policies Environmental Developmental Policy Deploymental Policy HR Policy

Security Digital Certificates SSL SET Kerberos IPSec VPN EMV Firewall IDS

Security Size, Spread, Low IT Literacy , Lack of IT Culture

etc increases risk More the channels more security vulnerabilities More the spread more the vulnerabilities Faster the rate of change greater the risk Increased connectivity increased risk

To protect company assets, To gain a competitive advantage, To comply with regulatory requirements, To keep your job

Authentication technologies – centralised authentication mgt, Centralised channel mgt, No Software for Fraud Mgt

Security Security at End point – Transport – Decision

Making Points Layered Security – Local Desktop / Server /

LAN, WAN, Data Center, Network Security technology, Security culture (like CRM

Culture), Lead by example Security addressed only after its breach – one

can see that in airports Need for Security Policy, Security Framework Technological, Procedural/Organizational,

Human/Cultural, Audit

Mobile World More than 50 percent of jobs are mobile—away from

a physical office. In the United States, an average worker spends only

two days in formal training programs. To date, over 500 million Web-enabled mobile

phones have been shipped to customers. Multipurpose hand-held devices, such as PDAs and

cellphones, will out sell laptop and desktop computers combined by 2005.

The enterprise market for mobile computing is estimated at $30 billion.

Collaboration and the Emerging Virtual Workforce

IP Telephony and Mobility Instantaneous Online Communications:

Instant Messaging, Presence, and Blogging Web, Video, and Media Conferencing

Wireless World

Wireless devises from being passive to active devices

Mobile Computing with HDD, WiFi, Blue Tooth etc – connected to corporate , client networks

Business / Personal Data in Mobile Major Access point in Future

Thanks

Recommended