Skip to content

Archive for


Transitioning to the Cloud

Today I am presenting for you the same talk I gave at the CeBIT Cloud 2012 conference in Sydney. Entitled, “Transitioning to the Cloud”, the presentation covers three areas:

  1. If you want to transition your business to the cloud you need to Think Cloud – Cloud, as I see it, is as much a state of mind and you need to embrace this thinking to really make full use of its potential;
  2. Some examples from my personal experience of using some of the large Cloud providers’ offerings, and why they are more than what they superficially appear to be; and
  3. Some tips on adopting Cloud (previously covered in an earlier post)
One of the key messages is that when 19th Century industrialists were offered utility power from a central provider for the first time, all they could think of was that their lathes would keep turning – they didn’t see electricity as a solution to all sorts of unimagined potentialities (such as lighting). The parallel is to ask the question, what are we missing out on today, what hidden potentialities exist in Cloud that we haven’t yet figured out?


Information Security – A New Frontier?

Traditionally, companies have focused their security efforts on protecting internally managed, internally generated information from reaching unintended audiences. This includes unpublished financial performance, sensitive employee and customer data, intellectual property, current tenders in progress, business strategic plans and so forth.

At the same time, public information specialists have ensured that the company’s public face, its brand and reputation, are protected and enhanced. Never the twain shall meet.

IT, working in a vacuum, has increasingly espoused the philosophy of control and containment. The common wisdom is to manage what you can control, work within your sphere of influence – because things that happen outside your control are just that: outside your control.

The rise of social networking is changing this, but company IT departments are slow in recognizing this shift. Here is an illustration.

I was at a luncheon on Information Security hosted by PriceWaterhouseCoopers recently and was taken by a comment by one of the presenters. He said he was encouraged that in previous years we were talking about IT Security, now we were talking about Information Security, and he hoped that in future years we will have moved to talk about Information Risk.

This started me thinking, so I posed a question to the panel: We talk about protecting endogenous, or internally generated information a lot, but what about exogenous, externally generated information? This is the stuff that happens in the public domain – customers, the media, even employees to some extent talk about the company and its products in the public arena. This information pertains to our company, its products and services, but it is generated externally. I made the comment that in the past we could control to some extent this exogenous information, but today, with Twitter, Pinterest, Facebook, Youtube, Blogs etc, the public has a lot of leverage. I asked them for their thoughts on security over exogenous information in this new world.

Their response? They told me that companies need to think long and hard about allowing staff to access Facebook and Twitter at work.

It seems to me that PR and marketing people are a LONG way ahead of IT people when it comes to this type of information security. Blocking  access to staff to social media at work is like holding up an insect screen to stop a tsunami.

It is past time that IT managers broaden the scope of their security thinking and engaged with other areas of the business to form a coherent plan designed for the modern era.

%d bloggers like this: