Mobile as a strategy
“Opportunities multiply as they are seized.”
Sun Tzu
Alliander IT CIO Office
Michel de Goede
Alliander introduction: EU policy
Alliander introduction: practice what
you preach
Alliander introduction: vital
infrastructue and security
A new era emerges
An era that will bring a new wave of
information-age innovation
An era that will move away from brick
and mortar
Into the virtual world
Virtual World
Predictions are as follows:
Source: Sogeti VINT
And then there are these:
Source: Sogeti VINT
1/6 Biohackables: Implanted biochip
Source: Motherboard
1/6 Biohackables: Exoskeleton
1/6 Biohackables: Neil Harbisson
Source: PSFK
2/6 Augmentables: Motorola wearable
computer
Source: Motorola
3/6 Enchantables: Glow Caps
Source: Vitality
4/6 Swallowables: Colonoscopy pill-cam
Source: PSFK
5/6 Wearables: Navigation jackets
Source: Wearable Experiments
5/6 Wearables: Google’s Lie-detector
neck ‘Tattoo’
6/6 Surroundables: Nissan Nismo
Watch
The ultimate device is YOU!
Also more and more business
processes connect to business partners
through this – opaque - virtual layer
Virtual World
Personal
devices
Internet of ThingsSmart Grid, Smart City
Connected
Organizations
Crime
This leads to more risk, specifically
information risk
Why care?
• 5 Million Low Capacity Smart Meters (Gas + Electricity)
• 45.000 High Capacity Smart Meters
• 60.000 public lighting and tariff switching devices
• 40.000 grid automation devices
• 14.000 employee devices
• 150.000 – 2.000.000 of electric vehicle charging stations
• Thousands of green energy producers
Master four things!
1. Separate systems of engagement from
systems of record.
2. Orchestration over an increasing number
of business partners, devices, protocols
and formats.
3. Resilience to all types of risk in the
automated landscape under your
responsibility.
4. Anti lock-in tactics.
1. Separate systems of engagement
from systems of record
2. Orchestrate
© Wim Bouman, Alliander IT
using semantics
2. Orchestrate
© Wim Bouman, Alliander IT
2. Orchestrate: General ledger –
Subsidiary ledger model
2. Orchestrate: Data and document
logistics
3. Create Resilience
Resilience can be obtained by moving away from typical barrier enhancement risk-
measures. Consider the following options:
• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;
• Accept, the potential impact of some risks may be deemed acceptable to your
organization;
• Reduce, e.g. the potential impact or probability of occurrence of a risk, like the
banking app;
• Transfer, use insurance or subcontracting to transfer potential consequences of
risk;
• Avoid , not entering the type of business that may incur potential risk impact
deemed too high;
• Exploit, risk is also an opportunity and high risk investments may yield high
returns.
4. Counter lock-in tactics
• Counter the ‘wave of appliances’ and lock-in wars with open
source orchestration
• Use standardization to minimize the number of supported
protocols and file formats as much as possible
• Keep risk acceptable
The beauty of it all?
• Complexity reduction
• Faster pro-active functionality delivery
• Simple yet adequate architecture
Thank You!
Questions?
Alliander IT CIO Office
Michel de Goede

More Related Content

PPTX
Improving Safety Inside the Unattended Car
DOCX
DOCX
PPTX
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
DOCX
Quiz
PDF
TrustPort – antivirus, antispyware, antispam, firewall – data protection, net...
PDF
Mobile: the up and downside of risk
PDF
Mobile: the up and downside of risk
Improving Safety Inside the Unattended Car
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
Quiz
TrustPort – antivirus, antispyware, antispam, firewall – data protection, net...
Mobile: the up and downside of risk
Mobile: the up and downside of risk

Similar to Mobile as a strategy (20)

PDF
Mobile: the up and downside of risk
PDF
Mobile as a strategy
PPTX
PDF
News letter June 11
PPTX
SIEM Primer:
PDF
BYOD: Be your own device?
PDF
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
PDF
Ready Technology 1st Edition Stephen J. Andriole
PDF
The Cyber SwarmShield by Stéphane Nappo
PPT
Csop 2011 Al Raymond
PDF
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
PDF
Iscon Imaging, Inc. White Paper
PDF
Iscon Imaging Personal Security Screening White Paper
PPTX
Cyber Threat Intelligence
PPTX
Keynote Information Security days Luxembourg 2015
PDF
Ready Technology 1st Edition Stephen J. Andriole
PDF
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
PDF
Mobile data loss threats and countermeasures 1st Edition Raggo
PDF
Ready Technology 1st Edition Stephen J. Andriole
Mobile: the up and downside of risk
Mobile as a strategy
News letter June 11
SIEM Primer:
BYOD: Be your own device?
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Ready Technology 1st Edition Stephen J. Andriole
The Cyber SwarmShield by Stéphane Nappo
Csop 2011 Al Raymond
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Iscon Imaging, Inc. White Paper
Iscon Imaging Personal Security Screening White Paper
Cyber Threat Intelligence
Keynote Information Security days Luxembourg 2015
Ready Technology 1st Edition Stephen J. Andriole
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Mobile data loss threats and countermeasures 1st Edition Raggo
Ready Technology 1st Edition Stephen J. Andriole
Ad

More from Michel de Goede (20)

PDF
5 dirt easy patterns for value delivery with IT in M&A
PDF
Maximizing asset life with smart lighting and ev
PDF
Breaking down the layers of cyber security
PDF
Cloudifying Alliander
PDF
The intricacies of cloud integration
PDF
Turning dreams into reality: it's your choice!
PDF
The Connected Utility
PDF
The influence of consumerization on enterprise apps
PDF
BYOD: bring your own device or bring your own disaster?
PDF
Enabling offline app usage within a set budget and timeline
PDF
IAM for mobile and BYOD
PDF
Are you a player? The EU, energy and entrepreneurship
PDF
From reactive to proactive mobile scenarios
PDF
Enabling the energy transition in times of cloud, apps and BYOD
PPTX
IT PMI: tips and lessons learned
PDF
Database Technologies
PDF
IT: make or break the deal
PDF
Smart data & smart energy
PDF
The impact of consumerization
PDF
The connected utility
5 dirt easy patterns for value delivery with IT in M&A
Maximizing asset life with smart lighting and ev
Breaking down the layers of cyber security
Cloudifying Alliander
The intricacies of cloud integration
Turning dreams into reality: it's your choice!
The Connected Utility
The influence of consumerization on enterprise apps
BYOD: bring your own device or bring your own disaster?
Enabling offline app usage within a set budget and timeline
IAM for mobile and BYOD
Are you a player? The EU, energy and entrepreneurship
From reactive to proactive mobile scenarios
Enabling the energy transition in times of cloud, apps and BYOD
IT PMI: tips and lessons learned
Database Technologies
IT: make or break the deal
Smart data & smart energy
The impact of consumerization
The connected utility
Ad

Recently uploaded (9)

DOC
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证
DOC
办Rice毕业证学历认证,哈金森社区学院毕业证留学本科毕业证
PPTX
mathematucicsSolving_Equationspptegypt.pptx
PDF
Top 10 Platforms for Securely Buying Verified Cash App Accounts.pdf
PDF
Facial Recognition System Singapore_ 1 SGD Per Month.pdf
PDF
Date Right Stuff - Invite only, conservative dating app
PDF
mao_guerrilla_warfare,mao zedongun gerilla savaşı üzerine yazısı
PPTX
The-Literary-Elements in non fiction creative
PPTX
BSNL Consumer Workshop ppt.pptx Telangana
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证
办Rice毕业证学历认证,哈金森社区学院毕业证留学本科毕业证
mathematucicsSolving_Equationspptegypt.pptx
Top 10 Platforms for Securely Buying Verified Cash App Accounts.pdf
Facial Recognition System Singapore_ 1 SGD Per Month.pdf
Date Right Stuff - Invite only, conservative dating app
mao_guerrilla_warfare,mao zedongun gerilla savaşı üzerine yazısı
The-Literary-Elements in non fiction creative
BSNL Consumer Workshop ppt.pptx Telangana

Mobile as a strategy