SlideShare a Scribd company logo
LESSONS LEARNED THROUGH
CLOUD TRANSFORMATION
Jim Rutt
Director of IT, Dana Foundation
October 28, 2015
PERSONAL BACKGROUND
• 20 years of client-side practioning in technology
• Primarily in healthcare (payer/managed care) but also significant experience in
financial and pharmaceutical.
• As Director of IT for The Dana Foundation, responsible for all domains
encompassing the use of technology (infrastructure, application development, data,
network, etc.)
• First experience in the non-profit sector
DANA FOUNDATION BACKGROUND
• http://www.dana.org
• Founded in 1950
• Endowment based foundation supporting brain research through grants,
publications and educational programs
• Chief importance centered around scientific inquiry (funding of research into
neuroscience) and the engagement of the general public (publications and
programs)
DECEMBER 2010: FIRST DAY
BEGINNING STATE
• Traditional on-premise infrastructure with a limited amount of IaaS/private cloud
• Limited human resources
• No application lifecycle
• No real strategy around risk, security, compliance
• Traditional problems (too much time spent supporting infrastructure issues and not
enough time developing new features and enhancing end-user experience)
MARCH 2011: TRIGGER EVENT
• Foundation moved to new location
• Opportunities for consolidation as well as re-thinking existing cloud environment,
with an eye towards optimizing from a performance, security, and cost perspective.
• Addressing macro trends affecting everyone in our industry (consumerization of IT,
rise of mobile, demographic trends).
• Time to test the waters with the first application…
OFFICE 365
• Existing Exchange Server environment:
• Total of 15 VM’s, way too complex
• Uptime way below five nines
• All resources (CPU/RAM/storage) reaching 100% utilization
• Active Directory environment supporting Exchange badly neglected with serious
integrity issues.
• Maybe an opportunity to embrace a new security model rather than pour significant
resources into maintaining AD.
OFFICE 365: APRIL 2011-JAN 2012
• Migration considerations specific to governance:
• Ruled out AD Federation due to previously identified issues with AD.
• However, slightly complicating authentication model temporarily (going from AD pass
through authentication to adding an additional Office 365 credential in addition to
existing AD)
• Already risking “password fatigue” with end users.
• Time to look at a possible new solution for cloud-based identity…..
OKTA (ID AS A SERVICE)
• Essentially a single sign on solution primarily for SaaS
• Great leverage with web based SaaS offerings,also integratable with AD
• Also streamlines provisioning/deprovisioning.
• Clean user interface and simple administrative console
• We began to see this model as the future.
SALESFORCE
GREAT PLAINS TO AZURE
ZENDESK
• SaaS based Help Desk solution
COMPLIANCE/GOVERNANCE
CONSIDERATIONS
• No technology audits prior to 2010.
• Using the new technologies and strategies we were able to craft a compliance
structure, along with guiding our external auditors, that truly represented an
actionable governance program, rather than just a checklist of useless items.
NEXT GENERATION SECURITY
SOLUTIONS
• Netskope (CASB)
• Vera (hardening at the actual file level)
• Menlo Security (malware isolation)
• Ensilo (Exfiltration
• Lesser reliance on legacy antivirus solutions
REMAINING IAAS VIRTUAL
ENVIRONMENTS
RETURN ON INVESTMENT
• Signifigant security cost/risk mitigation now transferred to top tier providers
(Microsoft, Salesforce, etc.)
• Trust factor is this case resembles a reverse of the “prisoners dilemma” theory.
LESSONS LEARNED ALONG THE WAY
• Calculated risk moving our most visible application (Exchange) to the cloud first, but
mitigated by existing pain felt.
2016 AND BEYOND
• Eventual retirement of legacy AD
• Harden end-user devices
• Expansion of two factor authentication
• Continue to adopt next generation endpoint security solutions.
THANK YOU
• Questions?

More Related Content

PPTX
A Serene Path to Cloud Adoption
PPTX
Digital alpha technologies inc
PDF
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
PPTX
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
PPTX
Shadow IT Risk and Reward
PDF
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
PPTX
Looking Ahead: Predictions for 2016 and Beyond
PPTX
It's Behind You! Managing Insider Threats to Digital Security with RES Software
A Serene Path to Cloud Adoption
Digital alpha technologies inc
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Shadow IT Risk and Reward
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
Looking Ahead: Predictions for 2016 and Beyond
It's Behind You! Managing Insider Threats to Digital Security with RES Software

What's hot (19)

PPTX
Transforming the digital experience of your workforce
PPTX
Flexible and Secure Workspaces for the Modern Enterprise
PDF
Human Centred Business Transformation
PPTX
Conquer the Barriers to Self-Service Adoption
PPTX
Bt idc event cloud adoption in ireland
PDF
Cloud Strategy Methodology
PDF
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
PPTX
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
PPTX
ARC's Bob Mick's and Dick Hill's Dashboard & Role Based Portals Presentation ...
PPTX
Technology for People in Healthcare
PPTX
BMC/Forrester Your Cloud Future is Here Webinar
PPTX
IT in the Cloud
PPTX
The Top Cloud Experts of 2013
PDF
How to reduce unplanned work and increase customer value
PPTX
Application Portfolio Management Strategies that Accelerate Digital Transform...
PDF
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
PPTX
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
PPTX
Empower Your Workforce Through Self Service
PDF
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Transforming the digital experience of your workforce
Flexible and Secure Workspaces for the Modern Enterprise
Human Centred Business Transformation
Conquer the Barriers to Self-Service Adoption
Bt idc event cloud adoption in ireland
Cloud Strategy Methodology
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
ARC's Bob Mick's and Dick Hill's Dashboard & Role Based Portals Presentation ...
Technology for People in Healthcare
BMC/Forrester Your Cloud Future is Here Webinar
IT in the Cloud
The Top Cloud Experts of 2013
How to reduce unplanned work and increase customer value
Application Portfolio Management Strategies that Accelerate Digital Transform...
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
Empower Your Workforce Through Self Service
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Ad

Viewers also liked (11)

PPTX
Mexicanos – the spanish frontier ning site #4
PDF
Marianne faithfull slide
PPT
самара космическая верфь россии
PPTX
Dawley High Street Photos May 2012
PPTX
Tectonic shifts icdm2012_1_outgoing
DOCX
PPT
Nieuwe vorm journalistiek - SMC046
PPT
Олег Волошин, ИМБП РАН. Первые шаги на пути к другим планетам
PPTX
Ghid de buna practica competenta digitala
ODP
Wikipedia in the college classroom
PPTX
A digitális írástudás fejlesztését elősegítő kutatási-fejlesztési projektek
Mexicanos – the spanish frontier ning site #4
Marianne faithfull slide
самара космическая верфь россии
Dawley High Street Photos May 2012
Tectonic shifts icdm2012_1_outgoing
Nieuwe vorm journalistiek - SMC046
Олег Волошин, ИМБП РАН. Первые шаги на пути к другим планетам
Ghid de buna practica competenta digitala
Wikipedia in the college classroom
A digitális írástudás fejlesztését elősegítő kutatási-fejlesztési projektek
Ad

Similar to Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15 (20)

PDF
Investment in Technology for non-profit @ Diffusion Pune 2012
KEY
IT 2.0 and Cloud Computing
PPTX
Unified approach to analytics
PPTX
TSPi-Corporate-Presentation-Short-052813
PDF
5. e20 impact keynote_benefits from e20_as
PDF
Data Foundation for Analytics Excellence by Tanimura, cathy from Okta
PPTX
Dennis Wendland_The i4Trust Collaboration Programme.pptx
PDF
Intranet content management (webinar)
PDF
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
PDF
Gov cloud pressclub_29mar2011_final
PDF
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
PDF
Presentation by Bart Gielen (DataSense) at the Data Vault Modelling and Data ...
PPTX
Aitp presentation ed holub - october 23 2010
PDF
Accelerate Cloud Migrations and Architecture with Data Virtualization
PPTX
Power Platform Governance Webinar
PPTX
Identity Management: Tools, processes & services
PPT
IWMW 2004: Introduction To JISC And The Web Community (1)
PDF
DAS Slides: Emerging Trends in Data Architecture — What’s the Next Big Thing?
PDF
IDC-IL Webcast on Enterprise Content Collaboration
PDF
Data-Ed Online: Data Architecture Requirements
Investment in Technology for non-profit @ Diffusion Pune 2012
IT 2.0 and Cloud Computing
Unified approach to analytics
TSPi-Corporate-Presentation-Short-052813
5. e20 impact keynote_benefits from e20_as
Data Foundation for Analytics Excellence by Tanimura, cathy from Okta
Dennis Wendland_The i4Trust Collaboration Programme.pptx
Intranet content management (webinar)
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Gov cloud pressclub_29mar2011_final
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Presentation by Bart Gielen (DataSense) at the Data Vault Modelling and Data ...
Aitp presentation ed holub - october 23 2010
Accelerate Cloud Migrations and Architecture with Data Virtualization
Power Platform Governance Webinar
Identity Management: Tools, processes & services
IWMW 2004: Introduction To JISC And The Web Community (1)
DAS Slides: Emerging Trends in Data Architecture — What’s the Next Big Thing?
IDC-IL Webcast on Enterprise Content Collaboration
Data-Ed Online: Data Architecture Requirements

Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15

  • 1. LESSONS LEARNED THROUGH CLOUD TRANSFORMATION Jim Rutt Director of IT, Dana Foundation October 28, 2015
  • 2. PERSONAL BACKGROUND • 20 years of client-side practioning in technology • Primarily in healthcare (payer/managed care) but also significant experience in financial and pharmaceutical. • As Director of IT for The Dana Foundation, responsible for all domains encompassing the use of technology (infrastructure, application development, data, network, etc.) • First experience in the non-profit sector
  • 3. DANA FOUNDATION BACKGROUND • http://www.dana.org • Founded in 1950 • Endowment based foundation supporting brain research through grants, publications and educational programs • Chief importance centered around scientific inquiry (funding of research into neuroscience) and the engagement of the general public (publications and programs)
  • 5. BEGINNING STATE • Traditional on-premise infrastructure with a limited amount of IaaS/private cloud • Limited human resources • No application lifecycle • No real strategy around risk, security, compliance • Traditional problems (too much time spent supporting infrastructure issues and not enough time developing new features and enhancing end-user experience)
  • 6. MARCH 2011: TRIGGER EVENT • Foundation moved to new location • Opportunities for consolidation as well as re-thinking existing cloud environment, with an eye towards optimizing from a performance, security, and cost perspective. • Addressing macro trends affecting everyone in our industry (consumerization of IT, rise of mobile, demographic trends). • Time to test the waters with the first application…
  • 7. OFFICE 365 • Existing Exchange Server environment: • Total of 15 VM’s, way too complex • Uptime way below five nines • All resources (CPU/RAM/storage) reaching 100% utilization • Active Directory environment supporting Exchange badly neglected with serious integrity issues. • Maybe an opportunity to embrace a new security model rather than pour significant resources into maintaining AD.
  • 8. OFFICE 365: APRIL 2011-JAN 2012 • Migration considerations specific to governance: • Ruled out AD Federation due to previously identified issues with AD. • However, slightly complicating authentication model temporarily (going from AD pass through authentication to adding an additional Office 365 credential in addition to existing AD) • Already risking “password fatigue” with end users. • Time to look at a possible new solution for cloud-based identity…..
  • 9. OKTA (ID AS A SERVICE) • Essentially a single sign on solution primarily for SaaS • Great leverage with web based SaaS offerings,also integratable with AD • Also streamlines provisioning/deprovisioning. • Clean user interface and simple administrative console • We began to see this model as the future.
  • 12. ZENDESK • SaaS based Help Desk solution
  • 13. COMPLIANCE/GOVERNANCE CONSIDERATIONS • No technology audits prior to 2010. • Using the new technologies and strategies we were able to craft a compliance structure, along with guiding our external auditors, that truly represented an actionable governance program, rather than just a checklist of useless items.
  • 14. NEXT GENERATION SECURITY SOLUTIONS • Netskope (CASB) • Vera (hardening at the actual file level) • Menlo Security (malware isolation) • Ensilo (Exfiltration • Lesser reliance on legacy antivirus solutions
  • 16. RETURN ON INVESTMENT • Signifigant security cost/risk mitigation now transferred to top tier providers (Microsoft, Salesforce, etc.) • Trust factor is this case resembles a reverse of the “prisoners dilemma” theory.
  • 17. LESSONS LEARNED ALONG THE WAY • Calculated risk moving our most visible application (Exchange) to the cloud first, but mitigated by existing pain felt.
  • 18. 2016 AND BEYOND • Eventual retirement of legacy AD • Harden end-user devices • Expansion of two factor authentication • Continue to adopt next generation endpoint security solutions.