future of it in the organization and the vehicle · business systems with disruptive technologies...
TRANSCRIPT
1 CSC Proprietary and Confidential September 18, 2015
Future of IT in the organization and the vehicle
2 CSC Proprietary and Confidential September 18, 2015
Market Trends and Drivers
• Internet of Things and Services – The primary trend driving manufacturing
strategy today • Smart Manufacturing
– Embodies the vision and goal for all manufacturing and service operations
• Advanced Predictive Analytics – Represents the highest level of technological
achievement for manufacturing
Companies are focused on Re-visioning their business applications from an “Outside In” prospective. Major initiatives include the Internet of Things for Customer Interaction and retention, Smart Manufacturing encompassing Integrated Supply Chain and Manufacturing, and Advanced Predictive Analytics to correlate service and warranty information with Manufacturing attributes and Product Design and Engineering
3 CSC Proprietary and Confidential September 18, 2015
Driving In The Cloud is about developing new automotive value chains
Next-Gen and Industry Focus
4 CSC Proprietary and Confidential September 18, 2015
Next-Gen and Industry Focus To support Driving in the Cloud Companies are Re-Building or Re-Hosting business systems with disruptive technologies such as Social Media, Mobility and Telematics, Big Data and Analytics, and Cloud Computing faster than in prior years
REDUCE RISK
SHAPE and protect what matters
MANAGE operational efficiencies through enterprise risk management and integrated controls
ENABLE BUSINESS
TRANSFORM BUSINESS through the secure adoption of disruptive technologies
REQUIRED SERVICES
NEXT-GEN TECHNOLOGIES
Cloud Security Services
Endpoint Security Services
Identity and Access
Management
Network Security Services
Mobile Security Services
Cloud Computing
Cyber Security
Mobility And
Telematics Social Media
Application Security Services
Big Data And
Analytics
BUSINESS APPLICATIONS
Manufacturing
Communications & Telematics
Government Regulations
Automotive Insurance
(UBI)
Auto Financing
Logistics
Outside-In
RISK MANAGEMENT
CENTER
5 CSC Proprietary and Confidential September 18, 2015
FY16 Goals and Priorities
Big Data and Analytics
Cloud Computing
Mobility and Telematics Cyber Security
Global business drivers are forcing organizations to operate and compete in new ways. To address these changes Companies are adopting and implementing new technologies include Cloud Computing, Big Data and Analytics, Mobility and Telematics, and Cyber Security faster than in prior years.
Higher customer expectations and
new buying behavior Growing regulatory and risk concerns
Blurring industry lines with new forms
of competition
Heightening demand for increased
profitability
6 CSC Proprietary and Confidential September 18, 2015
Cloud Computing
Business Challenges Are Driving IT to the Cloud-Empowered Enterprise utilizing an Agility Platform for quicker Re-Host and Convert
Due to cost reductions in IT, the outsourcing of capabilities and a push for more efficiency and agility, cloud is being used as a means to essentially replicate or replace the data center.
Predicts 2013: Cloud Computing Becomes an Integral Part of IT, Gartner
By 2015 more than 50% of enterprise applications will be transformed to cloud and about 60% of their infrastructure will be cloud based.
US Deal Making Survey, IDC
Hybrid clouds growth accelerates due to increasing demand for agility and scalability; growth in the workloads with shorter life; and improved interoperability.
Get Past the Confusion Surrounding Hybrid Cloud Computing, Gartner
Nearly half of Gartner clients plan to have hybrid cloud solutions in place by 2015
Predicts 2013: Cloud Computing Becomes an Integral Part of IT, Gartner
7 CSC Proprietary and Confidential September 18, 2015
Cloud Computing
Cloud Security Services provide endpoint protection, vulnerability assessments, and security incident and event monitoring and reporting
Cloud Anti-Malware
Virtual Host Intrusion Prevention
Virtual Firewall
Virtual File Identity Monitoring
Cloud Vulnerability Management Assessment
Cloud Security Incident and Event Monitoring
8 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Blurring industry lines with new
forms of competition
Heightening demand for increased
profitability
Higher customer expectations and
new buying behavior
Growing regulatory and risk concerns
Global Business Drivers Are Forcing Organizations to Operate and Compete in New Ways
9 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Automotive Finance Logistics
Aftermarket Parts and Service Telematics
• Fraud detection and prevention
• Customer churn • Climate threat analysis
• Real-time route optimization
• Strategic transport network planning
• Return and/or customer service fraud
• Loss prevention • Traceability compliance
• Driver analysis • Customer Retention • Credit risk for large
purchases
• Real-time compliance position
• Warranty claims fraud • Manufacture Attributes
Manufacturing
Automotive Insurance • UBI • Loss Prevention • Vehicle Tracking and
Recovery
Across Industries, Clients See the Possibilities of Analytics to change the Automotive value chain …
10 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Complexity
Diagnostic Analytics Why did it happen? • Analysis —
OLAP and Visualization Tools
Descriptive Analytics II What’s happening now? • Monitoring —
Dashboards and Scorecards
Predictive Analytics What might happen? • Predictive
Analysis — Big Data
Prescriptive Analytics How can we make it happen? • Recommendations,
Risk Avoidance
Bus
ines
s Va
lue
Operations Triggers High Impact Low Impact
Process Improvement via Applied Intelligence
Descriptive Analytics I What happened? • Reporting
— Query, Reporting, and Search Tools
And the Benefits of Moving Up the Analytics Maturity Curve …
11 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
• Data complexity • Robust and scalable service • Speed of stand-up
1. Integrating insights into their business processes
2. Applying the right data science
• Skills shortage • Skills retention
4. Identifying and managing big data skills
3. Integrating and operating a big data and analytics environment with existing assets
… But They Consistently Struggle with the Same Four Challenges
12 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Human Capital
Financial Forecasting
Executives Management Analysts
Consumers Dashboards
Analytics Tools & Services
Reports Queries
REAL-TIME
BATCH AD HOC
Repeatability MACHINE-TO-
MACHINE
Transactional Systems
Operational Data Stores
WEB LOGS R&D DATA
DIGITAL CONTENT SOCIAL MEDIA
FILES
Unstructured VARIETY OF DATA
SOURCES
VARIETY OF TOOLS &
PLATFORMS
SECURITY CONCERNS
VARIETY OF INSIGHT
CONSUMERS
VARIETY OF USE CASES
Data All Over the Business Provides Governance and Dissemination Problems for Organizations …
13 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Eliminate Data Complexity
Gain Access to Key Skills
Stay Ahead of the Curve
Provide integration solutions to connect and query data from business sources
Access to training, vendor product roadmaps, and a defined system lifecycle that ensures you don’t end up with legacy or end-of-life products over time
Leverage Analytics as a Service to allow your talent to focus on the business application versus platform gymnastics
Achieve Scale and Speed
Benefit from industry best practices (visualization expertise, data modeling), proven scale, and repeatable operating principles
… Overcoming These Challenges Requires a New Approach
14 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Flexible Deployment Options Public
Cloud
Virtual Private Cloud
Dedicated Cluster
Enterprise Private Cloud
Real-Time
Integrated Analytics Software as a
Service Leverage
independent vendor partnerships to
remove the need to procure, manage,
and operate software
Analytics as a Service
Batch Ad Hoc
Technology Flexibility Any Cloud
Legacy & Next Gen
R, SAS, SPSS, Python, Java, & more
Industry-Leading Data Science Expertise On demand access to world class data
scientists and engineers, reporting
and visualization specialists, industry
consultants and domain experts
Global Hub & Spoke Network
Regional off-site & on-site expertise, as well as rapid-delivery center of excellence
and offshore hub
InsightLab Data Science & Visualization
Services Analytics Platform
Analytics as a Service - Pay-as-you-go subscription for comprehensive analytics tools and services
15 CSC Proprietary and Confidential September 18, 2015
Big Data and Analytics
Flexible Deployment Options
Public Cloud
Virtual Private Cloud
Dedicated Cluster
Enterprise Private Cloud
CSC Big Data Platform as a Service
Real-Time
Analytics as a Service
Batch Ad Hoc
Analytics Platform
InsightLab Data Science & Visualization
Services
Analytic Insights
Data Platform Innovation
Big Data Strategy
Business Process Transformation
Analytics Operating Model Transformation
Enterprise Intelligence
Strategy
Information Governance &
Strategy
Next Gen Architecture
Engage
Discover
Plan
Embed
Data Migration Factory: Data Integration & Migration Services
EDW, MDM, Information Mgmt, Analytic Appliance
Transformation
Busi
ness
In
telli
genc
e A
dvan
ced
Ana
lytic
s
Better Together
16 CSC Proprietary and Confidential September 18, 2015
Big Data 1.0 (EDW/BI) Big Data 3.0 (Open Source)
Key Characteristics
• Relatively Small, Structured Data Sets
• Proprietary RDBMS • Internally Sourced / Small Teams • Reactive Reporting Mechanisms
• Introduction of Unstructured Data Sources
• New In-Memory Analytic Capabilities • “Data Scientists” Emerge • Ad-hoc Reporting Becoming
Pervasive
• Seamless Blend of Traditional Analytics and Big Data
• Heavily Open Sourced • Reporting Becomes Predictive &
Influences Business Process Change
• Enterprise Data Platform
CAGR Low – 8% Good – 23% Best – 58%
OI Potential Low – 3%+ Moderate – 15% Best – 30%
Skills/Talent Bulk of Talent Today Talent Investments Required High Demand Talent
Big Data 2.0 (Analytic Appliances)
Yet Challenges Remain… Determining Value
Security & Compliance
Skills & Capabilities 32% 30% 65%
The Market Is Here Today
Big Data is the most Rapidly Evolving Analytics Landscape
17 CSC Proprietary and Confidential September 18, 2015
Mobility and Telematics
Then … … and Now
18 CSC Proprietary and Confidential September 18, 2015
*Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies,” Feb. 21, 2013 **Gartner Source: Press Release, Oct. 25, 2012, http://www.gartner.com/newsroom/id/2213115
*** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
52% of information workers across 17 countries report using three or more devices for work*
52%
80% of employees admit to using non-approved software-as-a-service (SaaS) applications in their jobs***
80%
Mobility and Telematics
90% of enterprises will have two or more mobile operating systems to support in 2017**
90%
Who Cares About Mobility?
19 CSC Proprietary and Confidential September 18, 2015
Smart Innovation
Everyday life assets become digital: Watches, TVs, Cars, Glasses, Tables,
anything ...
People, devices, apps & services become socialized (which means
linked to build new networks, collaboration)
All communication & interaction is driven by cloud-services &
backends
Workers become mobile, need access to data & processes
anywhere, at any time
Change Transformation
Enterprises need advice & support to face & manage technology
transformation
A significant change in terms of technology & innovation has to be
managed
Mobility and Telematics
What Can Mobility Do for You?
20 CSC Proprietary and Confidential September 18, 2015
Mobility and Telematics
Companies need to source secure mobile apps that bring enterprise system functionality to multiple devices/os
Companies need to design new innovative services that leverage unique mobile capabilities Need to focus on the front end Business consulting capabilities User experience design (ad agencies) Client industry knowledge
Companies need to upgrade their IT infrastructure to meet the needs of mobile clients and employees
Companies need to bring to market new mobile apps faster than competition at a competitive cost
Brings the benefit of cloud flexibility and elasticity to mobiles users
Accommodate new mobile needs such as mobile applications management and BYOD support
Invest in pre-built solutions that combine technology and business domain expertise
Create and maintain unique IP that differentiates CSC
Offer a variety of commercial models starting with freemium, paid for options to consumption models against the back end data
Business and Operating Models
Time-to-Market and Cost-Effectiveness
Mobile Apps Lifecycle
Mobile-Friendly Infrastructure
Bring together app development and Cybersecurity expertise
Full lifecycle support of state of the art mobile applications on a global scale
Mobility Considerations when developing Mobil Applications
21 CSC Proprietary and Confidential September 18, 2015
Mobility and Telematics
Ignition Workshop
Use Case Assessment
Workshop
Mobile (& Digital) Strategy
Build & Grow Mobility CoE
Mobility Foundation Infrastructure & Architecture
BYOx Strategy
Solution Development
BAU
~ 4 to 6 weeks Handov
er Test
< 2 weeks
Development Sprint
Sprint
Rapid
Prototyping
Scoping
Ideation &
Evaluation Sp
rint
max 1 Sprint / week
Kick off the journey...
... to define your strategy and set the scene... ... for massive business improvements by purposeful mobile solutions!
Identify & Evaluate Mobile Use Cases
~ 3 to 6 months ~ 2+ months per solution
Enterprise AppStore
Typical Mobility Deliver Model
22 CSC Proprietary and Confidential September 18, 2015
Cybersecurity ranked as top technology initiative in 2015
Investing heavily in cybersecurity
Cybersecurity is a strategic asset
Need to improve ability to meet regulations
Heightened security a critical or high-priority issue
#1
71%
51%
67%
82%
86%
Cybersecurity in a Mobil / Telematic Environment
When focused on Automotive the percentage goes up to 86%
CSC’s Global CIO Survey: 2014 – 2015 Cybersecurity: Critical Issue for IT Organizations
23 CSC Proprietary and Confidential September 18, 2015
Cybersecurity in a Mobil / Telematic Environment
• Increased scrutiny and responsibility following high-profile breaches
• New regulatory demands to better protect data and critical infrastructure
• Risks have risen to boardroom agendas
• Increasing proliferation of malware • More sophisticated attacks by criminal
and state-sponsored groups
• Security processes and tools inconsistent across global operations
• Difficulty in retaining skilled security resources
• Focus is on security metrics, little global knowledge of risk posture
OPERATIONS
ADVANCED THREATS
RISK AND COMPLIANCE
NEXT-GEN TECHNOLOGIES
• Increasing adoption of cloud and Infrastructure as a Service
• New challenges of managing both traditional and next-gen assets
• Growing risk exposure as endpoints increase
Cybersecurity Challenges and Opportunities
24 CSC Proprietary and Confidential September 18, 2015
Connected Cars are here today, Telematics evolved in a Mechanical Design environment, Not architected for Cybersecurity
Cybersecurity in a Mobil / Telematic Environment
25 CSC Proprietary and Confidential September 18, 2015
Cybersecurity in a Mobil / Telematic Environment
Hello?
101 ways to say “Hello” to car electronic…
26 CSC Proprietary and Confidential September 18, 2015
Cybersecurity in a Mobil / Telematic Environment
CAN BUS
ECUs
Wireless
Hello?
Bluetooth
Smartphone
USB Stick
OBD2 Mechatronic
Laptop
Infotainment ECU
… Can result in Hacking the Connected Car: Lack of Security Knowledge
27 CSC Proprietary and Confidential September 18, 2015
Cybersecurity in a Mobil / Telematic Environment
When assessing the effect of cybercrime, it’s necessary to evaluate a series of factors:
• The loss of intellectual property and sensitive
data. • Opportunity costs, including service and
employment disruptions. • Damage to the brand image and company
reputation. • Penalties and compensatory payments to
customers (for inconvenience or consequential loss), or contractual compensation (for delays, etc.)
• Cost of countermeasures and insurance. • Cost of mitigation strategies and recovery from
cyber attacks. • The loss of trade and competitiveness. • Distortion of trade. • Job loss.
The impact of Cyber Crime
28 CSC Proprietary and Confidential September 18, 2015
Cybersecurity in a Mobil / Telematic Environment
Automotive Security Threat Motives
29 CSC Proprietary and Confidential September 18, 2015
“You call it internet of things; I call it internet of threats,” ---- Eugene Kaspersky
Areas to Assess: 1) Design, Planning and Manufacturing - Telematic Design and incorporation - OEM Standards and Assurance - Manufacturing safeguards mitigating theft and intrusion 2) Distribution and Retail - Third-party value-adds or regional requirements 3) Ownership Period and Aftermarket - Third-party value-adds - Physical or remote access (Wireless, Wifi, GPS, etc) 4) After Life and Disposal - Re-cycled parts and standards
Mitigation Priorities based on Impacts to:
Consumer Market
Data Protection and Limitations Feasibility
Short term value Long term necessity
Evaluate Vulnerability vs Mitigation priorities
Improving security of the telematic infrastructure
Cybersecurity in a Mobil / Telematic Environment
30 CSC Proprietary and Confidential September 18, 2015
Directives on the security of Business
Core Policies & Mandatory Security
Requirements
Protocols / Standards / Guidelines
Service or Area specific security
policies & processes
Establishing a Security Policy Framework & risk management of mitigating activities based on Safety & Security Standards According Compliance
Source: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf
Improving security of the telematic infrastructure
Cybersecurity in a Mobil / Telematic Environment
31 CSC Proprietary and Confidential September 18, 2015
Industry Relevant Company Solutions
Infrastructure & IaaS
Platform & PaaS
Applications & SaaS
Business Process & BPaaS
CLASSICAL IT NEXT GEN ITAAS PRO SERVICES
Planning
Development
Integration
Transformation & Transition
Operation & Management
Continuous Delivery
New SMACS Based Applications
“Cloudified” Classical Applications
Industry Software as a Service
Enterprise Software as a Service
Web / N-Tier
Client-Server
Mainframe / Midrange
Licensed COTS
Middleware / SOA
IT Service Management
Database (OLTP/OLAP)
Social & Mobile
Analytics & Big Data
Cloud Orchestration
Cybersecurity
DevOps
ITaaS Support Systems
Compute
Storage
Network
Data Center
End User Support
Web Scale Commodity IaaS
Transactional Converged IaaS
Software Defined Network
Public / Private / Hybrid IaaS
Workplace & Smart Devices
Business Process as a Service Business Process Outsourcing
TO SUMMARIZE; TO REMAIN COMPETITIVE THE CAPABILITIES, PRODUCTS AND SERVICES YOUR COMPANY NEEDS TO SUPPORT TO ADDRESS NEW CHALLENGES HAS REQUIRED A SHIFT IN THINKING TO LOOK AT YOUR CURRENT BUSINESS SYSTEMS WITH AN “OUTSIDE IN” PROSPECTIVE ENABLED BY SOCIAL MEDIA, MOBILITY AND TELEMATICS, BIG DATA AND ANALYTICS, WITHIN CLOUD COMPUTING