Transformation Innovation

Mr. Jeffrey Kaplan Talks About The Cloud Channel

By G C Network | October 6, 2011

This afternoon I had a very interesting discussion with Mr. Jeffrey Kaplan, Managing Director of THINKstrategies and founder of the Cloud Computing Showplace. His firm is focused entirely on the…

The Economic Benefit of Cloud Computing

By G C Network | October 2, 2011

(The following is the Executive Summary of a recent NJVC Executive Whitepaper. The full version is available at NJVC.com ) Cloud computing, as defined by the National Institute of Standards…

Implementation of Cloud Computing Solutions in Federal Agencies: Part 4 – Cloud Computing for Defense and Intelligence

By G C Network | September 15, 2011

(This is part 4 of the series entitled “Implementation of Cloud Computing Solutions in Federal Agencies”. First published on Forbes.com, this series provides the content of a whitepaper I recently…

Implementation of Cloud Computing Solutions in Federal Agencies : Part 3 – Cloud Transition Lessons Learned

By G C Network | September 13, 2011

(This is part 3 of the series entitled “Implementation of Cloud Computing Solutions in Federal Agencies”. First published on Forbes.com, this series provides the content of a whitepaper I recently…

Implementation of Cloud Computing Solutions in Federal Agencies : Part 2 – Challenges of Cloud Computing

By G C Network | September 9, 2011

(This is part 2 of the series entitled “Implementation of Cloud Computing Solutions in Federal Agencies” that first appeared on Forbes.com. This series provides the content of a whitepaper I…

Implementation of Cloud Computing Solutions in Federal Agencies : Part 1-Introduction

By G C Network | September 8, 2011

(This post first appeared on “Cloud Musings on Forbes”. This series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper is available at NJVC.com…

FedPlatform.org Focuses on a Government PaaS

By G C Network | August 26, 2011

   With GSA now issuing ATOs and Amazon launching it’s own government specific cloud, IaaS for government agencies is now a reality.  This next step in this “Cloud First” march…

On The Frontlines: GovCloud and Cybersecurity

By G C Network | July 28, 2011

My friends at Trezza Media recently published a couple of great online documents on GovCloud and Cyber. Your should especially check out the “Cloud Chopping Made Easy” by David McClure…

GovCloud Is Now For Real !!

By G C Network | July 3, 2011

On Friday July 1, Infrastructure-as-a-Services for the US federal government became a reality with Authority to Operate (ATO) approval for the following vendors: Web Hosting CGI Federal Computer Literacy World…

The Economic Impact of GovCloud

By G C Network | June 26, 2011

What a month! June has really been busy!! Just now getting around to doing a post about CloudExpo 2011 in New York.With over 5000 delegates in attendance, it was just…

4 Factors Driving Digital Transformation ROI

The critical assessment factors for cloud ROI risk probability are the following:     

  • Infrastructure utilization
  • Speed of migration to cloud
  • Ability to scale business/mission processes
  • Quality delivered by the new cloud-based process 

These four factors directly drive digital transformation ROI because they affect revenue, cost, and the time required to realize any investment return. Differences between actual and projected values in these metrics indicate a likely failure to achieve the desired goals.

Although business alignment is always a primary digital transformation drive, ROI remains a key decision component. This metric should, however, be addressed from multiple vantage points to include cloud workload utilization, workload size versus memory/processor distribution and the virtual hardware instance to physical asset ratio. 

Value delivered through innovation should also be part of the business value calculation. Value can be delivered through operational cost reductions, optimization of resource capacity, and a reduced total cost of ownership. Business process time reductions, product quality improvements and customer experience enhancements are also useful outcomes.

Security Controls

Business/mission model changes can also introduce operational risk. Acceptance of these risk are based on executive risk tolerance. Their risk mitigation decisions result in the implementation of security controls. A control will restrict a list of possible actions down to what is allowed or permitted by the organization. Encryption, for example, can be used to restrict the unauthorized use of data.

The security control continuum extends over three categories:         

  • Management (administrative) controls: policies, standards, processes, procedures, and guidelines set by corporate administrative entities (i.e., executive to mid-level management)         
  • Operational (and physical) controls: operational security (execution of policies, standards and process, education, and awareness) and physical security (facility or infrastructure protection)
  • Technical (logical) controls: Access controls, identification and authentication, authorization, confidentiality, integrity, availability, and non-repudiation 

They also encompass the following types:

  • Directive controls: often referred to as administrative controls, advise employees of the behavior expected of them during their interfaces with or use of information systems
  • Preventive controls: include physical, administrative, and technical measures that preclude actions that violate policy or increase the risk to system resources
  • Deterrent controls: use warnings and a description of related consequences to prevent security violations
  • Compensating controls: Also called an alternative control, a mechanism that is put in place to address security requirements deemed impractical to implement
  • Detective controls: Refer to the use of practices, processes, and tools that identify and possibly react to security violations
  • Corrective controls: involves physical, administrative, and technical measures designed to react to a security-related incident in order to minimize the opportunity for an unwanted event to reoccur
  • Recovery controls: restore the system or operation to a normal operating state once integrity or availability is compromised 

The costs associated with the implementation of any security control should be weighed against the value gained from digital transformation business/mission process improvements.

Would you like to learn more about digital transformation innovation? Pick up a copy of my new book, Click to Transform! 

A book about business and technology
Posted in

pwsadmin