SlideShare una empresa de Scribd logo
1 de 32
Digital
Transformation
101:Howwillit
affectyour
business? • What is digital
transformation?
• Some examples of
transformative technologies.
• What are the benefits?
• What are the risks?
• What are the impacts?
Agenda
DigitalTransformationDefinition
• Digital Transformation (DT or DX)
is the use of new, fast and
frequently changing digital
technology to solve problems. It is
about transforming processes that
were non digital or manual to
digital processes.
1https://en.wikipedia.org/wiki/Digital_transformation
Digital
Transformation
Digital Transformation can affect the
individual, an organization, a process, or
larger constructs such as the Internet. It
can affect how we do our jobs, conduct
our daily lives and how we use
technology.
Digitaltransformationisnotnew…
Mainframe Computers
1943
Personal Computers
1974
Internet
Early 1970’s
Digital
Transformation
The difference now is the speed and impact of digital transformation.
Challenges with Digital Transformation
Rapid
Change
Rapid
Adoption
• Insufficient Due
Diligence
• Integration Issues
• Porting “Old” to “New”
Poor results from
Digital
Transformation
ExamplesofhowDigital
Transformationcan
providevalue
Block Chain &
Digital
Transformation
Block Chain
WhatisaBlockchain?
• Database
• Records Cryptographically Linked
• Redundant Copies Replicated among Stewards / Nodes
• Consensus Protocol – Who gets to write a new record
• Ability to execute automated processes using Smart Contracts
• Can interoperate with Digital Currency
DigitalTrustAttributesofBlockchainNetworks
• Immutability
• Non-repudiation
• Zero-Knowledge Proof
• Redundancy
• Availability
NovelUsesfor
Blockchains
• Provenance – Right to Physical and Digital Assets
• Supply Chain – Transactions within a Source to Eventual
Destination
• Stored Value – Cryptocurrency, Stored Value
• Transaction Record – Financial Exchange and Accounting
Records
• Voting Records
• Patient Records
• Verifiable Credentials
• Citizenship
• Professional Credentials
• Institution Degrees
• Attainment of Social Status (Marriage, Age, Membership)
• Global Legal Entity Identifier (gleif.org)
Verifiable Credentials in a Nutshell
13
The Verifiable Credential Trust Triangle
Displays Audit Accreditor
Credential
Policies &
Procedures
Information
Technology
Governance Authority
TRUST
F
R
A
M
E
W
O
R
K
Trust Anchor
Accreditor
Standards
Attest
Criteria
Audit
Accreditor
Auditor
Accredits
Applies
Provides Evidence
Asserts Compliance
Creates
Attest
Guidance
Evaluates
Relies Upon
Issues Auditor Credential
Oversees
Level 3
Criteria
Level 2 Criteria
Level 1 Criteria
Credential Registry
Issues Trust Anchor and
Credential Registry Credentials
Displays Auditor
Credential
Displays Trust Anchor Credential
Accredits
Issues Audit Accreditor
Credential
Creates
Updates
Issues Credentials
Compliance
Reports
AssertsCompliance
Applies
Referential Trust Model
Blockchain Referential Trust Model
CloudServices & Digital
Transformation
Initiatives
Business
Outcomes
Customer
Centricity
AccelerateGrowth
Innovation
CreateNew
SourcesofValue
Cost Optimization
DriveEfficiency
Value Proposition
Oneplatformformission
criticalwork&businessagility
Organize and gain visibility into work
• Organize, execute, and
ensure work is aligned with strategic initiatives
Access and dynamically deploy resources
• Identify, access, and allocate internal and
external resources on demand
Drive better business performance
• Surface actionable insights into how
resources impact business outcomes
B U S I N E S S - F A C I N G C U S T O M E R - F A C I N G
B U S I N E S S M O D E L & O R G A N I Z A T I O N A L C U L T U R E
Changing your business model and organizational culture to adapt to technological change in your industry
• Digitize&/orautomate legacyprocesses
• Optimizeoperations with data-driven
decisions
• Instrumentprocessestomanage risk
• Digitizesupplychain management &
tracking
P R O C E S S &
O P E R A T I O N S
P R O D U C T S
& S E R V I C E S
• Usetechnologyto solve customer
problems
• Map & create digitaluserexperiences
M A R K E T I N G &
D I S T R I B U T I O N
• Distributeproducts& servicesviadigital
channels
• Providecustomersupportand service
via digitalchannels
Benefits of Transformative Technologies like Cloud
K N O W L E D G E &
S E L F - S E R V I C E
• Providebestpractices& digitaltools to
avoid knowledgeloss and knowledge
waste
• Enable self-servicedataexploration,
knowledge-sharing,and toolset
development
Data transfer options
API connection, push vs pull, SFTP, compiledfile andemail, etc.
All datain 3rd partycloud applications
What regioncountry isdata in? Complianceconcerns with
GDPR, CCPA,PCI,etc.
3rd PartySub-processors
What 3rd partyprocessors are cloudservices using?
Control over access Integrations with Single Sign On, account provisioning,
Shadow IT
Easy for peoplewith corporate cardto sign up/purchase appsto
start putting data in
Ease of access
Blessing and a curse, what makes Data Transformation great
andavailable, increases the risk and needfor security controls
around it.
Risks of Transformative Technologies like Cloud
Obligations to Privacyand Disclosure Moving data around, methods andrequirements todisclose
applications and locations of data.
Enhanced 3rd PartyRisk Programs How doInformation Security teams adapttoadded3rd
partyrisk?
Application Security and Vulnerability due-diligence Addedincrease torisk surface area outside of
traditional brickand mortar datacenters andinternal
development
Audit ScopeIncrease Addedapplications means potential addto external audit
review
Importance of Information Security (IS) Training Ensuring IS training is continual, updatedandengaging to
aidin compliance.
Impacts of Transformative Technologies like Cloud
Other Transformative
Technologies
Artificial
Intelligence
AI is currently been utilized in
various forms for workload such as:
• Processing large amounts of data
to farm out patterns (e.g., threat
hunting or data mining)
• Responding to human users in
real time (e.g., chat bots)
• Make real-time decisions to stop
threats (e.g., endpoint
protection)
Internet
of
Things
Definitions vary on IoT but it is
generally agreed that IoT can
include the use of smaller elements
of a larger infrastructure to produce
larger results than would be
possible otherwise.
Internet of Things
Cars, farm resources, medical devices, smart TV’s, etc.
Buildings, Infrastructure, Utilities (typically SCADA)
Endpoint Devices
Short range communication devices such as routers using 802.x, Bluetooth, etc.
Link from end devices to external networks
Gateways
Cellular, Fiber, Dedicated links, etc.
Link gateways to the service level
Telecomms /
Internet links
End user, Big Data, Automation, etc.Service Level
Points to consider…
DigitalTransformationDrivers
• Application of new technological advances
• Need to find new solutions to current challenges
• Drive to build new markets
• Information sharing
• Major events (e.g., pandemics driving remote working) can lead to:
• Drive to do more real-world activities through digital means (e.g.,
online shopping)
• Change to where employees work
Digital
Transformation
Controls
Transformative Technologies include speed, new technology,
and change as elements of their DNA… so how can this all be
managed?
Assess transformative technology and those providing it
Manage change through established change or
transformation processes
Apply known standards or frameworks such as ISO38500 or
ISO9001
Plan the adoption of new technology (do not just migrate
current issues to new technology)
RoundTable:
Opinionson
Digital
Transformation
What are the impacts of digital
transformation on businesses?
What does the future look like
for digital transformation?
What is your top take-away
lesson for digital transformation?
Summary
Digital Transformation can
impact your business with
new technologies and new
ways to use existing
technologies.
Digital Transformation can be
a fast, game-changing
experience.
Adopting a structured
approach to Digital
Transformation is key to
avoiding its associated pitfalls
(e.g., using grounded
standards such as ISO38500).
ISO/IEC 27001
Training Courses
• ISO/IEC 27001 Introduction
1 Day Course
• ISO/IEC 27001 Foundation
2 Days Course
• ISO/IEC 27001 Lead Implementer
5 Days Course
• ISO/IEC 27001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
www.pecb.com/events
THANK YOU
?
scott@scottperrycpa.com linkedin.com/in/scott-perry-1b7a254
asenglish@hotmail.com
derekrs@gmail.com
linkedin.com/in/englishtony
linkedin.com/in/derek-stephenson-90628b113

Más contenido relacionado

La actualidad más candente

Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceMongoDB
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...Ardoq
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicNuxeo
 
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...Capgemini
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies
 
Atos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology TrendsAtos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology Trendsguesta9bf56
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doPatric Dahse
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panelCloudera, Inc.
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big DataIBM Analytics
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionBharath Rao
 

La actualidad más candente (20)

Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Product engineering services at a glance
Product engineering services at a glanceProduct engineering services at a glance
Product engineering services at a glance
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a Pandemic
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
CWIN17 san francisco-blockchain three ways to prevent it from failing in the ...
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
 
Atos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology TrendsAtos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology Trends
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and do
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panel
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA Profession
 

Similar a Digital Transformation 101: How It Will Affect Your Business

[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...POST Telecom for Business
 
The Digital Manufacturer
The Digital ManufacturerThe Digital Manufacturer
The Digital ManufacturerPercy-Mitchell
 
The digital-manufacturer
The digital-manufacturerThe digital-manufacturer
The digital-manufacturerPercy-Mitchell
 
The digital-manufacturer
The digital-manufacturer The digital-manufacturer
The digital-manufacturer Percy-Mitchell
 
Digital Architecture – The Missing Link in Digital Transformation Success
Digital Architecture – The Missing Link in Digital Transformation SuccessDigital Architecture – The Missing Link in Digital Transformation Success
Digital Architecture – The Missing Link in Digital Transformation SuccessNUS-ISS
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Ness Technologies
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
 
Unit 06 Digital Transformation_2022.pdf
Unit 06 Digital Transformation_2022.pdfUnit 06 Digital Transformation_2022.pdf
Unit 06 Digital Transformation_2022.pdfPhmLanAnh23
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsNandita Nityanandam
 
Marcos cloud-in-the-castle-v040811
Marcos cloud-in-the-castle-v040811Marcos cloud-in-the-castle-v040811
Marcos cloud-in-the-castle-v040811faau09
 
Identifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your BusinessIdentifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your BusinessWIN Technology
 
The leap from modernizing to transforming the enterprise it space
The leap from modernizing to transforming the enterprise it spaceThe leap from modernizing to transforming the enterprise it space
The leap from modernizing to transforming the enterprise it spaceMaveric Systems
 
How Eduserv are helping local government organisations
How Eduserv are helping local government organisationsHow Eduserv are helping local government organisations
How Eduserv are helping local government organisationsEduserv
 
Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Akhil Parthasaraty
 
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovTihomir Ignatov
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data GovernanceTrillium Software
 
Century link custom_final_v4
Century link  custom_final_v4Century link  custom_final_v4
Century link custom_final_v4CMR WORLD TECH
 
IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...Rolta
 

Similar a Digital Transformation 101: How It Will Affect Your Business (20)

Digital Transformation.pdf
Digital Transformation.pdfDigital Transformation.pdf
Digital Transformation.pdf
 
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
 
The Digital Manufacturer
The Digital ManufacturerThe Digital Manufacturer
The Digital Manufacturer
 
The digital-manufacturer
The digital-manufacturerThe digital-manufacturer
The digital-manufacturer
 
The digital-manufacturer
The digital-manufacturer The digital-manufacturer
The digital-manufacturer
 
Digital Architecture – The Missing Link in Digital Transformation Success
Digital Architecture – The Missing Link in Digital Transformation SuccessDigital Architecture – The Missing Link in Digital Transformation Success
Digital Architecture – The Missing Link in Digital Transformation Success
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
Unit 06 Digital Transformation_2022.pdf
Unit 06 Digital Transformation_2022.pdfUnit 06 Digital Transformation_2022.pdf
Unit 06 Digital Transformation_2022.pdf
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common Confusions
 
Marcos cloud-in-the-castle-v040811
Marcos cloud-in-the-castle-v040811Marcos cloud-in-the-castle-v040811
Marcos cloud-in-the-castle-v040811
 
Identifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your BusinessIdentifying and Navigating the Technology Lifecycle Stages in Your Business
Identifying and Navigating the Technology Lifecycle Stages in Your Business
 
The leap from modernizing to transforming the enterprise it space
The leap from modernizing to transforming the enterprise it spaceThe leap from modernizing to transforming the enterprise it space
The leap from modernizing to transforming the enterprise it space
 
How Eduserv are helping local government organisations
How Eduserv are helping local government organisationsHow Eduserv are helping local government organisations
How Eduserv are helping local government organisations
 
Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?
 
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
 
Century link custom_final_v4
Century link  custom_final_v4Century link  custom_final_v4
Century link custom_final_v4
 
IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...
 

Más de PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

Más de PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Último

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 

Último (20)

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 

Digital Transformation 101: How It Will Affect Your Business

  • 1.
  • 2. Digital Transformation 101:Howwillit affectyour business? • What is digital transformation? • Some examples of transformative technologies. • What are the benefits? • What are the risks? • What are the impacts? Agenda
  • 3. DigitalTransformationDefinition • Digital Transformation (DT or DX) is the use of new, fast and frequently changing digital technology to solve problems. It is about transforming processes that were non digital or manual to digital processes. 1https://en.wikipedia.org/wiki/Digital_transformation
  • 4. Digital Transformation Digital Transformation can affect the individual, an organization, a process, or larger constructs such as the Internet. It can affect how we do our jobs, conduct our daily lives and how we use technology.
  • 5. Digitaltransformationisnotnew… Mainframe Computers 1943 Personal Computers 1974 Internet Early 1970’s Digital Transformation The difference now is the speed and impact of digital transformation.
  • 6. Challenges with Digital Transformation Rapid Change Rapid Adoption • Insufficient Due Diligence • Integration Issues • Porting “Old” to “New” Poor results from Digital Transformation
  • 10. WhatisaBlockchain? • Database • Records Cryptographically Linked • Redundant Copies Replicated among Stewards / Nodes • Consensus Protocol – Who gets to write a new record • Ability to execute automated processes using Smart Contracts • Can interoperate with Digital Currency
  • 11. DigitalTrustAttributesofBlockchainNetworks • Immutability • Non-repudiation • Zero-Knowledge Proof • Redundancy • Availability
  • 12. NovelUsesfor Blockchains • Provenance – Right to Physical and Digital Assets • Supply Chain – Transactions within a Source to Eventual Destination • Stored Value – Cryptocurrency, Stored Value • Transaction Record – Financial Exchange and Accounting Records • Voting Records • Patient Records • Verifiable Credentials • Citizenship • Professional Credentials • Institution Degrees • Attainment of Social Status (Marriage, Age, Membership) • Global Legal Entity Identifier (gleif.org)
  • 13. Verifiable Credentials in a Nutshell 13
  • 14. The Verifiable Credential Trust Triangle
  • 15. Displays Audit Accreditor Credential Policies & Procedures Information Technology Governance Authority TRUST F R A M E W O R K Trust Anchor Accreditor Standards Attest Criteria Audit Accreditor Auditor Accredits Applies Provides Evidence Asserts Compliance Creates Attest Guidance Evaluates Relies Upon Issues Auditor Credential Oversees Level 3 Criteria Level 2 Criteria Level 1 Criteria Credential Registry Issues Trust Anchor and Credential Registry Credentials Displays Auditor Credential Displays Trust Anchor Credential Accredits Issues Audit Accreditor Credential Creates Updates Issues Credentials Compliance Reports AssertsCompliance Applies Referential Trust Model Blockchain Referential Trust Model
  • 18. Oneplatformformission criticalwork&businessagility Organize and gain visibility into work • Organize, execute, and ensure work is aligned with strategic initiatives Access and dynamically deploy resources • Identify, access, and allocate internal and external resources on demand Drive better business performance • Surface actionable insights into how resources impact business outcomes
  • 19. B U S I N E S S - F A C I N G C U S T O M E R - F A C I N G B U S I N E S S M O D E L & O R G A N I Z A T I O N A L C U L T U R E Changing your business model and organizational culture to adapt to technological change in your industry • Digitize&/orautomate legacyprocesses • Optimizeoperations with data-driven decisions • Instrumentprocessestomanage risk • Digitizesupplychain management & tracking P R O C E S S & O P E R A T I O N S P R O D U C T S & S E R V I C E S • Usetechnologyto solve customer problems • Map & create digitaluserexperiences M A R K E T I N G & D I S T R I B U T I O N • Distributeproducts& servicesviadigital channels • Providecustomersupportand service via digitalchannels Benefits of Transformative Technologies like Cloud K N O W L E D G E & S E L F - S E R V I C E • Providebestpractices& digitaltools to avoid knowledgeloss and knowledge waste • Enable self-servicedataexploration, knowledge-sharing,and toolset development
  • 20. Data transfer options API connection, push vs pull, SFTP, compiledfile andemail, etc. All datain 3rd partycloud applications What regioncountry isdata in? Complianceconcerns with GDPR, CCPA,PCI,etc. 3rd PartySub-processors What 3rd partyprocessors are cloudservices using? Control over access Integrations with Single Sign On, account provisioning, Shadow IT Easy for peoplewith corporate cardto sign up/purchase appsto start putting data in Ease of access Blessing and a curse, what makes Data Transformation great andavailable, increases the risk and needfor security controls around it. Risks of Transformative Technologies like Cloud
  • 21. Obligations to Privacyand Disclosure Moving data around, methods andrequirements todisclose applications and locations of data. Enhanced 3rd PartyRisk Programs How doInformation Security teams adapttoadded3rd partyrisk? Application Security and Vulnerability due-diligence Addedincrease torisk surface area outside of traditional brickand mortar datacenters andinternal development Audit ScopeIncrease Addedapplications means potential addto external audit review Importance of Information Security (IS) Training Ensuring IS training is continual, updatedandengaging to aidin compliance. Impacts of Transformative Technologies like Cloud
  • 23. Artificial Intelligence AI is currently been utilized in various forms for workload such as: • Processing large amounts of data to farm out patterns (e.g., threat hunting or data mining) • Responding to human users in real time (e.g., chat bots) • Make real-time decisions to stop threats (e.g., endpoint protection)
  • 24. Internet of Things Definitions vary on IoT but it is generally agreed that IoT can include the use of smaller elements of a larger infrastructure to produce larger results than would be possible otherwise.
  • 25. Internet of Things Cars, farm resources, medical devices, smart TV’s, etc. Buildings, Infrastructure, Utilities (typically SCADA) Endpoint Devices Short range communication devices such as routers using 802.x, Bluetooth, etc. Link from end devices to external networks Gateways Cellular, Fiber, Dedicated links, etc. Link gateways to the service level Telecomms / Internet links End user, Big Data, Automation, etc.Service Level
  • 27. DigitalTransformationDrivers • Application of new technological advances • Need to find new solutions to current challenges • Drive to build new markets • Information sharing • Major events (e.g., pandemics driving remote working) can lead to: • Drive to do more real-world activities through digital means (e.g., online shopping) • Change to where employees work
  • 28. Digital Transformation Controls Transformative Technologies include speed, new technology, and change as elements of their DNA… so how can this all be managed? Assess transformative technology and those providing it Manage change through established change or transformation processes Apply known standards or frameworks such as ISO38500 or ISO9001 Plan the adoption of new technology (do not just migrate current issues to new technology)
  • 29. RoundTable: Opinionson Digital Transformation What are the impacts of digital transformation on businesses? What does the future look like for digital transformation? What is your top take-away lesson for digital transformation?
  • 30. Summary Digital Transformation can impact your business with new technologies and new ways to use existing technologies. Digital Transformation can be a fast, game-changing experience. Adopting a structured approach to Digital Transformation is key to avoiding its associated pitfalls (e.g., using grounded standards such as ISO38500).
  • 31. ISO/IEC 27001 Training Courses • ISO/IEC 27001 Introduction 1 Day Course • ISO/IEC 27001 Foundation 2 Days Course • ISO/IEC 27001 Lead Implementer 5 Days Course • ISO/IEC 27001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001 www.pecb.com/events