Emerging technologies for the Public Sector · Big Data & Analytics Mobility Enterprise Cloud...
Transcript of Emerging technologies for the Public Sector · Big Data & Analytics Mobility Enterprise Cloud...
February 2017
Emerging technologies for the Public Sector Aljosa Pasic, Atos
Why Atos ?
3,634 bn€
3,089 bn€
2,084 bn€
1,878 bn€
Manufacturing, Retail & Transportation
Telcos, Media & Utilities
Financial Services
Public sector
2
Semantics
Tax, State Treasury & Customs
eGovernment
Healthcare MyCity
Bluetooth Medical Device Profile
CNS_GEMMA
Civil & National Security
SAP for Public, Tax, State Treasury and Customs
Case Management
Education
2014 2015 2016 2017
Digital Security
Analytics and Visualization
The Economy of Data
IT Agility
Privacy Enhancing Techs
Secure Community Cloud
Sensor Networks
Student Lifecycle Systems
Telemedicine
3D
Predictive Analytics
Semantic Data Integration
Semantic Interoperability
Software Defined Radio
Domotics
Next Gen ID Mgmt
Artificial Intelligence
New Weapons
Quantum Cryptography
Stealth Technology
Virtual Reality
https://atos.net/en/industries/central-government https://atos.net/en/industries/local-government-cities …also defence, education, healthcare
https://ascent.atos.net/
3
14/02/2017
Research & Innovation Public
Public Sector & ICT technologies
1. What are we talking about when we talk about technologies for public sector ?
2. Which are the characteristics to have in mind ?
▶ Gartner: information, interaction, transaction and transformation
▶ Layne and Lee: horizontal and vertical integration
▶ Gottschalk and Saether: work process, knowledge sharing, value creation, strategy alignment
4
14/02/2017
Research & Innovation Public
Creating value for citizens
and business through
innovation
Cost, quality, security and
speed of application
portfolio
Anticipating and
leveraging new trends
Market dynamics and trends
Economic down-turn since 2007
More demanding
users
Reduction of IT budget
Security and GRC
Management
Big Data & Analytics
Mobility
Enterprise Social Network Cloud
computing / SaaS
Digitalization Business Services
Service Integration
Business Process Integration &
Mgt.
Transformation driven by technology
5
14/02/2017
Research & Innovation Public
Dynamics of changes in ICT
Needs for global
collaboration
and awarness
Enrichment
by abstraction
Platforms
Composition
Need for flexibility,
fast reaction…
Evolution by
fragmentation
Specialised services
Fragmentation
Conceptual leap
with need for
degree of
freedom
Public Sector
metamorphosis
New Model
6
14/02/2017
Research & Innovation Public
The 3 drivers for ICT changes in Public Sector
Collaborating with
People, Machines and
Virtual Beings
Mastering the
Technologies of
Disruption
Addressing Ever
Changing Challenges
7
14/02/2017
Research & Innovation Public
Citizen-centric
“Citizen issue before technology”
Experience-guided
“User-experience anytime, anywhere”
Data -driven
“Dig in the mountain of data”
Platform-based
“Reference patterns and cloud services”
Shapes
Gu
ides
Shapes
Gu
ides
How to increase adoption of emerging technologies?
8
14/02/2017
Research & Innovation Public
8
Citizen-Centric ?
Healthcare
services
Citizens need to be at the center of the design, development and delivery of public services.
▶ deliver public services in line with citizen’s expectations :
– always accessible , from anywhere, at anytime , and from any device
▶ do more with less : improve the quality of services delivered and make budget savings
▶ evolve and quickly adapt public services :
– personalized services for citizen communities, maybe even for individual citizens
– transforming public services to take advantage of new data sources and big data benefits
9
14/02/2017
Research & Innovation Public
▶ The solution is always embedded in a context: political, organizational, administrative, operational, device etc
▶ Crossing context boundaries has always been a challenge
▶ Automation of (some) physical & virtual context information management e.g. context data gathering and processing should be a must
10
14/02/2017
Research & Innovation Public
▶ Data from multiple actors, assets and resources – personalized service composition and delivery
▶ Examples:
– your passport needs renewal
– your consumption of CO2 has been reduced, therefore you get free voucher for citybike
– your process at this moment can be executed in this multi-cloud setting
11
14/02/2017
Research & Innovation Public Platform-based ?
▶ Platform was always in the “core” e-gov thinking (e.g. One stop shop is reusing front-end and authentication reuse)
▶ Components and software reuse (open source reuse)
▶ Infrastructure reuse (storage as a service)
▶ Knowledge reuse (schemes, taxonomies)
▶ Data reuse (Opinion mining)
▶ Citizens and business as “partners”, service co-creators or prosumers (stakeholder onboarding)
▶ Government as a service – platform for all of this?
12
14/02/2017
Research & Innovation Public
12
Challenges: Scale, diversity, automation, relationships, context, dynamicity…
Regulators
Software
manufacturers
Service Provider
Angry citizen
13
14/02/2017
Research & Innovation Public
Evolution of FutureGov Explosion, expansion and emergence
FutureGov
Personalization
Control
Interoperability
Collaboration
Expanding
Identities
Exploding
Data
Evolving
Infrastructure
Emerging
Regulations
Accountability
14
14/02/2017
Research & Innovation Public But we have technology already ?
Computers are useless. They can only give you answers.
Pablo Picasso
Painter
(1981-1973)
2015
Thank you Atos Research & Innovation [email protected]
Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud and Atos WorldGrid
are registered trademarks of Atos SA. June 2011
© 2011 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos.
Identity and privacy lab 2016+ Input from ARI (Alberto Crespo)
Privacy-preserving computation
Privacy transparency enhancement tool (Privacy Dashboard)
Secure identity broker for clouds
Private Identity Access Manager
New Generation Anonymization for Big Data
Transformational
Low
Now Year 1 Year 2 Year 3 Year 4
Data lab 2016+ Input from ARI (Tomas Pariente)
Data integration and fusion
Data privacy and security in integrated environment
Deep learning and other innovative analytics
Blueprints of big data architectures
Transformational
Low
Now Year 1 Year 2 Year 3 Year 4
Cloud lab 2016+ Input from ARI (Ana Juan)
Cloud service marketplaces
Cloud service Brokerage / Aggregation
Micro-services Architectures
Dynamic MultiCloud migration
XaaS Multi-Cloud Service management
Mobile/Things Clouds "Fog Computing"
SLA Management
Ad-hoc Local/ Mobile Clouds
Cloud network composite management - BoD
Advanced Multi-tenancy management
Scalability based on Application loads
prediction and container based
Eco-efficiency
Trust Models
Transformational
Low
Now Year 1 Year 2 Year 3 Year 4
Internet of everything lab 2016+ Input from ARI (Jose Gato)
open APIs for IoT integration
Smart gateways
Secure IoT
Low energy consuption IoT
Polyglot frameworks
Transformational
Low
Now Year 1 Year 2 Year 3 Year 4
Time series data services
Real time event notification
Cybersecurity lab 2016+ Input from ARI (Rodrigo Diaz)
Cloud security proxy
Operational technology security
Integrated risk, context based security
Continous security monitoring
Software defined security
Transformational Low
Now Year 1 Year 2 Year 3 Year 4
Security analytics
Trusted brokers
Self adaptive security
Interplay of policy and technology
▶ EU Policy
▶ Global Market trends
▶ Business Demand
▶ Challenges and ideas
▶ Analysis and assessment in realistic operational environment
▶ Ideas for cost efficient improvements
Top-Down
Bottom-Up
Controls
▶ More trust : cloud brokers, data sharing…
▶ Less trust : “zero trust” concept
▶ More speed: automation, situational awareness
▶ Less speed : encrypt everything
▶ Big data: security intelligence from unstructured sources analysis
▶ Small data : targeted time-limited collaboration
▶ Software defined : policy is the king
▶ Hardware defined : HCE, TPM…
▶ Put awareness everywhere : context-aware, privacy-aware…
▶ Put risk everywhere: risk driven reporting, risk based auth…
▶ Put cost everywhere: back to BUSINESS DEMAND !!!!
Practice as market analyst trends
Practice as open (future) challenges
▶ Requirements: how to decompose and validate high level concepts (compliance, privacy, trust, risk…) and link them to security requirements and operational events?
▶ Scale: how to reason about millions of events in (near) real time (streamreasoning)?
▶ Dynamicity: how to model dynamic characteristics of trust, business etc (e.g. dynamic prioritisation according to dynamic risk perception) ?
▶ Domains of control and cross-layers: how to correlate events from different sources/channels (address new threats) ?
▶ Risk/Cost: how to achieve optimal security (e.g. Context-aware configurations) at optimal cost?
▶ Assurance/accountability: how to establish end-to-end (E2E) assurance with justifiable and composable evidences?
Cybersecurity research
▶ Some projects manage to cross the
gap between “solution to a challenge” (use case) and “real demand side need” (business case)
▶ Demand side does not know what the need will be in 4 years from now, so market trend and challenge driven research is predominating
▶ Research projects in cybersecurity are
TOO long: continuous refocusing, fine-tuning and better targeting is needed
What about identity and cybersecurity?
Identity Contexts and Conflicts
Cultural, Societal, Organisational, Legal….
Possible conflicts: usability, accountability…
“Dr. Jekyll, table for two?”
Emerging business trends and sec challenges
Data
revolution
Internet of
Things
Open delivery
platforms
New data availability, networks and processing services are being deployed. This brings technical challenge which will require a huge investment
New intelligent devices and sensors offer new possibilities for information and analysis and open the door to new automation and control possibilities
A new way of service deployment: • Use only what you
need and pay only what you use (Cloud)
• Open innovation ecosystems where apps from different parties may be combined and delivered multi-screen
I II III
Need of privacy & security FOR BD !!!!
Impact analysis for society at large ?
▶BD results and Post-use impact
– Discrimination
– Data divide
– Power imbalance
– Echo chambers
▶Risk treatment ? : cultural and societal awareness and capacity building