'Absolute garbage': Comm Bank CIO dismisses security, data sovereignty as cloud barriers
- 13 November, 2012 18:19
Commonwealth Bank CIO Michael Harte today told participants at a Sydney event organised by Amazon.com's cloud computing arm, Amazon Web Services (AWS), that data sovereignty and security have been used as unjustified excuses to stop businesses moving to the cloud.
"The favourite [excuses] I used to hear when I talked to the big household names in infrastructure equipment was, 'It doesn't look very secure Michael. You can't do that. And there's data sovereignty; you'd want to look very, very carefully at that. And this on-demand pricing — no we just can't do that we've got rules saying specifically we can't."
Harte condemned the excuses as "absolute garbage".
CBA has shifted a dozen on-premise applications to the cloud, Harte told the audience at AWS's Customer Appreciation Day event. "The operational cost reduction is huge," he said.
"We've halved storage costs, we've halved most of our app testing and development cost. We've got a wide range of technology functions as a service. We've got application development, testing, infrastructure, software and storage."
Harte said the bank was looking for a "40 per cent improvement in pricing across all the things that we consume as a service".
"We've saved already tens of millions of dollars in the small initiatives that we've done. And we're looking forward to saving hundreds of millions of dollars buying specified services on demand."
Beyond costs, Harte said the benefit of cloud was in changing the relationship of IT with business partners within an enterprise — "the happiness that you can get from your business partners because you're delivering services up on demand within minutes or within days rather than within days, months, weeks, that it normally took."
Harte said that Australian businesses haven't moved fast enough to embrace cloud and urged the audience to "get in front of the executive committees of your business and talk to them about the ways we can free up spending and make IT a valued partner".
AWS overnight publicly launched its Asia Pacific (Sydney) Region, offering customers access to two data centres.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
- Audit agency does BYOD with BlackBerry
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Chandler Macleod recruits new user virtualization platform
One of Australasia’s largest and most successful recruitment and human capital management companies share their success story after recruiting a user virtualization platform, giving them control over the users and devices that have access to specific applications.
Pathways Course Curriculum 2014
Developed by the CIO Executive Council, Pathways is a unique, flexible, self-managed, self-paced 12-month professional development program that brings together best practices, thought leadership and business insights for today’s most promising ICT professionals. Pathways is designed and delivered by leading local and global CIOs; enabling participants to capitalise on mentor CIOs personal experiences, expertise and knowledge.
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.