Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Similar documents
How Your Organization Can Drive Success in the Age of Digital Disruption

5 Steps to Government IT Modernization

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

DIGITAL INNOVATION HYBRID CLOUD COSTS AGILITY PRODUCTIVITY

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Accelerate Your Enterprise Private Cloud Initiative

STRATEGIC PLAN

Weaving Security into Every Application

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Accelerating Cloud Adoption

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Cybersecurity. Securely enabling transformation and change

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Cisco Borderless Networks Value Proposition

Cisco Start. IT solutions designed to propel your business

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

White Paper. View cyber and mission-critical data in one dashboard

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Symantec Data Center Transformation

MITIGATE CYBER ATTACK RISK

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Government IT Modernization and the Adoption of Hybrid Cloud

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Smart Data Center Solutions

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

THE POWER OF TECH-SAVVY BOARDS:

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Securing Digital Transformation

VMware Cloud Operations Management Technology Consulting Services

eplus Managed Services eplus. Where Technology Means More.

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

An Aflac Case Study: Moving a Security Program from Defense to Offense

Smart Manufacturing and Standards: The NIST Role

Digital Network Architecture

HP Fortify Software Security Center

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Navigating the Clouds Fortifying ITIL for Cloud Governance

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Service Provider Consulting

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

FOR FINANCIAL SERVICES ORGANIZATIONS

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

AKAMAI CLOUD SECURITY SOLUTIONS

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

HPE IT Operations Management (ITOM) Thought Leadership Series

Go mobile. Stay in control.

TD01 - Enabling Digital Transformation Through The Connected Enterprise

The Value of Data Governance for the Data-Driven Enterprise

NCSF Foundation Certification

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

Organizational Readiness for Digital Transformation

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

VMware Virtualization and Cloud Management Solutions

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Converged Cloud and Digital Transformation: A Strategy for Business Success

Cisco Digital Network Architecture The Network Enables Digital Business. Rene Andersen Cisco DK

Day One Success for DevSecOps and Automation on Azure

Optimisation drives digital transformation

Cloud without Compromise - Continuous Innovation for Growth

Best Practices in Securing a Multicloud World

Operationalizing the Three Principles of Advanced Threat Detection

Sustainable Security Operations

MICROSOFT AND SAUCE LABS FOR MODERN SOFTWARE DELIVERY

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Orchestrating Network Performance CASE STUDY

About KBC KNOW YOUR NETWORK

MODERNIZE INFRASTRUCTURE

Vulnerability Management

Transforming IT: From Silos To Services

Oracle Buys Automated Applications Controls Leader LogicalApps

The intelligence of hyper-converged infrastructure. Your Right Mix Solution

Securing a Dynamic Infrastructure. IT Virtualization new challenges

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

CYBER SOLUTIONS & THREAT INTELLIGENCE

How to Evaluate a Next Generation Mobile Platform

The Windstream Enterprise Advantage for Banking

CIO Forum Maximize the value of IT in today s economy

Enabling Security Controls, Supporting Business Results

The Latest EMC s announcements

Dell helps you simplify IT

Tripwire State of Cyber Hygiene Report

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)

Azure DevOps. Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

DXC Technology and VMware: Innovation that Transforms

F5 Reference Architecture for Cisco ACI

IT Consulting and Implementation Services

Transcription:

Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018

Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new business model is giving us unprecedented insight into our 2business partners 3Gaining efficiency through automation and enabling a faster, smarter and more secure way of doing business 4Investments in cyber fortifying defenses, protections and reducing risk 2

By delivering superior value for our clients, associates and shareholders by providing technology services that create a WOW experience

BB&T s Technology Horizons Envision a More Technology- Enabled Business Horizon 3 Horizon 1 Stability and risk mitigation Ensuring platform stability and performance Stewarding large project investments to completion Managing all aspects of technology risk Horizon 2 Setting the foundation for the future Creating a scalable, flexible foundation to serve the business changing needs, efficient and future-proof Exploring key technologies that are new to the industry (e.g., cloud) Creating a talent magnet for the types of skills we will need Enabling the company to stay at the forefront of the industry Assuring the company s competitive position in the face of industry trends and competitive investments at scale Leveraging our platforms to open up and capture new business opportunities Adapted from McKinsey 4

Transformation in Technology and Continuing Investments Drive Digital Transformation New Business Model Cost Optimization New Delivery Model Lean and Process Optimization Enhancing & Leveraging Data Capabilities Cyber Security Investments Results Technology-enabled business Business line focused organization 5

Driving Transformation Baseline and assess current state performance and effectiveness Design, implement and test changes Scale up the future operating model by building out capabilities Cost performance Organizational structure Operations process efficiency Develop customized approach to improve IT performance and cost efficiencies Workforce management and governance New BIO org and revised spans of control App maintenance workflow optimization Software productivity Holistic labor strategy Sustainable Lean operations Governance processes Demand management & prioritization High-quality output Continued innovation Agile delivery Adapted from McKinsey 6

BIOs New Business Model Digital Services Retail Banking Commercial Banking & Financial Services Operations Shared Services Insurance Services Enterprise Services Easier to do business with Shorter lead times, faster speed to value Able to listen to our clients more closely Operate more nimbly and efficiently Full access to D&TS Organization through BIO Supported by Data & Technology Shared Services Groups 7

New Delivery Model Agile Leveraging the Agile development methodology utilizing small teams in short development sprints to quickly turn out deployable code, delivering value faster DevOps Embracing DevOps operations methodology allowing D&TS developers and operations to more closely collaborate and deliver automated testing and deployment of code IaaS Building out Internal Cloud capabilities to provide substantial efficiency gains and speed-to-market benefits, combined with the DevOps pipeline and increasing automation 8

Agile 9

DevOps and IaaS 10

Driving out Cost and Inefficiency with Lean and Process Optimization Focus on reducing process waste, inefficiencies, non-value add activities, mapping, measuring and driving automated solutions where possible and appropriate. Key initial process identified: Document Evaluate Optimize Automate Enhancement of identification, estimation, prioritization, funding and initiation of work within the new Operating Model Demand and Workforce Management Lean Application Maintenance System Development Lifecycle Delivery Services Queues, Workflows, & Automation Workforce Onboarding Change Mgmt. / Production Gating Software Packaging Process Enterprise Access and Security Value Chain for NDM Assess change governance process for opportunities Ensure process operates within Continuous Delivery environment Define roles, responsibilities and operational processes for the adoption of DevOps and Cloud 11

Enhancing and Leveraging Data-Driven Capabilities Automate Everything Democratize Data Optimize Operations Increase data quality and speed of delivery, while reducing costs Simplify data model pipeline Responsibly empower the right people and every associate to create business (and client) value for the data Unlock insights and drive innovation Integrate analytics, data and business processes Streamline operations to maximize how we know, understand and serve our clients 12

Investments in Cyber Security Access Control Capability Acceleration Skill Acquisition Tightly Controlled Access Consistent client experience across channels with enhanced authentication capabilities Reduced security risk Consistent and secure configuration and maintenance of security infrastructure, managed and monitored Fortified Cyber Defenses and Protections Consistent and timely remediation of vulnerabilities Secure, consistent configuration & maintenance of IT infrastructure; monitoring of secure configurations Proactive reduction in malware and phishing threats Advanced Security Skill Sets in Critical Areas Critical positions aligned to ensure consistent visibility and focus on information security tasks 13

Millions Investments in Cyber Security Trends: 2013-2018 Corporate Information Security has continued to grow to further advance BB&T s cybersecurity protections $100 Information Security Investment Trend Total $104.2 $14.2 $80 $60 $40 $20 $0 Total $23.0 Total $29.7 Total $34.3 Total $34.3 $12.9 $16.9 Total $59.5 $13.8 $12.0 $9.0 $11.0 $36.5 $4.0 $12.8 $1.0 $3.7 $21.5 $8.0 $9.0 $12.9 $8.0 $6.0 $5.4 $7.1 $8.2 $11.7 2013 2014 2015 2016 2017 2018 (Forecast) $9.7 $41.7 Other Groups CIS Projects CIS Staffing CIS Baseline 14

Investing Strategically in Systems and Innovation Corporate Technology Spend Other LOB Spending 5% Innovation Projects 20% Portfolio Projects 14% Infrastructure Spending 61% 2018 technology and innovation spend $1.1 Billion 15

Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new business model is giving us unprecedented insight into our 2business partners 3Gaining efficiency through automation and enabling a faster, smarter and more secure way of doing business 4Investments in cyber fortifying defenses, protections and reducing risk 16