Fulfilling the Unfulfilled Promise of Mobility as a Service (MaaS)
Customers’ raised expectations, government policies, a spike in fuel prices and technology innovation are converging to enable convenient, affordable, safe and environmentally sustainable mobility as a service (MaaS). MaaS solutions help connect the different phases of the door-to-door mobility experience, from planning to booking, payment, navigation and information queries, with seamless integrations across modes of transportation.
MaaS is not new, but it has been plagued by technical interoperability challenges and difficulty in finding the right business models that can push mobility ecosystem stakeholders — transit authorities, car OEMs, payment providers, transport network companies — to collaborate and share data.
Good Practices for MaaS Ecosystem Innovation
IDC research shows that MaaS is reaching an inflection point. Best practices are emerging among public transportation authorities and transportation operators to deliver on the promise of enabling customers to travel in a convenient way, when it suits them and at a reasonable cost.
At the same time, MaaS is enabling transport operators and planners to optimise the use of capital-intensive asset capacity, launch new revenue-generating services and encourage a modal shift to public modes of transport among citizens.
It all starts with the customer. User-centric MaaS apps enable travellers to build their unique mobility profile based on personal preferences, financial profile, physical characteristics and past behaviour. Service providers must recognise, serve and safeguard the individual preferences of each user to deliver truly personalised MaaS offerings.
Cities such as Genoa have deployed mobile-first user apps that provide a single point of access to information and services while on the move.
To book and pay for their journeys directly in the MaaS app, without the need to switch to a transport operator app, stakeholders must share data and define contractual models that benefit the whole ecosystem. In Spain, train operator Renfe has launched a door-to-door booking MaaS solution (the dōcō app) underpinned by a platform that enables actors across the mobility ecosystem to collaborate openly, from micromobility service providers, to ride-sharing apps, to technology manufacturers and payment system providers.
To enable rapid innovation and scale these MaaS data platforms to process, store, integrate and analyse vast swathes of data, transportation ecosystem companies such as Entur in Norway are moving away from monolithic, legacy systems to cloud-native solutions that enable data sharing at scale and agile innovation.
Once data is aggregated and information is made accessible through platforms, transportation authorities can use it to build a mobility digital twin of the city that can help with traffic forecasting and simulation, traffic/city planning, infrastructure maintenance and asset management, and logistics resource planning. Data sharing can also support the development of new services and businesses.
Further reading:
IDC PeerScape: Practices to Successfully Implement Mobility as a Service
Rise of FinOps and GreenOps — The Importance of These Strategies in 2023 and Beyond
The ongoing general crisis due to geopolitical events such as the Russia-Ukraine war, skills shortages, and recession has increased prices and, consequently, inflation in Europe.
Improving energy efficiency (47%), reducing energy demand (41%), electrifying energy loads (34%), or investing in renewable sources and production (32%), are, among others, the main actions European organizations are taking to limit the impact of rising energy prices, according to IDC EMEA, FERS Survey Europe, Wave 11: December 1 — December 10, 2022 (N=363).
There is hardly any sign of a slowdown in the accelerated cloud adoption seen during the 2020 crisis. However, organizations are now realizing that cloud costs and assessing IT’s role in meeting an organization’s sustainability-related targets are rising in priority.
Only 8% of European organizations stated that they are not wasting money in the public cloud, according to the IDC European Multicloud Survey, 2022 (N=1,077). With ever-increased cloud costs and waste and greater concern about sustainability credentials, organizations are keen to embrace FinOps and GreenOps. Both solutions are connected to reducing cloud costs and IT’s carbon footprint.
What Are FinOps and GreenOps?
FinOps
We define FinOps as a cloud discipline that enables users to maximize business value and achieve financial excellence while aiming at improving teams’ collaboration, transparency of cloud costs as well as optimizing cloud resources. Optimizing cloud use can contribute to reducing a company’s carbon footprint and help cut cloud “waste”.
GreenOps
GreenOps is defined as an operating model that integrates the technologies, techniques, and business practices designed to maximize efficiency in the cloud while reducing environmental impact. It optimizes resource usage with better cooling, greener building materials, and smarter control systems, which are fundamental in datacenters.
A common GreenOps and FinOps capability is the optimization of cloud resources through right-sizing. GreenOps practices include switching off resources during idle hours, choosing a region that utilizes renewable energy (e.g., the Nordics), developing energy efficient architecture for workloads, or using cloud-native solutions (e.g., event-driven, serverless technologies), but also implementing heat and water re-use as well as improving waste management.
Why Are FinOps and GreenOps Important?
Both FinOps and GreenOps will become increasingly important as companies look for concrete ways to control cloud costs, deliver innovation, and contribute to ambitious sustainability-related goals. Indeed, reducing operational costs is one benefit of GreenOps, as well as the capability to attract both consumers and businesses that are increasingly interested in purchasing green brands with strong environmental, social, and governance (ESG) credentials.
FinOps and GreenOps strategies will also enable cloud vendors to build and empower their digital trust with customers. In conclusion, costs and carbon footprint reductions are the challenges that European organizations are facing in this current macroeconomic environment. Only through a deep collaboration with cloud vendors can they embrace FinOps and GreenOps and then compete and keep their business running.
Join us on Wednesday, January 25, 2023, at 11am GMT, when IDC will discuss the new European cloud trends in 2023 and beyond, including trends and opportunities around FinOps and GreenOps.
The NIS2 Directive – What’s on Your To-Do List?
This is the second blog in IDC’s series focusing on the implications of the EU’s updated Security of Network and Information Systems directive, NIS2. The directive comes into force in January 2023, after which Member States have 21 months to transpose it into their national law – by October 2024.
The broad aim of NIS2 is to engender a high common level of cybersecurity in the EU, across all Member States, in the long term.
The first blog looked at the regional and national entities that are tasked with transposing and implementing the new directive, as well as some of the mechanisms that are being put into place to effect improved cybersecurity across the bloc.
This second instalment looks at which organizations NIS2 will apply to and what will be required of them.
Expanding the Reach
The first NIS directive introduced a clear focus on improving cybersecurity and risk management at critical infrastructure in Europe: energy (electricity, oil, and gas), transportation, drinking water supply and distribution, healthcare, banking and finance, and digital infrastructure (Internet Exchange Points, DNS service providers, and Top-Level Domain (TLD) name registries). These were defined as operators of essential services (OES’s).
The volume and frequency of cyberattacks since the first directive came into force has driven home the message that cybersecurity safeguards and improvements need to be more far-reaching. Industry sectors that may not be viewed as critical may supply components or services to critical infrastructure, from electrical equipment to medical devices. Disruption of food production and distribution or waste management can have a major impact on the function of society. Digital providers such as search engines and online marketplaces are recognized for their universal value.
Consequently, the NIS2 directive extends coverage into all these segments and more. A full list of sectors defined as high criticality or critical is below:
High Criticality Sectors
- Energy.
- Transport.
- Banking.
- Financial market infrastructures.
- Health.
- Drinking water.
- Waste water.
- Digital infrastructure.
- ICT service management (B2B).
- Public administration.
- Space.
Other Critical Sectors
- Postal and courier services.
- Waste management.
- Manufacture, production and distribution of chemicals.
- Food production, processing and distribution.
- Manufacturing (medical devices, computer, electronic and optical products, electrical equipment, motor vehicles, transport equipment).
- Digital providers (online marketplaces, search engines and social networks).
- Research organisations.
Furthermore, it is recognized that it is not only large enterprises that represent a target for cybercriminals or are fundamental to critical services. Consequently, the NIS2 directive also extends the scope to cover midmarket organizations with 250 or more employees and turnover of €10 million or more.
The To-Do List
So, if your organization falls within the sectors covered by NIS2, what requirements are coming your way in the next two years? There are two major aspects to this, detailed in Chapter 4 of the directive, Cybersecurity risk management measures and reporting obligations.
Article 21 of the directive covers the cybersecurity risk management measures and lists the following 10 areas as the minimum recommendation:
- Policies on risk analysis and information system security
- Incident handling
- Business continuity and crisis management
- Supply chain security
- Security in network and information systems acquisition, development and maintenance
- Policies and procedures to assess the effectiveness of cybersecurity risk-management measures
- Basic cyber hygiene practices and cybersecurity training
- Policies and procedures regarding the use of cryptography and, where appropriate, encryption
- HR security, access control policies and asset management
- MFA, continuous authentication, and secure communications where appropriate
It is likely that most entities within critical infrastructure sectors will already have many of these technologies and measures in place, to some degree. The question will be in the level of detail or prescriptiveness that member states go to when transposing this article into their national legislation.
The directive emphasizes that the implementation of these measures should take into account the state-of-the-art, relevant European and international standards, the cost of implementation, the degree of the entity’s exposure to risks, the entity’s size and the likelihood of occurrence of incidents and their severity, including their societal and economic impact. These considerations should be used to determine appropriate or proportional measures.
Article 23 of the directive covers reporting obligations and requires that in the case of any incident that has a significant impact on the provision of their services, essential and important entities notify their CSIRT or competent authority. An early warning should be submitted within 24 hours of the organizations becoming aware of a significant incident, and a more comprehensive incident notification should be submitted within 72 hours.
Further reporting obligations are detailed within the directive and it will be necessary for all organizations covered by NIS2 to familiarize themselves with these obligations once they have been transposed into their national law.
Conclusion
It is early days still for NIS2 and much will depend on the work done over the next 21 months. Nevertheless, the cyberthreats driving this directive will not wait and the benefits from improved cybersecurity measures will outweigh the risks.
Regardless of the final wording of the local versions of the directive, organizations can benefit from getting up to speed with NIS2 and engaging with the existing cybersecurity authorities within their countries to develop their strategies.
NIS2 Directive Comes into Force to Drive Cybersecurity Across the EU
November 2022 was a busy month for the European Commission, with two major pieces of legislation passed that aim to bolster the cybersecurity and cyber resilience of Member States and at organisations across the bloc.
The first was the Digital Operational Resilience Act (DORA), which covers the finance sector and companies that provide ICT services and infrastructure to financial sector entities. The second was the long-awaited update of the Security of Network and Information Systems (NIS) directive, known as NIS 2.
The broad aim of NIS 2 is to engender a high common level of cybersecurity in the EU, across all Member States, in the long term.
This is the first in a two-part IDC blog series that will focus on the implications of NIS 2.
The Clock is Ticking
The full text of the NIS 2 directive was published in the official journal of the European Union on December 27, 2022, and enters into force 20 days after that (January 16, 2023). Thereafter, Member States will have 21 months to transpose the directive into their national law (by October 17, 2024). What happens between now and then?
Building the Frame(work)
The next 21 months will be critical for the success of NIS 2 as regional and national bodies get to work on transposing the articles of the directive into their national legislation. Who will be responsible for this part of the process?
The prime mover in this respect will be the NIS Cooperation Group, which was established in 2017 to support the first NIS directive. The Cooperation Group comprises representatives of all the EU Member States, the European Commission and the EU Agency for Cybersecurity (ENISA).
The group will provide guidance to the national authorities of the Member States on transposing and implementing the directive. It will also provide guidance, advice and cooperation on numerous related areas including cybersecurity policy initiatives, capacity building, training and awareness, exchange of information and best practices, and vulnerability disclosure. It will also be responsible for defining standards and technical specifications, as well as maintaining a central register of essential and important entities in each country.
A second key group will be a network of computer security incident response teams (CSIRTs) across all the Member States. At least one CSIRT in each country will be designated as a competent authority for various roles including international cooperation and coordination, threat monitoring and analysis, and the provision of incident response and assistance to essential entities.
The third key entity is the European Cyber Crisis Liaison Organisation Network (EU-CyCLONe). Its task is to support coordinated management of large-scale cybersecurity incidents and crises at an operational level. It will also ensure regular exchange of information among Member States and relevant entities within the union. EU-CyCLONe’s role will really crank up once the directive is in place.
Key responsibilities will include:
- Developing shared situational awareness for large-scale cybersecurity incidents
- Assessing the impact of large-scale cybersecurity incidents and proposing potential mitigation measures
- Coordinating the management of large-scale cybersecurity incidents and supporting decision making at the political level
Between them, these organisations, along with the Member States themselves, will be tasked with ensuring that when NIS 2 comes into force at the national level, it is appropriately transposed into national law and the countries are able to put in place the necessary structures and resources.
Kicking the Tyres
One criticism of the first NIS directive was that it lacked teeth. The EC is striving to establish NIS 2 more firmly throughout the bloc and one measure through which it seeks to do this is peer reviews. These are aimed at assessing at a national level the conformity, progress and readiness of the directive. For example, peer reviews will assess:
- The level of implementation of cybersecurity risk management measures and reporting obligations
- The level of capabilities, including available financial, technical and human resources
- The operational capabilities of the country’s CSIRTs
- The level of implementation of cybersecurity information-sharing arrangements
Peer reviews are to be carried out by designated cybersecurity experts from at least two Member States, at a maximum of once every two years. The experts conducting the reviews are expected to provide reports including recommended improvement on any of the reviewed aspects. Those reports will be submitted to the Cooperation Group and the CSIRTs network where relevant.
Conclusion
These entities and processes should ensure that at a regional and national level the EU and its Member States can develop a higher level of cybersecurity and resilience by adhering to the NIS 2 directive.
The second instalment of this blog series will look at which organisations NIS 2 will apply to and what will be required of them.