Stephen Holmes

Stephen has over 23 years IT experience with a wide range of Outsourcing experience gained from the supplier side of outsourcing having worked for Atos Origin (European outsourcing focus), Cognizant (offshore focus) and is currently Vice President of FinTech Banking Lab at Virtusa. Where he focuses on disruptive new technologies and applying these to the banking domain. Stephen is currently serving on the British Standards Institute Blockchain Standards group chairing the Privacy and Data governance working group he has also served on the Microsoft Outsourcing Partner Advisory Council whilst at Atos Origin and is a certified Enterprise Architect (TOGAF 9.1). He holds an MBA with specialism in new product and services development. He started his career with IBM UK where he played several key roles in developing CICS ESA 4.3 and IBM MQ Series. He worked for Hewlett Packard where he collaborated with IBM and Seagate to create and license an industry standard for tape backup – Linear Tape Open. His focus within outsourcing has been large scale transformation programs and effective introduction of innovation into organisations. Stephen has worked globally and enjoys the unique challenges of managing international teams. He enjoys exploring the "art of the possible" with Customers to enable business objectives to be defined and successful development of a defined business case as part of the services contract lifecycle. He is an industry expert in Blockchain and has published articles in American Banker, the Times and many Blockchain/Bitcoin publications.

Posts by Stephen Holmes

Blockchain Trends – 2018

One of 2018’s key developments will be the expansion of blockchain into several new environments that will force companies to react. Firstly, we’ll see blockchain quietly being deployed into production at many banks – there will be less fanfare as we are no longer at the start of the ‘hype’ cycle. Secondly, there will be 

Continue Reading…

Blockchain Will Really Disrupt Silicon Valley Once Consumers Control Own Data

The mantra “If the service is free you are the product!” has become the common battle cry for Silicon Valley. Consumers on the lookout for freebies have flocked to these free services and signed away their data rights to access these cool and “indispensable” services.  However, with AI, microtargeting and next best action algorithms becoming ever more pervasive, things 

Continue Reading…

Blockchain May Play Crucial Role in Artificial Intelligence Development, Regulation

The biggest threat for our future, according to Elon Musk, is the development of artificial intelligence (AI). As Musk recently pointed out: “I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful. I’m 

Continue Reading…

How Blockchain Can Help Solve Global Regulatory Challenges

In today’s world, talk abounds about the ever-increasing regulatory hurdles every modern global industry now faces. The way to address any risk is to impose more and more regulations on an industry to ensure the sins of the past are not repeated, and politicians can best show the electorate concrete steps in legislation they have 

Continue Reading…

How blockchain-based apps and sites resist DDoS attacks

Sometimes, truth is stranger than fiction! The recent Distributed Denial-of-Service (DDoS) attacks on Final Fantasy XIV’s gaming platform are quite surreal, yet a timely signpost of where things are heading. Using traditional cyber security technology, we are playing “whack a mole” against the ever-changing DDoS attacks. We live in an age where DDoS attacks will 

Continue Reading…

The future of DDoS attacks looks scary. Blockchain will protect us

Distributed-denial-of-service attacks are not only becoming massive in scale, but more sophisticated in their makeup. This is in large part due to the expansion of the digital world in which we live. With an ever-increasing number of unsecured devices connected to one another, the potential for cyber-attackers to overwhelm any organization is a clear and 

Continue Reading…