Measuring the Immeasurable: You Have More Data Than You Think You Do

By Jim Hietala, Vice President, Security, The Open Group According to a recent study by the Ponemon Institute, the average U.S. company experiences more than 100 successful cyber-attacks each year at a cost of $11.6M. By enabling security technologies, those … Continue reading

Introducing Two New Security Standards for Risk Analysis—Part II – Risk Analysis Standard

By Jim Hietala, VP Security, The Open Group Last week we took a look at one of the new risk standards recently introduced by The Open Group® Security Forum at the The Open Group London Conference 2013, the Risk Taxonomy … Continue reading

Introducing Two New Security Standards for Risk Analysis—Part I – Risk Taxonomy Technical Standard 2.0

By Jim Hietala, VP Security, The Open Group At the The Open Group London 2013 Conference, The Open Group® announced three new initiatives related to the Security Forum’s work around Risk Management. The first of these was the establishment of … Continue reading

The Open Group London 2013 – Day One Highlights

By Loren K. Baynes, Director, Global Marketing Communications On Monday October 21st, The Open Group kicked off the first day of our Business Transformation conference in London!  Over 275 guests attended many engaging presentations by subject matter experts in finance, … Continue reading

The Open Group Philadelphia – Day Three Highlights

By Loren K. Baynes, Director, Global Marketing Communications at The Open Group. We are winding down Day 3 and gearing up for the next two days of training and workshops.  Today’s subject areas included TOGAF®, ArchiMate®, Risk Management, Innovation Management, … Continue reading

Take A Better Look At Cloud Risks

If you have ever had a debate about whether your organisation should use cloud computing  then a discussion of the risks of cloud computing will have been a significant part of it. In doing so, we often fall into a simple logical trap. Cloud computing is just one of the options that we have.  The […]

Cloud and Continuity of Supply Risk

This rather amusing article in Slate appeared in my LinkedIn feed – Google Reader Joins the Graveyard of Dead Google Products. The article invites you to leave a flower on the grave of your favourite dead Google product. The startling thing is how many there are: 39 by their count! The lesson that I draw […]

Take Every Opportunity to Document

I am always surprised (and I really shouldn’t be) that we do a great job of responding to critical incidents but almost always fail to document what we did so it can be referenced in the future. As IT leaders we need to proactively document the impacts of planned and unplanned changes.  Whethere it is […]

The post Take Every Opportunity to Document appeared first on Enterprise Architecture in Higher Education.

Open Group Panel Explores Changing Field of Risk Management and Analysis in the Era of Big Data

This is a transcript of a sponsored podcast discussion on the threats from and promise of Big Data in securing enterprise information assets. Continue reading