Improving Signal-to-Noise in Risk Management

One of the most important responsibilities of the information security professional (or any IT professional, for that matter) is to help management make well-informed decisions. Unfortunately, this has been an illusive objective when it comes to risk. Continue reading

Operational Resilience through Managing External Dependencies

These days, organizations are rarely self-contained. The challenge here is how to manage the dependencies your operations have on factors that are outside your control. The Open Group’s Dependency Modeling (O-DM) standard specifies how to construct a dependency model to manage risk and build trust over organizational dependencies between enterprises – and between operational divisions within a large organization. Continue reading

An Approach To Project Assessments

Every IT leader at one point or another will be asked to conduct project assessments.  Sometimes it is a project that was initiated by your department and others it is a project that was started in a different part of your organization.  Rarely are successful projects reviewed (even though we should, as we are missing […]

The post An Approach To Project Assessments appeared first on Enterprise Architecture in Higher Education.

The Enterprise Architecture Definition Collection – Part III

This is Part III of my collection of enterprise architecture definitions. Parts I and II can be viewed here and here. It’s interesting, at least to me, to get a sense for all the different definitions of enterprise architecture out…

What’s the CIOs Role in Compliance?

How often do the Chief Compliance Officer (CCO) and Chief Information Officer (CIO) have common cause to work together? More often than you might think. The IT department and the technology resources and skills they contain are among those most in demand by corporate compliance officers when taking on the often enterprise-wide projects that help keep their organization’s out of legal or regulatory hot water, so says a recent survey on corporate compliance practices co-sponsored […]

If you liked this, you might also like:

  1. 3 CTO Role Models
  2. Why Aren’t CIOs Using Cloud Storage?
  3. Will the CIO Lose the C?

Creation of a strategy for the consumption and management of Cloud Services in the TOGAF® Preliminary Phase

In a previous article, “Cloud Computing requires Enterprise Architecture and TOGAF 9 can show the way,” I described the need to define a strategy as an additional step in the TOGAF 9 Preliminary Phase. This article describes in more detail what could b…

Security Forum Completes Third & Final Phase of Risk Management Project: Cookbook for ISO/IEC 27005:2005

We created the Cookbook for ISO/IEC 27005:2005 for anyone tasked with selecting, performing, evaluating, or developing a risk assessment methodology. I can say with confidence that we have met our goals in creating comprehensive and needed guidance an…

PODCAST: Impact of Security Issues on Doing Business in 2011 And Beyond

Listen to our recorded podcast on how enterprises need to change their thinking to face cyber threats, or read the transcript. The podcast was recorded by Dana Gardner of Interarbor Solutions at The Open Group Conference, San Diego 2011. Continue readi…

Open Group conference next week focuses on role and impact of enterprise architecture amid shifting sands for IT and business

The Open Group Conference, San Diego: I’ve found these conferences over the past five years an invaluable venue for meeting and collaborating with CIOs, enterprise architects, standards stewards and thought leaders on enterprise issues. It’s one of the few times when the mix of technology, governance and business interests mingle well for mutual benefit. Continue reading

What’s the future of information security?

Today, Jan. 28, is Data Privacy Day around the world, and a time to think about organizational and global challenges relating to data security. What is your organization’s primary cybersecurity challenge? Take our poll and read on to learn about some of The Open Group’s resources for security professionals. Continue reading