I am a huge fan of Zero Trust—the simplicity of the concept resonates with clients that read the research authored previously by John Kindervag and more recently myself. The framework’s intrinsic value to security and business processes is readily evid…
What An Interesting Start To The Year I didn’t expect the year to kick off the year with it raining iguanas in Florida, a gas pumping crisis in Oregon, or the discovery and release of two massive CPU flaws that affected many of the computers we live an…
Organization leaders know they need cybersecurity, but 2017 has driven that point home with special force. Intelligence Agencies have shown that even the most secure targets are vulnerable, and the rapid proliferation of ransomware has demonstrated that damage can be crippling and come without warning.
The Security Architecture Practitioner’s Initiative is a joint effort of The Open Group Security Forum (a global thought leader in Enterprise Architecture) and The SABSA Institute (a global thought leader in Security Architecture) to articulate in a clear, approachable way the characteristics of a highly-qualified Security Architect.
A common feature in the threat intelligence platform (TIP) space is aggregation of data and providing an interface for managing threat intelligence — this seems to be where the product visions diverge. While many of these platforms have been arou…
September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]
After reading through some other blogs and strategy papers over the weekend, (Don’t judge me. To some of us, this activity constitutes a good time…Yes, lame…I know.) I saw what appeared to be an underlying theme across the narratives I’d read: Security tolerates failure. It’s understandable that it happens, but I think, if we are […]
In the digital age, whether an organization will experience a cyber disruption is not a question of “if” but “when?” Although disruptive events may be inevitable, they can be prepared for with some strategizing and planning.
I summarized RSA 2017 in the following way: It’s a bit like the supermarket, you’ll make far healthier choices if you stick to the outer aisles. Well, Las Vegas B-Sides, Black Hat, and DefCon are taking place this week and since these events differ in tone, audience, and participants, I’ve updated my advice: We’ve gone […]
By The Open Group The Open Group, the vendor-neutral IT consortium, is hosting an event in London, April 25-28. Following on from the San Francisco event earlier this year, The Open Group London 2016 will focus on how Enterprise Architecture … Continue reading →
By Loren K. Baynes, Director, Global Marketing Communications, The Open Group The Open Group Baltimore 2015, Enabling Boundaryless Information Flow™, July 20-23, was held at the beautiful Hyatt Regency Inner Harbor. Over 300 attendees from 16 countries, including China, Japan, … Continue reading →
By The Open Group IT Risk Management is currently in a state of flux with many organizations today unsure not only how to best assess risk but also how to place it within the context of their business. Ben Tomhave, … Continue reading →
By Jim Hietala, VP, Business Development & Security, The Open Group Last fall, The Open Group Security Forum fielded its first IT Risk Management Survey in conjunction with the Society of Information Risk Analysts (SIRA) and CXOWARE The purpose of … Continue reading →