Summer in the Capitol – Looking Back at The Open Group Conference in Washington, D.C.
Jim Hietala, VP of security at The Open Group, provides a summary of The Open Group conference in Washington, D.C. (July 16-18). Continue reading →
Aggregated enterprise architecture wisdom
Jim Hietala, VP of security at The Open Group, provides a summary of The Open Group conference in Washington, D.C. (July 16-18). Continue reading →
VP of Security Jim Hietala previews the upcoming cybersecurity sessions at The Open Group Conference in Washington, D.C. Continue reading →
By Dana Gardner, Interarbor Solutions For some, any move to the Cloud — at least the public Cloud — means a higher risk for security. For others, relying more on a public Cloud provider means better security. There’s more of a concentrated a…
By The Open Group Conference Team Cybersecurity and Cloud Computing are two of the most pressing trends facing enterprises today. The Open Group Conference San Francisco will feature tracks on both trends where attendees can learn about the latest deve…
By Dana Gardner, Interarbor Solutions This special BriefingsDirect thought leadership interview comes in conjunction with The Open Group Conference this January in San Francisco. The conference will focus on how IT and enterprise architecture sup…
By Pascal de Koning, KPN You want to put your company’s business strategy into action. What’s the best way to accomplish this? This can be done in a structured manner by using an Enterprise Architecture Framework like TOGAF®. TOGAF® offers …
By Jim Hietala, Vice President, Security, The Open Group 2011 confirmed what many in the Enterprise Architecture industry have feared – data breaches are on the rise. It’s not just the number and cost of data breaches, but the sheer … Continu…
As the IT environment has changed significantly over the past several years, members of the Security Forum saw a need to revisit the document, Enterprise Security Architecture, and to update the guidance contained in it to address changes including mob…
Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”? Continue reading →![]()