The Future of BYOD – Tweet Jam
On Tuesday, September 18, The Open Group will host a special tweet jam to examine the topic of Bring-Your-Own-Device (BYOD) and current approaches to managing it. Please join us! Continue reading →
Aggregated enterprise architecture wisdom
On Tuesday, September 18, The Open Group will host a special tweet jam to examine the topic of Bring-Your-Own-Device (BYOD) and current approaches to managing it. Please join us! Continue reading →
Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →
Early Bird registration for The Open Group Conference in Barcelona ends September 21. Register now and save! The conference runs October 22-24, 2012. On Monday, October 22, the plenary theme is “Big Data – The Next Frontier in the Enterprise,” an…
On Thursday, August 16 at 8:00 a.m. PT/ 4:00 p.m. BST/5:00 p.m. CET, identity management experts will host a webinar to discuss the key concepts in identity management today. Continue reading →
Migrating more data and applications to the cloud is top of CIO’s to-do list right now. 52% of the 489 business and technology executives who responded to our 2012 Digital IQ study plan to boost their spending in the private cloud this year. Those same firms are simultaneously setting their sights on the public cloud. 57% of the leadership surveyed claim they are ramping up their investments in public clouds. Understandably, security is weighing heavy […]
If you liked this, you might also like:
Joel Brenner, the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” discusses how corporate data and supply chains remain vulnerable to cyber crime attacks in a podcast with Dana Gardner. Mr. B…
What’s small, shiny and keeps CIOs up at night? The CEO’s personal devices. CEOs are like every other employee. They love tablets, smart phones and apps. The glaring difference is that the CEO’s personal devices put the company at much greater risk than the gadgets of virtually all other employees combined. CIOs must include chief executives in conversations as they grapple with putting BYOD security policies and procedures in place. Many CEOs criss-cross the globe […]
If you liked this, you might also like:
Who or what is ‘I’? How does our experience of ‘I’ change as we interact with our world? Yes, I do know that those questions might seem to fit more in philosophy or psychology. But as per the previous post, they also have huge ramifications in user-experience and user-interface design, in product-design, in sensemaking and […]
Who or what is ‘I’? How do others recognise that ‘I’? How does that ‘I’ express itself? – with what voice does that ‘I’ speak? And how do others recognise that voice? Yeah, I know, sounds like philosophy and stuff – woefully abstract, deep and pointless. Yawn. But those ‘pointless’ questions are the core – the […]
By Dana Gardner, Interarbor Solutions This special BriefingsDirect thought leadership interview comes in conjunction with The Open Group Conference this January in San Francisco. The conference will focus on how IT and enterprise architecture sup…
In my last post I wrote about the Open Group TOGAF and SABSA integration announcement. This shows both a real sense of partnership with leading industry bodies and it seems like a step in the right direction to advance the…
The Open Group announced last month the release of the TOGAF & SABSA Integration Whitepaper, a new guide developed in collaboration with The SABSA Institute to enable enterprise and security architects to integrate security and risk management approaches into enterprise-level…