Corporate Data, Supply Chains Remain Vulnerable to Cyber Crime Attacks, Says Open Group Conference Speaker

Joel Brenner, the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” discusses how corporate data and supply chains remain vulnerable to cyber crime attacks in a podcast with Dana Gardner. Mr. B…

BYOD and Your CEO

What’s small, shiny and keeps CIOs up at night? The CEO’s personal devices. CEOs are like every other employee. They love tablets, smart phones and apps. The glaring difference is that the CEO’s personal devices put the company at much greater risk than the gadgets of virtually all other employees combined. CIOs must  include chief executives in conversations as they grapple with putting BYOD security policies and procedures in place. Many CEOs criss-cross the globe […]

If you liked this, you might also like:

  1. How the CIO Can Establish a BYOD Usage Policy
  2. Building a BYOD Ready Infrastructure
  3. What’s the CIOs Role in Compliance?

More on identity and Mask

Who or what is ‘I’? How does our experience of ‘I’ change as we interact with our world? Yes, I do know that those questions might seem to fit more in philosophy or psychology. But as per the previous post, they also have huge ramifications in user-experience and user-interface design, in product-design, in sensemaking and […]

Identifier, identity, persona and Mask

Who or what is ‘I’? How do others recognise that ‘I’? How does that ‘I’ express itself? – with what voice does that ‘I’ speak? And how do others recognise that voice? Yeah, I know, sounds like philosophy and stuff – woefully abstract, deep and pointless. Yawn. But those ‘pointless’ questions are the core – the […]

Overlapping Criminal and State Threats Pose Growing Cyber Security Threat to Global Internet Commerce, Says Open Group Speaker

By Dana Gardner, Interarbor Solutions This special BriefingsDirect thought leadership interview comes in conjunction with The Open Group Conference this January in San Francisco. The conference will focus on how IT and enterprise architecture sup…

Open Group Complements TOGAF with SABSA Integration

The Open Group announced last month the release of the TOGAF & SABSA Integration Whitepaper, a new guide developed in collaboration with The SABSA Institute to enable enterprise and security architects to integrate security and risk management approaches into enterprise-level…

Save the Date—The Open Group Conference San Francisco!

By Patty Donovan, The Open Group It’s that time again to start thinking ahead to The Open Group’s first conference of 2012 to be held in San Francisco, January 30 – February 3, 2012. Not only do we have a … Continue reading →

2012 Open Group Predictions, Vol. 1

By The Open Group Foreword By Allen Brown, CEO 2011 was a big year for The Open Group, thanks to the efforts of our members and our staff – you all deserve a very big thank you. There have been … Continue reading →

How to manage requirements within the Enterprise Architecture using the TOGAF® and SABSA® frameworks

By Pascal de Koning, KPN  You want to put your company’s business strategy into action. What’s the best way to accomplish this?  This can be done in a structured manner by using an Enterprise Architecture Framework like TOGAF®. TOGAF® offers …

PODCAST: Standards effort points to automation via common markup language for improved IT compliance, security

Listen to our recorded podcast on the new Open Automated Compliance Expert Markup Language (O-ACEML) standard, or read the transcript. This podcast was recorded by Dana Gardner of Interarbor Solutions in conjunction with The Open Group Conference, Aust…