Optimizing ISO/IEC 27001 Using O-ISM3

Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →

The Open Group Barcelona Conference – Early Bird Registration ends September 21

Early Bird registration for The Open Group Conference in Barcelona ends September 21. Register now and save! The conference runs October 22-24, 2012. On Monday, October 22, the plenary theme is “Big Data – The Next Frontier in the Enterprise,” an…

Cloud Computing and Security: Do You Know Where Your Data Is?

Migrating more data and applications to the cloud is top of CIO’s to-do list right now. 52% of the 489 business and technology executives who responded to our 2012 Digital IQ study plan to boost their spending in the private cloud this year. Those same firms are simultaneously setting their sights on the public cloud. 57% of the leadership surveyed claim they are ramping up their investments in public clouds. Understandably, security is weighing heavy […]

If you liked this, you might also like:

  1. The Era of Security Breaches
  2. Why Cloud Computing Has Legs
  3. CIO Guide to Cloud Computing

Corporate Data, Supply Chains Remain Vulnerable to Cyber Crime Attacks, Says Open Group Conference Speaker

Joel Brenner, the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” discusses how corporate data and supply chains remain vulnerable to cyber crime attacks in a podcast with Dana Gardner. Mr. B…

BYOD and Your CEO

What’s small, shiny and keeps CIOs up at night? The CEO’s personal devices. CEOs are like every other employee. They love tablets, smart phones and apps. The glaring difference is that the CEO’s personal devices put the company at much greater risk than the gadgets of virtually all other employees combined. CIOs must  include chief executives in conversations as they grapple with putting BYOD security policies and procedures in place. Many CEOs criss-cross the globe […]

If you liked this, you might also like:

  1. How the CIO Can Establish a BYOD Usage Policy
  2. Building a BYOD Ready Infrastructure
  3. What’s the CIOs Role in Compliance?

More on identity and Mask

Who or what is ‘I’? How does our experience of ‘I’ change as we interact with our world? Yes, I do know that those questions might seem to fit more in philosophy or psychology. But as per the previous post, they also have huge ramifications in user-experience and user-interface design, in product-design, in sensemaking and […]

Identifier, identity, persona and Mask

Who or what is ‘I’? How do others recognise that ‘I’? How does that ‘I’ express itself? – with what voice does that ‘I’ speak? And how do others recognise that voice? Yeah, I know, sounds like philosophy and stuff – woefully abstract, deep and pointless. Yawn. But those ‘pointless’ questions are the core – the […]

Overlapping Criminal and State Threats Pose Growing Cyber Security Threat to Global Internet Commerce, Says Open Group Speaker

By Dana Gardner, Interarbor Solutions This special BriefingsDirect thought leadership interview comes in conjunction with The Open Group Conference this January in San Francisco. The conference will focus on how IT and enterprise architecture sup…

Open Group Complements TOGAF with SABSA Integration

The Open Group announced last month the release of the TOGAF & SABSA Integration Whitepaper, a new guide developed in collaboration with The SABSA Institute to enable enterprise and security architects to integrate security and risk management approaches into enterprise-level…