Information Security: What really works to build awareness

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem”, and the often lacking connection between policies and measures in many organizations, we had a World Café on various topics. The blog covers the findings around the topic ‘How to create and sustain security awareness’ Please share your good and worst practices by reacting to this blog.

The biggest problem with “going to the cloud” and how to solve it.

‘Going to the cloud’ seems to be a hype amongst CxO’s. Since its potential is so widely acknowledged and advertised and its opportunities seem endless, digitization of the organization is the New Normal. But what exactly does this digitization comprise? And, more importantly, can we exploit all this potential? Answering those questions seems far more difficult than following the hype and ‘just doing it because everybody else is’.

Enterprise Architecture und Agile Development: Gegensätze ziehen sich an?

Agilität ist zu einer wichtigen Fähigkeit der Unternehmen geworden. Das Tempo, bei dem die Kunden sich verändern, bei dem neue Gesetze und Verordnungen ihre Dienstleistungen und Prozesse beeinflussen und die Schnelligkeit, mit der Wettbewerber, wie Google und Apple, sie herausfordern, führt allzu oft zu einem enormen Druck auf das Unternehmen. Dabei kann sich der Druck in unterschiedlicher Art und Weise bemerkbar machen, wie zum Beispiel Druck sich schnell zu verändert, oder neue Technologien einzuführen, Wachstum zu generieren oder Kosten zu reduzieren. In Folge dessen ist die Agilität schlichtweg notwendig, um überhaupt mit ständigen Innovationen schnell auf dem Markt agieren zu können. Beides, Innovation und Flexibilität, sind für eine nachhaltige Positionierung am Markt notwendig.

BYOD – The Good, The Bad & The Ugly

Bring your own device, bring your own technology, bring your own phone or IT consumerisation (respectively BYOD, BYOT, BYOP). Whatever you want to call it, anno 2015 everybody knows the concept of bringing your privately owned device to access company information and applications. This was thrown in high gear with the proliferation of smartphones and tablets, making it impossible to imagine a working world without the concept. However people stand divided regarding the effects of BYOD. In this blog we discuss the good, the bad & the ugly regarding BYOD – leading to the conclusion that it is all about a good BYOD strategy, policy and plan how things work out for your organization.  As we always like to finish on a positive note we’ll start with the bad and the ugly and finish with the good.

Information Security: 7 communication tips to involve your business

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem” and the lacking relations between policies and measures in many organizations, we had a World Café on various topics. After reading this blog we would like you to your best and worst practices by reacting to this blog.  

Information Security: a necessity of life

Sharing knowledge an good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem”, the lacking relations between policies and measures in many organizations, we had a World Café on various topics. Please share your good and worst practices by reacting to this blog. 

“Force Generation” Architecture: Warm phase

In this fifth posting we will address the warm phase of ‘Force Generation’ Architecture: deployment and sustainment of the deployment. As in previous articles we will walk the military path first, next we will share the developments in the architecture case. Let us first address one of many questions regarding this series about Force Generation Architecture (the military way).

From Security Architecture to a Secure Architecture

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round table sessions. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions. After presentations on “Security is not an IT problem”, the lacking relations between policies and measures in many organizations, we organized a World Café on various topics. Please share your good and worst practices by reacting to this blog.