Introducing The Open Group Open FAIR™ Risk Analysis Tool

Since late in 2016, The Open Group Security Forum have been collaborating with San Jose State University and Probability Management to develop a Risk Analysis tool that adheres to The Open Group Open FAIR™ Standard.

With a view to creating a tool that helps accelerate the adoption of the Open FAIR standard, the tool provides both experienced and novice risk practitioners with a practical and pragmatic tool to help analyse perceived risk in a consistent and simple to use way, whatever industry they work in. It is now ready and we are pleased to make it available to use and evaluate for free.

The Open Group Open Badges Update – More Than Just a Pretty Image

In September 2017, The Open Group began working with Acclaim, (a division of Pearson VUE, an exam delivery company), to introduce the concept of “Open Badges” to The Open Group IT4IT™ and Open Certified Architect certification programs. Since then, we have been busy – we have now rolled out this program across our entire certification portfolio and as a result have invited everyone with a current certification with The Open Group to participate. This has resulted in over 20,000 badges being issued, with no surprises that the TOGAF®, a standard of The Open Group, badges are the most popular.

Looking Ahead in 2018

Steve Nunn, President and CEO of The Open Group, reflects back on 2017 and looks forward to 2018. Topics include: The Open Group Open Process Automation Forum™, The Open Group SOSA™ Consortium, TOGAF® 9.1 certifications, The Open Group Open Badges program, Digital Practitioners Work Group, Enterprise Architecture for Governments, upcoming events, and much more!

The Open Trusted Technology Provider™ Standard (O-TTPS) – Approved as ISO/IEC 20243:2015 and the O-TTPS Certification Program

By The Open Group

The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business enterprises and our critical infrastructures.

1 2 3