Open Trusted Technology Provider™ Standard (O-TTPS) Version 2.0 Update Project

The Open Group Open Trusted Technology Forum (OTTF) is pleased to announce that it is initiating a project to update the Open Trusted Technology Provider™ Standard (O-TTPS), a standard of The Open Group, Parts 1 and 2 to Version 2.0.  The O-TTPS V2.0 Update Project will seek to update Parts 1 and 2 of the O-TTPS to reflect learnings from organizations that have successfully certified products against the standards as well as the work done by government organizations in the area of supply chain security.

The Open Group ‘Digital-First’ Virtual July Event – Highlights Blog

As an organization that is known for its world-class events and prides itself on bringing people together globally, this week The Open Group hosted its second virtual event following the success of the first ever #ogVIRTUAL in April.

It was fantastic to have over 2,100 attendees from 107 countries come together virtually to explore the topic of ‘Digital First’. Sessions and workshops were hosted by a plethora of industry experts and centered on the security, trust, and architectural issues which need to be considered when becoming a “Digital-First” organization.

The Open Group San Antonio 2020 – Event Highlights

The Open Group hosted its latest event at the Marriott Riverwalk in the lively city of San Antonio, Texas. On January 27 – 30, we welcomed attendees from across the globe – including decision-makers, Enterprise Architects, Data Scientists, engineers, technologists, and end-users representing many businesses and governments – to explore how organizations can utilize their growing volume of data effectively and securely as part of a digital transformation program.

The Open Trusted Technology Provider™ Standard (O-TTPS) – Approved as ISO/IEC 20243:2015 and the O-TTPS Certification Program

By The Open Group

The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business enterprises and our critical infrastructures.

1 2 3 4