The Open Group ‘Open Digital Standards’ Virtual Event April 26 – 28, 2021 – Highlights Blog

As organizations across all industries strive to become Digital First, open standards are more important than ever for providing the necessary frameworks and career development tools to drive transformation progress.

This week, our ‘Open Digital Standards’ Virtual Event April 26-28 brought together experts from across the globe to provide guidance for the creation and implementation of open digital standards. It was fantastic to see 1,300 attendees from more than 85 countries gather virtually to discuss various approaches and best practices for making sense of the evolving business landscape and delivering digital products and services.

The Open Group OSDU™ Mercury Launch Event: A Key Milestone for the Energy Industry

This week, The Open Group OSDU™ Forum celebrated a milestone for the energy industry: the launch of the OSDU™ Data Platform Mercury Release. The new Open Source, standards-based data platform represents a key achievement of the OSDU Forum in a very short space of time – illustrating the importance of cross-industry collaboration for supporting the world’s changing energy needs. 

A Shared Language for Supply Chain Security

In the world of technology, there are paradigms of language that arise organically and artificially over time. Necessity requires a shared mode of communication for ideas and as a result, descriptors, nouns, and technical designators are created and shared. The problem arises when certain words acquire a surfeit of meaning, so much so that they paradoxically become less meaningful. There are many examples of this but for our purposes, we’re going to look at “Supply Chain Security”.

The Open Group ‘Open Digital Standards’ Virtual Event January 25-27, 2021 – Highlights

The transition to Digital First has become a necessity for the survival of private and public sector organizations in a post-pandemic world. It was therefore fantastic to see attendees gather virtually over the course of three days to discuss tangible solutions for navigating the challenges we face today. Sessions and workshops were hosted by a plethora of leading industry experts and centered on the development and implementation of open digital standards to address issues critical to the success of a Digital First enterprise.

Providing Customer-Driven Value With a TOGAF® based Enterprise Architecture

Traditionally, business processes have been the principal mean of interaction with business stakeholders for Enterprise Architects. As for the notion of business capability, it is a more recent concept also often used in enterprise architecture. Business capabilities allow a better understanding of how software applications are supporting the business, as very well explained in this video entitled “TOGAF® Business Architecture: Business Capability Guide”. Often, some new business capabilities have no supporting applications, while other older capabilities have too many. Both concepts alone fail to capture the value that an agile customer-driven organization must undertake to keep and grow its market share with more and more rapid and continuous innovative changes and more informed customers that are forcing them to have more fluid business strategies.

Solorigate: A case study for why supply chain security is critical for governments and businesses

By Jim Hietala (VP, BD and Security), Andras Szakal (VP and CTO), John Linford Security and OTTF Forum Director) – The Open Group

In potentially the most damaging cyber-supply chain attack ever, a leading IT systems management vendor became the latest hi-tech company to suffer a major cybersecurity breach with wide-reaching consequences. The malware that caused the attack has been dubbed SUNBURST by Microsoft and code-named Solorigate by FireEye, the security consulting firm that uncovered the breach after falling victim to it late last year.

After successfully infiltrating the development environment, attackers were able to observe and learn how to subvert the vendor’s development and operations pipeline. Hackers were then able to maliciously taint the vendor’s product by planting a sophisticated trojan. Once the software, which required broad systems access, was installed in customers’ environments, the attackers were able to leverage the tainted software to exfiltrate sensitive information from within an organization’s network.

1 2 3 4 30