Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”?
The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it.
Don’t try to change your business leaders. They have a job to do. Your job is to change the ways you communicate, react and respond to your business leaders.
What do you do when you are full of ideas, are privy to the collaboration initiatives between the top IT, security and EA professionals in