O-ISM3 can be implemented as a top-down methodology to manage an entire information security program, or it can be deployed more tactically, starting with just a few information security processes. As such, it can deliver value to information security organizations of varying sizes, maturity levels, and in different industries.
Entitled “Just enough EA”, a set of case studies has been published by the Joint Information Systems Committee (JISC), made up of senior managers, academics and technology experts working in UK further and higher education.
In a previous article, “Cloud Computing requires Enterprise Architecture and TOGAF 9 can show the way,” I described the need to define a strategy as an additional step in the TOGAF 9 Preliminary Phase. This article describes in more detail what could be the content of such a document, specifically, what are the governance activities related to the Consumption and Management of Cloud Services.
Specific to IT security, the world is indeed flat, and the threats being faced as well as the security concerns and approaches in India and UAE mirror those in the US, Europe, and elsewhere.
The emergence of service platforms and services enabled by the Cloud and its pervasiveness into social media and social networks underpinned by Cloud infrastructure and data centers; platforms enabling or launching other platforms. What does the future hold?
Of late, the online media is flooded with plenty of articles/opinions on the future of Enterprise IT and CIO roles in next decades. Why do we see such futuristic, inspirational, transformational viewpoints doing the rounds these days? I strongly believe that Enterprise IT is at its inflection point due to two main mega trends happening in the industry.