Last week, we announced our upcoming tweet jam on Tuesday, December 11 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the topic of IT security and what is in store for 2013. The discussion will be moderated by Elinor Mills, former CNET security reporter, and our panel of experts will include…
Tag: information security
The Open Group Newport Beach Conference – Early Bird Registration Ends January 4
The Open Group is busy gearing up for the Newport Beach Conference. Taking place January 28-31, 2013, the conference theme is “Big Data – The Transformation We Need to Embrace Today” and Early Bird registration is now open!
Data Protection Today and What’s Needed Tomorrow
Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs.
#ogChat Summary – The Future of BYOD
With over 400 tweets flying back and forth, last week’s BYOD Tweet Jam (#ogChat) saw a fast-paced, lively discussion on the future of the BYOD trend and its implications in the enterprise. In case you missed the conversation, here’s a recap of last week’s #ogChat!
Optimizing ISO/IEC 27001 Using O-ISM3
Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS).
Challenges to Building a Global Identity Ecosystem
In this fifth video – Building a Global Identity Ecosystem – we highlight what we need to change and develop to build a viable identity ecosystem. The Internet is global, so any identity ecosystem similarly must be capable of being adopted and implemented globally.
This means that establishing a trust ecosystem is essential to widespread adoption of an identity ecosystem. To achieve this, an identity ecosystem must demonstrate its architecture is sufficiently robust to scale to handle the many billions of entities that people all over the world will want, not only to be able to assert their identities and attributes, but also to handle the identities they will also want for all their other types of entities. It also means that we need to develop an open implementation reference model, so that anyone in the world can develop and implement interoperable identity ecosystem identifiers, personas, and supporting services.