O-ISM3 can be implemented as a top-down methodology to manage an entire information security program, or it can be deployed more tactically, starting with just a few information security processes. As such, it can deliver value to information security organizations of varying sizes, maturity levels, and in different industries.
I have been enriched by this experience on two counts: By sharing my thoughts with the distinguished audience I have gained deeper appreciation of my topic; and by listening to the great presentations I’ve heard at The Open Group India Conference.
Listen to our recorded podcast on how enterprises need to change their thinking to face cyber threats, or read the transcript. The podcast was recorded by Dana Gardner of Interarbor Solutions at The Open Group Conference, San Diego 2011.
Today, Jan. 28, is Data Privacy Day around the world, and a time to think about organizational and global challenges relating to data security. What is your organization’s primary cybersecurity challenge? Take our poll and read on to learn about some of The Open Group’s resources for security professionals.
Security professionals rarely say that things are getting better on the threat side of information security. Underfunding IT security programs is a recipe for disaster.
Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”?