VP of Security Jim Hietala previews the upcoming cybersecurity sessions at The Open Group Conference in Washington, D.C.
Tag: Security Forum
How to manage requirements within the Enterprise Architecture using the TOGAF® and SABSA® frameworks
By Pascal de Koning, KPN You want to put your company’s business strategy into action. What’s the best way to accomplish this? This can be done in
The Open Group and SABSA Institute Publish TOGAF® Integration Whitepaper
By Jim Hietala, Vice President, Security, The Open Group 2011 confirmed what many in the Enterprise Architecture industry have feared – data breaches are on
The Open Group updates Enterprise Security Architecture, guidance and reference architecture for information security
As the IT environment has changed significantly over the past several years, members of the Security Forum saw a need to revisit the document, Enterprise Security Architecture, and to update the guidance contained in it to address changes including mobile device security, and new categories of security controls such as data loss prevention. Learn about the new download here.
The Open Group Announces New Information Security Management Standard: O-ISM3
O-ISM3 can be implemented as a top-down methodology to manage an entire information security program, or it can be deployed more tactically, starting with just a few information security processes. As such, it can deliver value to information security organizations of varying sizes, maturity levels, and in different industries.
PODCAST: Examining the current state of Enterprise Architecture with The Open Group’s Steve Nunn
Listen to our recorded podcast on the current state of EA, or read the transcript. The podcast was recorded by Dana Gardner of Interarbor Solutions at The Open Group Conference, San Diego 2011.