VP of Security Jim Hietala previews the upcoming cybersecurity sessions at The Open Group Conference in Washington, D.C.
By Pascal de Koning, KPN You want to put your company’s business strategy into action. What’s the best way to accomplish this? This can be done in
By Jim Hietala, Vice President, Security, The Open Group 2011 confirmed what many in the Enterprise Architecture industry have feared – data breaches are on
As the IT environment has changed significantly over the past several years, members of the Security Forum saw a need to revisit the document, Enterprise Security Architecture, and to update the guidance contained in it to address changes including mobile device security, and new categories of security controls such as data loss prevention. Learn about the new download here.
O-ISM3 can be implemented as a top-down methodology to manage an entire information security program, or it can be deployed more tactically, starting with just a few information security processes. As such, it can deliver value to information security organizations of varying sizes, maturity levels, and in different industries.
Listen to our recorded podcast on the current state of EA, or read the transcript. The podcast was recorded by Dana Gardner of Interarbor Solutions at The Open Group Conference, San Diego 2011.