SwA Forum March 12, 2010
|
|
|
- Ella Heath
- 10 years ago
- Views:
Transcription
1 SwA Forum March 12, 2010 Open Group and OMG Update & Discussion on Standards Harmonization Andras Szakal IBM Distinguished Engineer Director Software Architecture IBM Federal Software Group 2009 IBM Corporation
2 Agenda Update on Software Assurance Activities The Open Group Object Management Group Harmonization IBM Corporation
3 Standards Success Requires Broad Vision The industry invests widely to develop and influence standards, enhance consumablity and drive standards-based business strategies. Early Customer Engagements Competitive Initiatives Products Early Code (POC) Partners Competitors Complementary Intellectual Property Public Relations Standards Bodies Industry Groups ISVs, Adjacent Standards The value back to the end user and the industry is realized in Choice, Flexibility, Speed, Agility, Skills IBM Corporation
4 Open Group SwA Activities Overview Compliance Automated Security Compliance Expert (ACE) XDAS Update of the Distributed Audit Service ISM3 - Information Security Metrics/Maturity Model (ISM3) Method TOGAF Security Guidance SOA Reference Architecture SOA Security Guide Cloud Security Cloud security standards / best practices Cybersecurity Trustworthy Vendor Framework Profession Certification IT Architect Profession Certification (ITAC) IT Specialist Certification (ITSC) ITSC Security Stream IBM Corporation
5 Automated Compliance Expert Requirements Customer Collaboration and Requirement Gathering Industry Financial Medical Entertainment Consultants Auditors Research Governance Customer Pain Points Cost of Compliance Manual configuration home-grown configuration scripts difficult to maintain and audit Companies and systems must meet multiple compliance regulations PCI, SOX/COBIT, Internal Security Policies, US Gov. Compliance Audits: Time consuming Expensive Auditors/Audits are not consistent Desired Features Automated Security and Compliance Configuration Automated Monitoring Standardized Compliance Combines Multiple Compliance Requirements Platform Independent Complete Audit Reporting Compliance Over Ride and Policy Authoring IBM Corporation
6 ACEML and SCAP Integration Point Rule to Command Mapping Reconciliation of Policy Standards Blending Compliance Policy Authoring Tools NIST Specific Rule to command Mapping File ACEML The System s Rule to command Mapping File Computer System ACEML Actionable command Actual System Configuration Results recorded back into the ACEML file ACEML IBM Corporation
7 XDAS Distributed Audit Service XDAS Data Model XDAS Positioning Effort to update the XDAS specification to be broadly applicable to today's cross platform architecture Focused on integration with SIEM tools IBM Corporation
8 ISM3 Information Security Maturity Management Maturity Model Information Security Metrics/Maturity Model (ISM3) Standard: Incorporating best practices for linking security to business needs, using a process-based approach, providing implementation guidance, and using specific metrics, while preserving compatibility with current IT and security management standards. EU / Span based Security Operations Maturity Model Rationalize with other security maturity models IBM Corporation
9 Open Group Security and Assurance Method Standards Activities Integration of Security into TOGAF: Joint activity with the RT&ES Forum and SOA Working Group. Enterprise Security Architecture (ESA) Guide: Updating our 2004 ESA Guide. COA Framework Standard: Developing a standard for a Framework for Collaboration-Oriented Architectures. Security Reference Architecture: Developing a reference architecture,to demonstrate how to build secure EAs. Cloud Security Reference Architecture Guide: Joint activity with the Cloud Computing Working Group. SOA-Security Guide: In collaboration with the SOA Working Group, developing a best practice guide to explain what additional security considerations SOA environments demand. Secure Mobile Architectures (SMA) Standard: Specifying the common technologies for a standards-based SMA solution.other industry groups involved include the PCI Forum, ARC, SANS Institute, ISA, and TCG-TNC. Application areas include large manufacturing flow lines and safety-critical SCADA environments. Trust Management/Classification Model Guide: A practical approach describing the essential common levels of sensitivity and classification for the value of data, and effective protection mechanisms to assure secure operation IBM Corporation
10 Cloud Security Define the appropriate building blocks, roles and use cases that address the appropriate confidentially, integrity and availability requirements of cloud computing Develop a Cloud security reference architecture IBM Corporation
11 Cybersecurity Trustworthy Technology Supplier Framework Effort to identify industry best practices for Building trustworthy products Managing trustworthy suppliers IBM Corporation
12 IT Profession Certification Premier IT Architect & IT Specialist Profession Certification Accredited companies: EDS, HP, CapGemini, IBM, Rayteon, more More than 2.5K certified architects IT Specialist Stream includes Security Architect IBM Corporation
13 Software Assurance (SwA) Ecosystem Standard-based Solution OMG focused on core technology standards Tooling interoperability standards Goal: Standard-based integrated tooling environment that dramatically reduces the cost of multi-disciplinary software assurance activities Based on integrated ISO/OMG Open Standards Semantics of Business Vocabulary and Rules (SBVR) For formally capturing knowledge about vulnerabilities Knowledge Discovery Metamodel (KDM) Achieving system transparency in unified way Software Assurance Metamodel: Argumentation Metamodel (ARM) and Software Assurance Evidence Metamodel (SAEM) Intended for presenting Assurance Case and providing end-to-end traceability: requirementto-artifact Software Metrics Metamodel Representing libraries of system and assurance metrics SwA Ecosystem is expending: OMG SysA TF developing and integrating standards in area of Threat Risk Assessments and defining Security Vocabulary IBM Corporation
14 Harmonizing Gov & Industry Standards Activities What needs to happen? Community-to-Industry Outreach Standardization principles Why do we standardize as an industry Where do we standardize not all standards bodies are equal Reduce the me-too standards efforts Establish an industry outreach system like FedBizOps Announce interest in industry participation in work groups How to Contribute Contribute to the right open standards body Find the authoritative source Example DMTS for systems management Contribute directly to industry Standards Continuity & Integrity Technology Standards should be apolitical (should not be sited in legislature) IBM Corporation
The Open Group Perspective on Public Sector Cloud
The Open Group Perspective on Public Sector Cloud Public Sector Cloud Conference Reston VA, March 19-20 2012 Andras Szakal Chief Architect, IBM Federal Software Group, Distinguished Engineer and Senior
Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
Automating the IT Operations to Business Connection
Automating the IT Operations to Business Connection Mark Bodman, Practice Director, Troux HP UCMDB Partner Ecosystem Integrate and federate to leading third party ISVs to extend customer value UCMDB HP
Software Sustainability Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat
2012 Systems and Software Technology Conference Software Sustainability Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat Paul R. Croll Fellow CSC
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
VCE BUSINESS UPDATE AND OVERVIEW
VCE BUSINESS UPDATE AND OVERVIEW October, 2014 BUSINESS UPDATE VCE is a privately held company funded by Cisco, EMC, VMware, and Intel 2000+ employees globally, with manufacturing operations in the US
Requirement Management with the Rational Unified Process RUP practices to support Business Analyst s activities and links with BABoK
IBM Software Group Requirement Management with the Rational Unified Process RUP practices to support Business Analyst s activities and links with BABoK Jean-Louis Maréchaux Software IT Specialist IBM Rational
Mapping Service-Orientation to TOGAF 9 - Part II: Architecture Adoption, Service Inventories and Hierarchies
by Filippos Santas, IT Architect for Credit Suisse Private Banking in Switzerland and Certified SOA Trainer SERVICE TECHNOLOGY MAGAZINE Issue LI June 2011 This is second part in a multi-part article series.
Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
PUB (MPI) 1-62 Reference: Gartner Scorecard
Information Requests Round 1 PUB (MPI) 1-62 Reference: Gartner Scorecard PUB/MPI 2-23 2013 GRA a) Please file an update to the response to Gartner s recommendations provided at PUB/MPI 2-23 from last year
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
Business Partner Program Guide
Business Partner Program Guide Business Challenges Require New Solutions A Comprehensive Approach to Partnering for Success. Panduit introduces an exciting program designed to help you become a better
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
STATEMENT of. Open Group and The Open Group Trusted Technology Forum. Submitted for the record. Hearing on. March 27, 2012
Executive Summary of The Open Group s testimony to the House Energy and Commerce Oversight and Investigations Subcommittee Hearing on IT Supply Chain Security: Review of Government and Industry Efforts
Enterprise IT Architectures BPM (Business Process Management)
Dr. Hans-Peter Hoidn Executive Architect, IBM Distinguished IT Architect (Opengroup) Enterprise IT Architectures BPM (Business Process Management) Introduction 2 Agenda of this Part Business Process Management
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Public Cloud Workshop Offerings
Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those
Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority
Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority
How to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
Improved SOA Portfolio Management with Enterprise Architecture and webmethods
Improved SOA Portfolio Management with Enterprise Architecture and webmethods Patrick Buech Product Management, Enterprise Architecture Management Sumeet Bhatia Senior Director, Enterprise Architecture
SOA Enabled Workflow Modernization
Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Q3 IIBA Corporate Member Forum. Will start promptly on the hour
Q3 IIBA Corporate Member Forum Will start promptly on the hour AGENDA 7:00 Welcome and Introduction 7:05 The Business Analyst Guide to Business Architecture, Damian Wilson; Business Analysis Practice Leader,
Trust and Dependability in Cloud Computing
Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance
Data Center Solutions
Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
A Standards-Based Approach to Extracting Business Rules
A Standards-Based Approach to Extracting Business Rules Ira Baxter Semantic Designs, Inc. Stan Hendryx Hendryx & Associates 1 Who are the presenters? Semantic Designs Automated Analysis and Enhancement
A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
Redefining Static Analysis A Standards Approach. Mike Oara CTO, Hatha Systems
Redefining Static Analysis A Standards Approach Mike Oara CTO, Hatha Systems Software Analysis for Compliance Compliance Assessment Requires Software Analysis Dynamic Analysis Option Static Analysis Performed
SOA, Cloud Computing & Semantic Web Technology: Understanding How They Can Work Together. Thomas Erl, Arcitura Education Inc. & SOA Systems Inc.
SOA, Cloud Computing & Semantic Web Technology: Understanding How They Can Work Together Thomas Erl, Arcitura Education Inc. & SOA Systems Inc. Overview SOA + Cloud Computing SOA + Semantic Web Technology
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Information Technology Architect Certification Program: Frequently Asked Questions June 2009 Version 2.1
Positioning...1 Certification Process...5 Certification Criteria...9 Positioning What is the Open Group IT Architect Certification Program? The Open Group IT Architect Certification program certifies Enterprise
Topology and Orchestration Specification for Cloud Applications. An Open Standard for Cloud Application Portability
TOSCA Topology and Orchestration Specification for Applications An Open Standard for Application Portability Matt Rutkowski Senior Engineer, Master Inventor IBM Open Technologies AGENDA What is TOSCA?
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
Building a better more secure Cloud RICHARD MORRELL
Building a better more secure Cloud RICHARD MORRELL Evangelist EMEA Region Cloud Business Unit Red Hat Who am I? 16 year Open Source Veteran working with Red Hat since 1997 Co-Founder Linuxcare 1997 in
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Requirements Management Practice Description
Requirements Management Practice Description 1. REQUIREMENTS MANAGEMENT (RM) 1.1 Description of the practice TRASYS provide solutions to effectively manage critical issues and reduce risks in project related
Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Professional Cloud Solutions and Service Practices
Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION Service-oriented architecture (SOA) gives enterprises the ability to identify and respond
Role of Enterprise Architecture in Mergers & Acquisitions. Satish Chandra, Mahindra Satyam
Role of Enterprise Architecture in Mergers & Acquisitions Satish Chandra, Mahindra Satyam Agenda Definitions EA and M&A related experiences Need for EA Intervention in M&A Using EA in M & A Scenarios Discussion
The OMG BPM Standards
The OMG BPM Standards Derek Miers CEO, BPM Focus +44 (20) 8742 8500 UK Office +44 (7703) 178 500 UK Cell +1 (714) 600 9010 US Cell [email protected] A BPM Definition Business Process Management is primarily
INDEPENDENT TESTING & QA SERVICES
INDEPENDENT TESTING & QA SERVICES USA Australia UAE Pakistan www.kualitatem.com 01 ABOUT US Kualitatem is an independent software testing and quality assurance company specializing in application testing
The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies
The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies A White Paper by: Ian Foo Technical Lead, Cisco Systems, Inc. April 2008 Copyright 2008 The Open Group All rights reserved. No
Project Management and ITIL Transitions
Project Management and ITIL Transitions April 30 th 2012 Linda Budiman Director CSC 1 Agenda Thought Leadership: Linda Budiman What is ITIL & Project Management: Applied to Transitions Challenges & Successes:
Proven approaches for Legacy Systems Modernization
Proven approaches for Legacy Systems Modernization Dr. Setrag Khoshafian, Chief Evangelist Agenda: Legacy Modernization Through BPM The Pain Points for Legacy Modernization BPM Suites For Modernizing The
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem Cloud computing offers massive scalability - in virtual computing power, storage, and applications resources - all at almost
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Introduction to etom. White Paper. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
. Introduction to etom White Paper 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 13 Contents Introduction... 3 What Is NGOSS?... 3 History and Context
Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003
Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003 Purpose and audience of this paper This proposal is a starting point put forward to the Open Group Security Forum s membership
Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services
: A Tool for Managing Compliance and Risk in Government Services November 19, 2008 Slide 1 Agenda Problem Space Solution Space Describe the compliance and risk management problem Why is this relevant for
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.
ARC VIEW OCTOBER 17, 2013 Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence By Craig Resnick Keywords Information Technology, Services,
A Software Development Platform for SOA
A Software Development Platform for SOA Peter Eeles Executive IT Architect Rational Brand Architect for UK, Ireland and South Africa [email protected] 2004 IBM Corporation Agenda IBM Software Group
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing
Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
Modernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
Introduction to SOA governance and service lifecycle management.
-oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA
Scanning Open Source Software and Managing License Obligations on IBM SmartCloud. Because code travels
Scanning Open Source Software and Managing License Obligations on IBM SmartCloud Because code travels 1 Webinar Agenda Protecode & IBM SmartCloud Company IBM Partnership Solutions Managing Code Obligations
Security as Architecture A fine grained multi-tiered containment strategy
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG [email protected] 2 Objectives Cybersecurity
What Business and Process Analysts Need to Know About BPM Suites
What Business and Process Analysts Need to Know About BPM Suites Bruce Silver Principal, Bruce Silver Associates and BPMS Watch 1 Agenda What is a BPMS? Specifying BPM requirements What BA s need to understand
Capgemini and Pegasystems: Delivering Business Value through Partnership
Capgemini and Pegasystems: Delivering Business Value through Partnership Continuous process improvement to drive sustainable results Our partnership combines Capgemini s consulting and industry strengths
Best Practices for Building Mobile Web
Best Practices for Building Mobile Web and Hybrid Applications Mobile is the NEXT dominant phase of computing Mobile is different: Transformational business models Faster lifecycles More iterative Mobile/Wireless/Cloud
Open Group SOA Governance. San Diego 2009
Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes
Cloud Security Certification
Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible
Collaborating for Quality in Agile Application Development From Beginning to End
Collaborating for Quality in Agile Application Development From Beginning to End + 1 Agenda Application Development Challenges Meeting the Challenge in the Enterprise End-to-End HP/CollabNet Solution Agile
Integrated Solution Offerings for Insurance IBM Insurance Framework
Detailed Overview April 2010 Integrated Solution Offerings for Insurance IBM Insurance Framework Session Objectives 1 It s the HOW! Insurance Solution Delivery 2 Approach IBM Insurance Framework 3 Insurance
Smart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.
The Art of Architecture Transformation Oracle Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
Cyber Security & Compliance Briefing
Cyber Security & Compliance Briefing Cyber Security Offerings & Capabilities Overview Full service cyber security and compliance offerings in North America and international power markets: controls and
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
