1 Security Architecture Principles A Brief Introduction Mark Battersby , Oslo
2 Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security Architecture Principles, Cloud & SOA 2
3 Mark Battersby Security Architect The evolution of knowledge/architecture is toward simplicity, not complexity. Profile Significant experience of analysis and verification of business and technical requirements including security audit, compliance, analysis and test of tools. Significant experience in many roles including, security architect, security adviser and security analyst. Architected and developed business critical solutions for demanding bluechip clients Specialized within information security (identity and access management, information assurance, security standards and policies) Familiarity with information security standards, ISO 27000, COBIT, ISF Security Guidelines and Benchmarking, Security Audit, Governance, Risk and Compliance Exceptional communication and presentation skills based on a strong desire to learn and share knowledge, experience and skills with project members Qualifications MSc. Information Security, RHUL (Royal Holloway, University of London) TOGAF 9 Certified Architect Member RHUL information security group Member British Computer Society Recent Professional Experience Ericsson , Stockholm, Sweden Information Security and Operational Risk Manager. Security Advisor to management team Development of information security and operational risk policies, directives and controls. Implementation of information security and operational risk policies, directive and controls Delivery of risk and information security awareness programs within Ericsson Regular review and audit of information security and risk management procedures Axfood, Stockholm, Sweden Analyst, Identity and Access Management Pre-study for identity and access management in a major SAP implementation Dalkia, Stockholm, Sweden Security Architect, Identity and Access Management Hands-on support to the Oracle partner implementing an identity and access management system. TeliaSonera, Stockholm, Sweden Lead Architect, Identity and Access Management, Corporate Security Business analysis, architecture and design of an identity and access management system for corporate security
4 Enterprise Architecture Definition Enterprise architecture (EA) is the process of translating business vision and strategy into effective enterprise change by creating, communicating and improving the key requirements, principles and models that describe the enterprise's future state and enable its evolution 4
5 Architecture Principles Architecture Principles are essentially guidelines which Influence the architecture (in some way) Address long term goals and strategies Describe the agenda or priority of the business May be conflicting Change infrequently if at all Architecture Principles do not Define what needs to be done Solve a specific problem Guiding Principles are rules which Allow governance of architecture Are a way to determine and define which mechanisms shall be used when there are several conflicting requirements 5
6 Security Architecture Principles Mark Battersby
7 Our philosophy The easy way of doing things should also be the secure way of doing things Security mechanisms should be appropriate, minimal and invisible to the users Security is an aspect of everything Security choices should be based on business need, risk and Return On Security Investment Information should only be present where it is necessary. Know your asset and know your needs to minimize exposure, risk and security scope
8 Security Principles Security Principles define key design features of information security that should be applied when architecting a secure architecture (or framework, or infrastructure). These features must: Be defined in plain language Use terms that have clear meaning within the context being used Be technology-neutral; i.e., independent of any technologies or design implementation
9 Guiding Principles identify correct security mechanisms Principles shall: Provide guidelines toward the long term goals of the business Describe priorities of the business Define the rules for architecture Be stable Principles shall not: Describe the problem or topic Solve the problem 9
10 Security Principles in Context General Security Principles SOA Security Principles Cloud Security Principles
11 Information Centric Security (Jerico Forum). Stored Secure the business Secure the information carrier Secure the information In transit Used Asset assessment Information centric security A reference model for securing information in the enterprise Risk analysis Policies Jericho style security A reference model for implementing information centric security Is built upon the mobile workforce concept and an interconnected world
12 General Security Principles Categories include Fundamentals Trust Data Protection Management Interoperability
13 Security Principles - Fundamentals Policy Driven Security must be driven by policy People, Process and Technology All people, processes and technology must have declared and transparrent levels of trust for any transaction to occur Openness Information security solutions should depend on open systems mechanisms.
14 Security Principles - Fundamentals Security by Design Security should be designed as an integral part of the system architecture Sharing Security solutions should include management controls to accommodate sharing Defense in Depth Multiple levels of protection, especially if they use different mechanisms, should be used to provide effective defense in depth
15 Security Principles - Fundamentals Security is Model-driven Models are reflective of the operating environment, common models, and consistent formats for identity and trust, data, policy, applications, security information and events, and cryptographic keys. Simplicity Security mechanisms should be pervasive, simple, scalable, and easy to manage. Protection against Insider and Outsider Attacks Security measures should maintain their intended effectiveness irrespective of the source credentials of a principal claiming access to a resource.
16 Security Principles - Trust Trust Assurance Mutual trust levels must be determinable Weakest Link Overall security can only be as effective as the weakest link in the chain from end-to-end
17 Security Principles Data Protection Security Context Validate the security context for which the solution is designed Data Access Control Access to data should be controlled by security attributes of the data itself Data Protection By default, data must be appropriately secured when stored, in transit and in use
18 Security Principles - Management Accountability Security solutions should include collection of audit information on system operations. (See also the Accountability in Service-based Architectures principle.) Regulation/Compliance Security solutions should include mechanisms to configure and monitor systems for regulatory compliance. Privacy Security solutions should include mechanisms to implement policy on privacy.
19 Security Principles - Management Compartmentalization (Security Domains) Resources should be protected at separated levels appropriate to their value, confidentiality, integrity, and accountability classification. Separation of Management Services Security services for management, enforcement, and accountability should be delivered as separate functions through separate authorities. Separation of Duties Security operations should enforce separation of duties.
20 Security Principles - Interoperability Least Privilege A principal should have only the privileges required to carry out its specified task. Agility and Extensibility Security solutions should include agility and management mechanisms to accommodate extensibility. Consumability Security solutions should include management mechanisms to accommodate consumability.
21 Security Architecture Principles Other Sources ISO/IEC ISO/IEC 27001:2005: Information Technology Security Techniques Information Security Management Systems Requirements. NIST NIST Special Publication : Generally Accepted Principles & Practices for Securing Information Technology Systems; Reference Joint ISF, (ISC)2, ISACA Principles for Information Security Practitioners, 2010; Jerico Forum Jerico Forum Commandments, 2006 Design principles that must be observed when architecting systems for secure operation in deperimeterized environments Jerico Forum Identity, Entitlement and Access Management (IdEA) Commandments, 2011 Security principles for federated identity management
22 Security Architecture Principles Cloud, SOA Mark Battersby , Oslo
23 Security Architecture Principles Cloud and SOA Weakest Link Off-line backup Policy based access to Services Data Protection Privacy Multi-tenancy Data Evacuation Intellectual Property Accountability in SOA
24 Security Architecture Principles - Cloud and SOA Weakest Link Adding to the Weakest Link principle, this principle has particular application to Cloud and SOA. Off-line Backup It must be possible for Cloud tenants to make a back-up of their data on another environment of their choice. Policy based access to Services Service consumption will be controlled by policy. Policies must be held externally from applications.
25 Security Architecture Principles - Cloud and SOA Data Protection Data protection should allow compliance with corporate or regulatory compliance standards and practices, implemented in a manner that supports the other principles for Cloud and SOA, such as policy-based access, federation, multi-tenancy, etc. Privacy Extending the Privacy principle, protection of private information must demonstrate compliance with the enterprise's requirements for such protection across all points providing each service. Multi-tenancy A Cloud Computing model must support tenant and solution isolation among multiple tenants of the Cloud.
26 Security Architecture Principles - Cloud and SOA Data Evacuation A user of Cloud Computing must be able to request its data be removed in its entirety from the Cloud on terminating use of the service and be assured that no data is left behind in an accessible state. Intellectual Property A Cloud Computing model must support the notion that a user s intellectual assets (capital/property) and individuals or organizations innovations are protected contractually and where possible also technically, and respected by its Cloud hosting providers and/or their associated supply chain, including residual knowledge and experience-based knowledge.
27 Security Architecture Principles - Cloud and SOA Accountability in SOA Security design in SOA/Cloud architectures should include collection and provision of audit information on system operations.
28 Questions? 28
29 More Information Please contact: Mark Battersby 29
30 More Information About Capgemini With around 140,000 people in 40 countries, Capgemini is one of the world s foremost providers of consulting, technology and outsourcing services. The Group reported 2010 global revenues of EUR 8.7 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore, its worldwide delivery model. More information is available at Rightshore is a trademark belonging to Capgemini 30
31 The information contained in this presentation is proprietary Capgemini. All rights reserved
Security Principles for Cloud and SOA A White Paper by: The Security for the Cloud & SOA Project of The Open Group Cloud Computing Work Group December 2011 Copyright 2011, The Open Group The Open Group
Using SOA to Enhance Email Notifications Rajas Kirtane 8/11/2014 Agenda Introduction Business Challenge Solution Overview Key Learning's Q & A In collaboration with The information contained in this document
Better Intelligence, Smarter Decisions MDM is an operational problem Customers are individuals too A spade is a spade Campaigning in a social world What it takes to deliver 2 1 MDM provides the translation
G-Cloud Enterprise Applications for a Mobile Workforce October 2015 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 3 Why Capgemini... 4 Our Approach... 4 Benefits...
in collaboration with Core Banking Transformation using Oracle FLEXCUBE Unlocking the power of FLEXCUBE with Capgemini Moving towards a packaged system transformation program Capgemini is an Oracle Diamond
HP PPM - RallyDev Integrator Background / Ground Reality Many organizations have implemented HP PPM for managing their end-to-end Portfolio Management process areas and Rally Dev for managing Agile projects.
Website (Digital) & Mobile Optimisation 10 April 2014 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 3 Our Approach... 4 Service Management... 5 Pricing... 5 Ordering
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
CA Clarity PPM - RallyDev Integrator A Capgemini Accelerator May 2014 Background / Ground Reality Many organizations have implemented CA Clarity PPM for managing their end-to-end Portfolio Management process
Position Paper Collaboration Oriented Architectures Introduction Collaboration Oriented Architectures (COAs) are information architectures that comply with the COA framework, outlined below. They enable
in collaboration with A Comprehensive FATCA Solution End-to-end automated legal, technology and software solution facilitates global compliance with U.S. Foreign Account Tax Compliance Act requirements
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Infrastructure As A Service (IaaS) G-Cloud VI Pricing Virtual s and Storage Virtual Pricing Operating System Workload size vcpu (GHz) Virtual Memory Initial Virtual storage (Gold) G-Cloud Price (Per Month)
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
The Aerospace & Defence industry of tomorrow Aerospace and Defence are often treated as part of the same industry but they face very different business challenges. Defence companies need to adapt to shrinking
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Transforming Your Core Banking and Lending Platform Dramatically improve your bank s core systems to increase operating agility, lower time to market, reduce costs and better manage risk and regulatory
The 2013 Supply Chain Agenda Time to go beyond the traditional supply chain optimization projects 5 th Edition Prepared and edited by: Erik Koperdraat Kris Dieteren Capgemini Consulting The Netherlands
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
Digital Transformation and the future of QA & Testing March 3 rd, 2016 Jérôme Cadiou Digital Transformation is Everywhere 2 Introduction how do we define the Digital Transformation paradigm? Business Process
Smart Energy Services Platform Integrated Multi-Client Platform for Smart Meters End-to-End Smart Energy Services Platform Helping you efficiently deliver your smart device programs using our proven system
Beat the Beast - Java Performance Problem Tracking with you Java One - San Francisco, 29.09.2014, Miroslaw Bartecki Agenda What performance problem usually is? 5 steps to track performance problems 5 things
the way we do it Master Data Management (MDM) Mastering the Information Ocean Mastery of information gives business control In the modern business, the volume of information is increasing and the value
Capgemini and Pegasystems: Delivering Business Value through Partnership Continuous process improvement to drive sustainable results Our partnership combines Capgemini s consulting and industry strengths
Identity and Access Management the way we do it Contents Business Rationale 2 Services 3 Benefits of Identity and Access Management 4 Our Solution 5 Our Approach 6 The Capgemini Advantage 7 Near-future
Secure Business Collaboration Do It Now! Collaboration Oriented Architecture as it pertains to FIPNet Adrian Seccombe CISO, Eli Lilly Why Worry: Security Environment 2005 > 2008 Changing Threats Changing
Cloud Computing Security Audit Teddy Sukardi firstname.lastname@example.org Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud
Capgemini s Guidewire Services Leading services and solutions to support your Guidewire initiatives Capgemini was named Guidewire s Partner of the Year for 2011 Post financial crisis, insurance companies
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Enterprise Mobility Orchestrator Your Business. Always On. Introduction Capgemini and Sogeti offer end-to-end Mobile Solutions for mobile strategy and services as your Enterprise Mobility Orchestrator.
Prosodie and Salesforce: Front End solution Nicolas Aidoud and Ronan Souberbielle Prosodie ID-Card Solutions Platforms Full IP solutions Innovation Pay-as-you-go 80% of recurring business 1000 FTE 8 datacenters
SkySight: New Capabilities to Accelerate Your Journey to the Cloud There is no longer any question about the business value of the cloud model. The new question is how to expedite the transition from strategy
Business Information Management the way we see it Master Data Management (MDM) Mastering the Information Ocean Business Information Management the way we see it Mastery of information gives business control
Capgemini BPO Your Partner in Delivering Value-Adding Solutions Expect more... Commitment We are dedicated to transforming your business operations. Today, more than ever, gaining a competitive advantage
in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Business Process Outsourcing the way we do it Credit Management through Order-to-Cash BPO Capgemini Order-to-Cash Service helps reduce days sales outstanding, improve cash flow, and enhance finance efficiency.
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Testing Services Meeting the challenge of software quality and maximizing return on investment Performance driven. Quality assured. Introduction Today, insightful IT departments understand that software
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
G-Cloud Big Data Suite Powered by Pivotal December 2014 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 6 Our Approach... 7 Service Management... 7 Vendor Accreditations/Awards...
Cloud Computing & Sustainability Doug Bourgeois, Vice President, Federal Chief Cloud Executive Virtualization, Cloud Computing & Green IT Summit Proprietary October 26, 2010 2009 VMware Inc. All rights
SwA Forum March 12, 2010 Open Group and OMG Update & Discussion on Standards Harmonization Andras Szakal IBM Distinguished Engineer Director Software Architecture IBM Federal Software Group 2009 IBM Corporation
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
Cloud A Close-up View of Microsoft Azure Adoption Business Decision-Makers are Driving Cloud Trends Contents Introduction 3 Key Trends 4 Rates of evaluation and adoption of Azure are high 5 The business
Automotive Suppliers and Cybersecurity OEMs sometimes specify their security requirements in an incomplete or vague way, but that certainly doesn t mean that Tier 1 automotive suppliers (Tier 1s) should
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
A Joint Strategy Brief from Oracle and Capgemini September 2010 Proof-of-Concept Done Right: Mitigating the Risk of Policy Administration System Migrations EXECUTIVE OVERVIEW... 1 POC DONE RIGHT: A CASE
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
SAP Digital Services the way we do it o Getting a 360 customer view with SAP Business Communications Management (BCM) Capgemini can help you deploy BCM to achieve multi-channel integration across all your
G-Cloud Healthcare Analytics Service October 2015 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 5 Our Approach... 6 Service Management... 6 Sub-contractors... 7 Pricing...
Wealth the way we do it Wealth management offerings for sustainable profitability and enhanced client centricity The wealth management business is transforming. To delight their clients, firms must adopt
Infrastructure Services the way we do it Cover Capgemini title Helvetica Cloud Services thin, 30-33 Brokerage maximum 2 lines Ultimate flexibility and control for enterprise cloud users plus infrastructure
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Streamlining the Order-to-Cash process Realizing the potential of the Demand Driven Supply Chain through Order-to-Cash Optimization Introduction Consumer products companies face increasing challenges around
ERP CLOUD: Assessing Readiness and Building the Roadmap San Francisco, October 2015, Michael Reddy This Talk will Balance Strategy, Tactics and Approach 2 We are and We are not Addressing Migrating Workloads
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
The Capgemini Schools Programme the way we do it The Capgemini Schools Programme Committed to nurturing talent, skills and creativity Supporting schools Our work with schools is about two things: giving
Infrastructure Services the way we do it My Experience Serve Users in a Way that Serves the Business. A Smarter Strategy for Empowering Users IT has entered a new era, and CIOs need to perform a delicate
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Introduction and Overview Klaus Gribi Senior Security Consultant email@example.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Information Shield www.informationshield.com 888.641.0500 firstname.lastname@example.org Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Application Outsourcing the way we see it Business Level Agreements Committing IT to business success Transforming applications into business advantage Contents 1 Overview 3 2 Business Level Agreements
Testing Platform-as-aService Get Significant Application Quality Improvement without Major Investment Performance driven. Quality assured. TPaaS providing testing on demand, using the Capgemini Cloud Application
Manufacturing the way we see it Business Process Management in Manufacturing: From Process to Value New Capgemini research shows how organizations can move to the next level of BPM maturity BPM can help
IPv6 Deployment in a Global IT Service Company Utrecht, 29 May 2013 Marco van der Pal Agenda Introduction What would you need to deploy IPv6? Capgemini s approach The IPv6 Roadmap Next steps Conclusions
SaaS Myths and Realities SoftwareasaService: a turnkey solution? Executive Summary Initially designed for small companies, SoftwareasaService (SaaS) has gradually extended to multinational firms all over
Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,
Business Process Outsourcing the way we do it Capgemini Business Process Outsourcing Supply Chain Management Services The State of the Supply Chain A perfect storm of external forces is changing the way
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO
Infrastructure Services the way we see it Cover Next-Gen title Cloud: Helvetica Choice thin, and 30-33 maximum Control through 2 lines Cloud Service Brokering Cloud 2.0 is about more than cost savings.
Digital Service Centre the way we do it Digital Service Centre Automate support and empower users. Higher-quality support at a lower total cost. The automated, self-help service desk has been on the IT
Aligning CobiT and ITIL - The Business Benefit 2007 ISACA All rights reserved www.isaca.org Page - 1 Somewhere Today, A Project is Failing Chapter 1, Peopleware 2nd edition Tom DeMarco 2007 ISACA All rights
Testing Platform-as-a-Service Get Significant Application Quality Improvement without Major Investment Performance driven. Quality assured. Testing the way we do it Application testing can get expensive.
Architectural Principles for Secure Multi-Tenancy John Linn, Office of the CTO, RSA, The Security Division of EMC John Field, Office of the CTO, EMC Also adapting prior content by Burt Kaliski DIMACS Workshop
our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and