Enterprise Architectures (EA) & Security

Size: px
Start display at page:

Download "Enterprise Architectures (EA) & Security"

Transcription

1 Enterprise Architectures (EA) & Security A synopsis of current state EA s and enterprise security as an add on Marcel Schlebusch mwrinfosecurity.com MWR InfoSecurity mwrinfosecurity.com MWR InfoSecurity 1

2 Something to ponder 9gag.com mwrinfosecurity.com MWR InfoSecurity 2

3 Overview Introduction: Brief history and overview of EA Common problems faced by EA programmes Security as part of EA A comparison of 4 EA frameworks EA trends Literature study An optimist s vision for EA and ESA Conclusion mwrinfosecurity.com MWR InfoSecurity 3

4 Introduction: Brief history and overview of EA 26 Years of EA 1960s and 1970s (Information Architectures) 1987 (John Zachman) 1990s (Term EA, different views start to form) 2000s (Many different approaches to EA emerge) mwrinfosecurity.com MWR InfoSecurity 4

5 Introduction: Brief history and overview of EA... Overview of EA What is Enterprise Architecture? Enables translating business vision into enterprise change Enables management of complexity Purpose/Goals: Effectiveness, Efficiency, Agility, and Durability What is an EA framework? Reference structure that provides models, tools and processes to plan, produce and operate an EA programme mwrinfosecurity.com MWR InfoSecurity 5

6 Common problems faced by EA programmes At the very least, these questions will be addressed: Should my organisation implement an Enterprise Architecture? Which EA framework is the best? We ve spent a fortune on EA, why are we not getting ROI? Why do EA programmes commonly fail? What are the current business trends in EA? How do we get started with EA? mwrinfosecurity.com MWR InfoSecurity 6

7 Security as part of EA Zoom in on Security mwrinfosecurity.com MWR InfoSecurity 7

8 Security as part of EA There are many security standards ISO (BS 7799) NIST rev3 PCI-DSS Etc There are Risk Frameworks RiskIT (Risk framework by ISACA) ISO Etc There are Enterprise Security Architecture (ESA) Frameworks SABSA (Sherwood Applied Business Security Architecture) IAEAF (Information Assurance Enterprise Architectural Framework) OSA (Open security architecture) mwrinfosecurity.com MWR InfoSecurity 8

9 Security as part of EA... Positioning Enterprise Security Architecture Business architecture Goals of ESA: Establish common language Structured management of security complexity Enable business-to-security alignment Traceability to business reqs. Security Architecture Information Architecture Technology architecture mwrinfosecurity.com MWR InfoSecurity 9

10 Security as part of EA... Positioning Enterprise Security Architecture ESA is a subset of EA Stretches across all other Architectures mwrinfosecurity.com MWR InfoSecurity 10

11 Security as part of EA... Business assets Information assets Technology assets mwrinfosecurity.com MWR InfoSecurity 11

12 Security as part of EA... SABSA as an example Risk driven methodology Consists of frameworks, models, methods and processes Free for use by all Overarches all other security standards Everything is driven from an analysis of the business requirements for security The SABSA layered model The SABSA lifecycle mwrinfosecurity.com MWR InfoSecurity 12 Source: SABSA whitepaper

13 Security as part of EA... SABSA as an example Business View Business view of What Business view of Why Business view of How Business view of Who Business view of Where Business view of When Architect s View Designer s View Builder s View The SABSA matrix Tradesman s View Service Manager s View mwrinfosecurity.com MWR InfoSecurity 13 Source: SABSA whitepaper

14 Security as part of EA... The SABSA Matrix Business View Architect s View Designer s View Builder s View Tradesman s View Service Manager s View mwrinfosecurity.com MWR InfoSecurity 14 Source: SABSA whitepaper

15 Security as part of EA... SABSA as an example The SABSA Business Attributes mwrinfosecurity.com MWR InfoSecurity 15 Source: SABSA whitepaper

16 A comparison of 4 EA frameworks Zoom out back to the Enterprise mwrinfosecurity.com MWR InfoSecurity 16

17 A comparison of 4 EA frameworks Over the past decade many EA approaches have emerged, 4 are leading the pack: 1. Zachman framework for EA 2. The Open Group Architecture Framework (TOGAF) 3. Federal Enterprise Architecture (FEA) 4. Gartner Enterprise Architecture Framework mwrinfosecurity.com MWR InfoSecurity 17

18 A comparison of 4 EA frameworks... In comparing these frameworks, the following will be shown: 1. A summary/overview of each framework 2. A score-sheet, directly comparing the frameworks 3. Some usage statistics (mostly from USA and Europe) mwrinfosecurity.com MWR InfoSecurity 18

19 A comparison of 4 EA frameworks... Zachman framework for EA Taxonomy Categorising deliverables Planning tool Views & view-points Also: Limited usefulness as EA History in manufacturing Broad acceptance mwrinfosecurity.com MWR InfoSecurity 19

20 A comparison of 4 EA frameworks... The ARCHITECT John Sherwood John Zachman SABSA VS. 6 x 6 matrix Views View-points Enterprise Security Framework Enterprise Framework mwrinfosecurity.com MWR InfoSecurity 20

21 A comparison of 4 EA frameworks... TOGAF Process driven (via ADM) Enterprise Continuum (general -> specific) Technical reference models (TRM) Standards information bases (SIB) Also: Holistic perspective History in defence Broad acceptance mwrinfosecurity.com MWR InfoSecurity 21

22 A comparison of 4 EA frameworks... FEA Segmented enterprise 5 Reference models Development process Planning and communication tool Also: Holistic perspective US-Gov Standard Broad US-Gov acceptance mwrinfosecurity.com MWR InfoSecurity 22

23 A comparison of 4 EA frameworks... Gartner Better described as a practice EA as a service to large enterprises mwrinfosecurity.com MWR InfoSecurity 23

24 A comparison of 4 EA frameworks... Score-sheet (2007) Rating Scale: 1. Very poor Public 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 24

25 A comparison of 4 EA frameworks... Score-sheet (2012) Rating Scale: 1. Very poor Public 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 25

26 A comparison of EA frameworks: Usage survey 2003 Organisation's Own None Zachman Other TOGAF Source: Capgemini EA survey % 5% 10% 15% 20% 25% 30% 35% 40% mwrinfosecurity.com MWR InfoSecurity 26

27 A comparison of EA frameworks: Usage survey 2012 Organisation's Own TOGAF Pragmatic EA Other MoDAF Zachman None FEA Source: Ovum EA survey % 5% 10% 15% 20% 25% mwrinfosecurity.com MWR InfoSecurity 27

28 EA trends: Literature study Gartner: Analysts predict that 95% of organisations will support multiple approaches to EA by 2015 By 2020 the majority of Global 1000 organisations will support EA as a distinct discipline To prepare for 2020, Gartner advises to: Ensure that EA practices are driven by the business direction EA should lead from the top, and be driven from the top Use EA to predict the impact of investment decisions Source: Gartner EA Hype Cycle 2012 mwrinfosecurity.com MWR InfoSecurity 28

29 EA trends: Literature study (Gartner EA Hype Cycle 2012) mwrinfosecurity.com MWR InfoSecurity 29

30 EA trends: Literature study The blended approach to EA Gartner identifies different approaches to EA Traditional Top down approach Federated Useful for larger organisations Middle-Out Most dynamic approach Managed Diversity Option based approach A true "blended" approach is one whereby the enterprise architecture (EA) team determines the appropriate mix of above EA approaches based on business-outcomedriven decision criteria. Source: Gartner EA Hype Cycle 2012 mwrinfosecurity.com MWR InfoSecurity 30

31 EA trends: Literature study Oracle Survey What does a partially successful or unsuccessful implementation look like? Isolation Trap Optimised An EA Maturity representation Enterprise Architecture Losing Fragmented Solution Architecture Source: Oracle EA survey mwrinfosecurity.com MWR InfoSecurity 31

32 An optimist s view of EA and ESA... The blended approach Rating Scale: 1. Very Public poor 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance SECURITY, of course Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 32

33 An optimist s view of EA and ESA... The blended approach Gartner SABSA TOGAF Zachman Requirements Definition a Process a a Goals and Artefacts a a mwrinfosecurity.com MWR InfoSecurity 33

34 An optimist s view of EA and ESA... The blended approach SABSA and TOGAF integration mwrinfosecurity.com MWR InfoSecurity 34

35 An optimist s view of EA and ESA... The blended approach Are we not increasing the complexity? mwrinfosecurity.com MWR InfoSecurity 35

36 An optimist s view of EA and ESA... The ideal state Market leading Strategic SECURE Compliant Competitive Cost effective Dynamic Efficient Documented Intelligent mwrinfosecurity.com MWR InfoSecurity 36

37 Conclusion For organisations practicing EA and ESA: EA and ESA are tools for change It takes time (track maturity) EA is not an IT function Drive from the top! Be open to a blended approach Include security here For EA and ESA professionals: Understand that ESA delivers into EA Manage expectations (long term value) The value of EA careers are increasing Be skilled in multiple frameworks mwrinfosecurity.com MWR InfoSecurity 37

38 Conclusion At the very least, these questions will be addressed: Should my organisation implement an Enterprise Architecture? -YES Which EA framework is the best? - BLEND We ve spent a fortune on EA, why are we not getting ROI? It takes time, but measure the maturity of your programme, and re-focus efforts on delivering business value Why do EA programmes commonly fail? Not driven from the top or focus shifts to shorter term solutions architecture What are the current business trends in EA? Blended EA approaches and EA tools How do we get started with EA? Combine Zachman, TOGAF and SABSA and let the TOGAF ADM guide your process mwrinfosecurity.com MWR InfoSecurity 38

39 mwrinfosecurity.com MWR InfoSecurity 39

40 References: [1] Article: A Comparison of the Top Four Enterprise-Architecture Methodologies by Roger Sessions [2] White-paper: A Comparison of the Five Major Enterprise Architecture Methodologies [3] Ovum Research: Amongst others: [4] Gartner: Hype Cycle for Enterprise Architecture, 2012 [5] TOGAF: [6] Whitepaper: The Oracle Enterprise Architecture Framework (Oracle October 2009) [7] Whitepaper: Enterprise Security Architecture [8] Whitepaper: TOGAF and SABSA Integration The Open Group (October 2011) mwrinfosecurity.com MWR InfoSecurity 40

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering

More information

SABSA A Brief Introduction

SABSA A Brief Introduction SABSA A Brief Introduction Mark Battersby 2013-05-15 Agenda SABSA Overview SABSA Security Architecture SABSA Security Architecture Matrix Operational Security Architecture Matrix SABSA Business Attributes

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

Enterprise Architecture Roles in Delivering Business Capabilities

Enterprise Architecture Roles in Delivering Business Capabilities Enterprise Architecture Roles in Delivering Business Capabilities Alecia Heng Committee, IASA Malaysia President, Gorgeous Geeks, SIG IASA Malaysia Chief Business Architect, ATD Solution/ATD Learning Asia

More information

Enterprise Security Architecture

Enterprise Security Architecture Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture

More information

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013 Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Module F13 The TOGAF Certification for People Program

Module F13 The TOGAF Certification for People Program Module F13 The TOGAF Certification for People Program V9.1 Edition Copyright 010-011 Slide 1 of All rights reserved Published by The Open Group, 011 The TOGAF Certification for People Program Slide of

More information

Security Architecture and Design from a Business/Enterprise Driven Viewpoint

Security Architecture and Design from a Business/Enterprise Driven Viewpoint Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry

More information

The Perusal and Review of Different Aspects of the Architecture of Information Security

The Perusal and Review of Different Aspects of the Architecture of Information Security The Perusal and Review of Different Aspects of the Architecture of Information Security Vipin Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract The purpose of the security architecture

More information

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP

More information

Managing Change Using Enterprise Architecture

Managing Change Using Enterprise Architecture Managing Change Using Enterprise Architecture Abdallah El Kadi, PMP, CISSP, TOGAF Chief Executive Officer, Shift Technologies Managing Director, Open Group Arabia Email: Abdallah.Kadi@awrostamani.com Website:

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

The Open Group Architectural Framework

The Open Group Architectural Framework The Open Group Architectural Framework Background TOGAF is a step-by-step method for developing an enterprise architecture, using a set of prescribed tools. It is freely available on the Open Group website

More information

Agile and Enterprise Architecture

Agile and Enterprise Architecture 08 Experience, Intelligence, Pragmatism, Commitment. Always striving to ensure outstanding delivery Agile and Enterprise Architecture Steve Marchant July 2013 Abstract The IT industry is evolving at an

More information

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA This article was downloaded by: [188.204.15.66] On: 20 February 2012, At: 01:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer

More information

Enterprise Architecture Management. Prof. Dr. Knut Hinkelmann MSc Business Information Systems

Enterprise Architecture Management. Prof. Dr. Knut Hinkelmann MSc Business Information Systems Literature This chapter is based on the following literature: F. Ahlemann et al. (eds.), Strategic Enterprise Architecture Management: Challenges, Best Practices, and Future Developments, Springer-Verlag

More information

ENTERPRISE ARCHITECTURE AS THE CORE ENGINE FOR SUCCESSFUL BUSINESS TECHNOLOGY TRANSFORMATION

ENTERPRISE ARCHITECTURE AS THE CORE ENGINE FOR SUCCESSFUL BUSINESS TECHNOLOGY TRANSFORMATION ENTERPRISE ARCHITECTURE AS THE CORE ENGINE FOR SUCCESSFUL BUSINESS TECHNOLOGY TRANSFORMATION Aaron Tan Dani aarontan@atdsolution.com / aarontan@iasahome.org Founder and Chairman, IASA Asia Pacific Chief

More information

Sisyphus Would Be Proud

Sisyphus Would Be Proud Ten Best Practices of EA Anne Lapkin Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must be

More information

Avancier Reference Model

Avancier Reference Model Reference Model Architecture Context/Precursors (ESA 2) It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission of the copyright

More information

SOA: The missing link between Enterprise Architecture and Solution Architecture

SOA: The missing link between Enterprise Architecture and Solution Architecture SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing

More information

Solutions. An introduction to the science & art of system architecture engineering

Solutions. An introduction to the science & art of system architecture engineering Solutions Architecture 101 An introduction to the science & art of system architecture engineering » Architecture roles Architecture roles Defining the different types of architect Architecture Roles 2

More information

The Open Group 2011. Cloud Work Group

The Open Group 2011. Cloud Work Group The Open Group Cloud Work Group 18 May 2011 Heather Kreger SOA WG co-chair Liaison for SOA, Cloud IBM Cornwallis Rd B062, M307 Research Triangle Park, NC Tel 919-496-9572 Kreger@us.ibm.com www.opengroup.org

More information

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA

More information

How to bridge the gap between business, IT and networks

How to bridge the gap between business, IT and networks ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Enterprise Architecture: A Governance Framework

Enterprise Architecture: A Governance Framework Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network

From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network Marc Lankhorst, BiZZdesign Iver Band, Cambia Health Solutions INTRODUCTIONS 2 1 Marc Lankhorst

More information

EA vs ITSM. itsmf 15.4.2014

EA vs ITSM. itsmf 15.4.2014 EA vs ITSM itsmf 15.4.2014 EA vs ITSM SH Needs Business Goals 2 GOVERNANCE EVALUATE PLANNING ITSM IMPROVING OPERATING Business Programs Projects DEVELOPING EA IMPLEMENTING What is an enterprise in the

More information

Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks

Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary

More information

COBIT 5 Introduction. 28 February 2012

COBIT 5 Introduction. 28 February 2012 COBIT 5 Introduction 28 February 2012 COBIT 5 Executive Summary 2012 ISACA. All rights reserved. 2 Information! Information is a key resource for all enterprises. Information is created, used, retained,

More information

ITIL V3 - The Future Is Here

ITIL V3 - The Future Is Here ITIL V3 - The Future Is Here Copyright Notice Copyright Axios Systems 2007. The information, which is contained in this document, is the property of Axios Systems. The contents of the document must not

More information

Architecting enterprise BPM systems for optimal agility

Architecting enterprise BPM systems for optimal agility Architecting enterprise BPM systems for optimal agility Dr Alexander Samarin www.samarin.biz About me An enterprise solutions architect From a programmer to a systems architect Experience in scientific,

More information

White Paper What Solutions Architects Should Know About The TOGAF ADM

White Paper What Solutions Architects Should Know About The TOGAF ADM White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently

More information

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and

More information

Enterprise Architecture (EA) is the blueprint

Enterprise Architecture (EA) is the blueprint SETLabs Briefings VOL 6 NO 4 2008 Building Blocks for Enterprise Business Architecture By Eswar Ganesan and Ramesh Paturi A unified meta-model of elements can lead to effective business analysis Enterprise

More information

Practice Description Business process management and enterprise architecture

Practice Description Business process management and enterprise architecture Practice Description Business process management and enterprise architecture 1. Description of the practice The BPM & EA practice assists organisations in 1 keeping in control of the performance of their

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

TOGAF overview and relation

TOGAF overview and relation TOGAF overview and relation with ITIL3 ITSMF Egypt Tom van Sante Supplier representative boardmember tom.vansante@kpn.com Thames Tower, 37-45 Station Road, Reading, RG1 1LX United Kingdom Tel +44 118 950

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

ITC 19 th November 2015 Creation of Enterprise Architecture Practice ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG

More information

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation

More information

A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert

A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB 76131 Karlsruhe,

More information

POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I

POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I THE POSITION The Enterprise Architect will be supporting the Experian Consumer Services UK&I Architecture functions and processes. The Enterprise Architect

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

Government Enterprise Architecture

Government Enterprise Architecture Government Enterprise Architecture GEA-NZ v3.0 Context Document September 2014 Crown copyright. This copyright work is licensed under the Creative Commons Attribution 3.0 New Zealand licence. In essence,

More information

Visualizing the Business Impact of Technical Cyber Risks

Visualizing the Business Impact of Technical Cyber Risks Visualizing the Business Impact of Technical Cyber Risks May 21, 2014 Henk Jonkers Senior Research Consultant, BiZZdesign Agenda Introduction and problem statement Enterprise Architecture with ArchiMate

More information

How To Compare Itil To Togaf

How To Compare Itil To Togaf ITSM vs EA KAOS ITSM vs EA SH Needs Business Goals 2 GOVERNANCE EVALUATE PLANNING ITSM IMPROVING OPERATING Business Programs Projects DEVELOPING EA IMPLEMENTING IT service - ITIL 3 Lifecycle approach Service

More information

The Cornwell Enterprise Architecture Maturity Dashboard

The Cornwell Enterprise Architecture Maturity Dashboard The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard

More information

Benefits of the SAP Enterprise Architecture Framework for Enterprise SOA

Benefits of the SAP Enterprise Architecture Framework for Enterprise SOA Benefits of the SAP Enterprise Framework for Enterprise SOA Franck Lopez Global Director, Enterprise & Enterprise SOA Portfolio SAP Field Services, Global Strategic Initiatives TechTour 07, Philadelphia,

More information

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our

More information

Government-wide Enterprise Architecture In KOREA. National Computerization Agency

Government-wide Enterprise Architecture In KOREA. National Computerization Agency Government-wide Enterprise Architecture In KOREA Content 1. About NCA 2. Works on Enterprise Architecture 3. Government-wide Enterprise Archtecture Framework 4. Comparison with TOGAF 5. Future Work 2 About

More information

SAP Enterprise Architecture Framework Unveiled: Aligning IT to the Business

SAP Enterprise Architecture Framework Unveiled: Aligning IT to the Business SAP Enterprise Framework Unveiled: Aligning IT to the Business Franck Lopez Global Director, Enterprise & Enterprise SOA Portfolio SAP Field Services, Global Strategic Initiatives TechTour 07, Palo Alto,

More information

BPM case study: Competency Centre in a large Swiss bank

BPM case study: Competency Centre in a large Swiss bank mwd a d v i s o r s Best Practice Insight BPM case study: Competency Centre in a large Swiss bank Neil Ward-Dutton Premium Advisory Report October 2010 This report examines the implementation of a BPM

More information

Agenda. Seda Overview Seda EA Project Requirements Enterprise Architecture Approach

Agenda. Seda Overview Seda EA Project Requirements Enterprise Architecture Approach Seda Case Study "To effectively communicate, we must realize that we are all different in the way we perceive the world and use this understanding as a guide to our communication with others." -- Tony

More information

Integrated Performance Management

Integrated Performance Management How is it aligned with shareholder value? White paper, Business Consulting 1 Introduction In order to enhance shareholder value and align employees efforts with this overarching objective, businesses have

More information

1.0 Background and Problem Statement

1.0 Background and Problem Statement S-TRAIS: A Method for Security Requirements Engineering Using a Standards- Based Network Security Reference Model (Standards-Traceable Reference Architecture for Information Systems) Peter Stephenson Netigy

More information

Five Core Principles of Successful Business Architecture

Five Core Principles of Successful Business Architecture Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS

A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS Lise Urbaczewski, Eastern Michigan University, lurbacze@emich.edu Stevan Mrdalj, Eastern Michigan University, smrdalj@emich.edu ABSTRACT An Enterprise

More information

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security

More information

INFORMATION TECHNOLOGY FLASH REPORT

INFORMATION TECHNOLOGY FLASH REPORT INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally

More information

ESKITP5022 Software Development Level 2 Role

ESKITP5022 Software Development Level 2 Role Overview This sub discipline covers the core competencies required to create software to address the needs of business problems and opportunities, resulting in a variety of software solutions, ranging

More information

Enterprise Architecture Service

Enterprise Architecture Service Service Service Definition Government Procurement Service - G-Cloud III Services - Q-LOT4-13 February 2013 Contact: GCloud@sapient.com Service Contents Contents 01 Executive Summary...3 02 Service...4

More information

Advanced Topics for TOGAF Integrated Management Framework

Advanced Topics for TOGAF Integrated Management Framework Instructor: Robert Weisman MSc, PEng, PMP CD Robert.weisman@buildthevision.ca Advanced Topics for TOGAF Integrated Management Framework ROBERT WEISMAN CEO BUILD THE VISION, INC. WWW.BUILDTHEVISION.CA EMAIL:

More information

Real-time: changing the billing landscape

Real-time: changing the billing landscape Real-time: changing the billing landscape Intelligent Next Generation Billing Congress Berlin, November 2006 Eirwen Nichols, Principal Analyst Email: eirwen.nichols@ovum.com Direct line: +44(0)20 7551

More information

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008 How Managed Services Has Changed Remote Infrastructure Management Presented by: Bill Whitney March 26, 2008 Why are businesses looking to partners such as Managed Service Providers (MSPs) for remote infrastructure

More information

The Value of the Project Management Office. March 2009 A survey conducted by Pole to Pole Communications, on behalf of CA

The Value of the Project Management Office. March 2009 A survey conducted by Pole to Pole Communications, on behalf of CA The Value of the Project Management Office March 2009 A survey conducted by Pole to Pole Communications, on behalf of CA CONTENTS THE VALUE OF THE PROJECT MANAGEMENT OFFICE 02 Contents 1.0 Survey highlights

More information

ArchiMate and TOGAF. What is the added value?

ArchiMate and TOGAF. What is the added value? ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way

More information

Increasing the Role (and Impact) of BPM in Your Organization. Taking BPM and BPMS enabled BPM to the next level

Increasing the Role (and Impact) of BPM in Your Organization. Taking BPM and BPMS enabled BPM to the next level Increasing the Role (and Impact) of BPM in Your Organization Taking BPM and BPMS enabled BPM to the next level Dan Morris Thought Leadership Author business transformation books PEX Columnist since 2011

More information

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy

TOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.

More information

Adapting an Enterprise Architecture for Business Intelligence

Adapting an Enterprise Architecture for Business Intelligence Adapting an Enterprise Architecture for Business Intelligence Pascal von Bergen 1, Knut Hinkelmann 2, Hans Friedrich Witschel 2 1 IT-Logix, Schwarzenburgstr. 11, CH-3007 Bern 2 Fachhochschule Nordwestschweiz,

More information

A Ready Business has total visibility and control. Seamlessly manage your global telecommuncations in a secure environment

A Ready Business has total visibility and control. Seamlessly manage your global telecommuncations in a secure environment A Ready Business has total visibility and control Seamlessly manage your global telecommuncations in a secure environment 2 We live in a world of rapid and unpredictable change 22% Only 22% of businesses

More information

Practical meta data solutions for the large data warehouse

Practical meta data solutions for the large data warehouse K N I G H T S B R I D G E Practical meta data solutions for the large data warehouse PERFORMANCE that empowers August 21, 2002 ACS Boston National Meeting Chemical Information Division www.knightsbridge.com

More information

Why Data Governance - 1 -

Why Data Governance - 1 - Data Governance Why Data Governance - 1 - Industry: Lack of Data Governance is a Key Issue Faced During Projects As projects address process improvements, they encounter unidentified data processes that

More information

A Comparison of Common Business Modeling Approaches to GODS Generic Business Architecture

A Comparison of Common Business Modeling Approaches to GODS Generic Business Architecture A Comparison of Common Business Modeling Approaches to GODS Generic Business Architecture Adrian Grigoriu Contents GODS single page generic Business Architecture (gba), in brief... 2 Mapping scope and

More information

DESIGNING SECURE ENTERPRISE ARCHITECTURES. A comprehensive approach: framework, method, and modelling language

DESIGNING SECURE ENTERPRISE ARCHITECTURES. A comprehensive approach: framework, method, and modelling language DESIGNING SECURE ENTERPRISE ARCHITECTURES A comprehensive approach: framework, method, and modelling language I II MASTER THESIS SANDER VAN DEN BOSCH DESIGNING SECURE ENTERPRISE ARCHITECTURES Enschede,

More information

Illustrations and Answers for TDT4252 exam, June 2012. Sobah Abbas Petersen IDI/NTNU

Illustrations and Answers for TDT4252 exam, June 2012. Sobah Abbas Petersen IDI/NTNU Illustrations and Answers for TDT4252 exam, June 2012 Sobah Abbas Petersen IDI/NTNU 1 1. Enterprise Architecture 1a. main role of an Enterprise Architecture: to bridge the business strategy and IT strategy

More information

Data analytics the changing use of data within Internal Audit

Data analytics the changing use of data within Internal Audit Data analytics the changing use of data within Internal Kiran Sudhakar Associate Director, Grant Thornton UK Overview Areas of discussion Introduction Common questions asked Evolution of data analytics

More information

Patrick Bossert Director of Asset Information September 2014. patrick.bossert@networkrail.co.uk

Patrick Bossert Director of Asset Information September 2014. patrick.bossert@networkrail.co.uk Patrick Bossert Director of Asset Information September 2014 patrick.bossert@networkrail.co.uk Asset Information Offering Rail Better Information Services Purpose: Provide trusted asset-related information

More information

Software Development in the Large!

Software Development in the Large! Software Development in the Large! Peter Eeles Executive IT Architect, IBM peter.eeles@uk.ibm.com IBM Rational Software Development Conference 2007 2007 IBM Corporation Agenda IBM Rational Software Development

More information

Why Two Thirds of Enterprise Architecture Projects Fail

Why Two Thirds of Enterprise Architecture Projects Fail Why Two Thirds of Enterprise Architecture Projects Fail An explanation for the limited success of architecture projects Sven Roeleven Solution Manager Business White Paper December 2010 Contents Introduction

More information

Judith Jones Architecting-the-Enterprise

Judith Jones Architecting-the-Enterprise Developing Developing ure ure Skills Skills In this session we will explore the architecture role and skills of Enterprise ure the TOGAF Skills Framework and varieties of s Is your organisation up to the

More information

Extended Enterprise Architecture Framework Essentials Guide

Extended Enterprise Architecture Framework Essentials Guide Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve

More information

Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework

Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework Karoline Westerlund, IT-strategist Umeå University, Sweden retirement Service Catalogue Defined framework Formalized

More information

Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces

Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces Håvard D. Jørgensen 1, Tore Liland 2, Stein Skogvold 3 1 Commitment AS, PO Box 534, N-1327 Lysaker, Norway 2 Norwegian Defence Logistics

More information

Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI

Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI Gobierno de TI Enfrentando al Reto IT Facing the Challenge Everett C. Johnson, CPA International President ISACA and ITGI 1 Add titles Agenda Agenda IT governance keys IT governance focus areas: theory

More information

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions Digital Asset the way we see it Digital Asset Delivering greater value from your assets by using better asset information to improve investment decisions In its recent survey on the UK economy, the OECD

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

White Paper An Enterprise Security Program and Architecture to Support Business Drivers White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security

More information

Sparx Systems Enterprise Architect for Team Players

Sparx Systems Enterprise Architect for Team Players Course Description 4 day - expert led onsite training and hands-on workshops Experience hands-on modeling and learn how to use Enterprise Architect with your next project. Discover surprising ways to improve

More information

Key Account Management

Key Account Management Key Account Management Brent Warren What is KAM? the art of developing long-term relationships with selected customers The Financial Times. KAM is an art not a formula. It is a process of development,

More information

, Head of IT Strategy and Architecture. Application and Integration Strategy

, Head of IT Strategy and Architecture. Application and Integration Strategy IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL

More information

OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study

OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study Michael Guttman CTO, The Voyant Group mguttman@thevoyantgroup.com Overview of Voyant H.Q. West Chester, PA Business

More information

Enterprise Architecture Review

Enterprise Architecture Review Enterprise Architecture Review Arquitectura multivapa mediante Ajax y ORM Héctor Arturo Flórez Fernández * Fecha de recepción: octubre 29 de 2010 Fecha de aceptación: noviembre 23 de 2010 Abstract Enterprise

More information

SHAREPOINT SOLUTIONS

SHAREPOINT SOLUTIONS SHAREPOINT SHAREPOINT SOLUTIONS Connected Systems is one of Australia s premier SharePoint Services practice and has extensive SharePoint expertise in the following areas: Strategic Consulting (Information

More information

G-Cloud III Services Service Definition Accenture Cloud Security Services

G-Cloud III Services Service Definition Accenture Cloud Security Services G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.

More information

Integrating an ITILv3 Service Management Architecture into Business Architectures

Integrating an ITILv3 Service Management Architecture into Business Architectures Integrating an ITILv3 Service Management Architecture into Business Architectures Key Challenges experienced and Lessons Learned Trevor Lea-Cox, 2011 1 Introducing Service Management 2, 2012, 2012 1 ITIL

More information

Project organisation and establishing a programme management office

Project organisation and establishing a programme management office PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital

More information