Enterprise Architectures (EA) & Security
|
|
- Imogen Lynch
- 7 years ago
- Views:
Transcription
1 Enterprise Architectures (EA) & Security A synopsis of current state EA s and enterprise security as an add on Marcel Schlebusch mwrinfosecurity.com MWR InfoSecurity mwrinfosecurity.com MWR InfoSecurity 1
2 Something to ponder 9gag.com mwrinfosecurity.com MWR InfoSecurity 2
3 Overview Introduction: Brief history and overview of EA Common problems faced by EA programmes Security as part of EA A comparison of 4 EA frameworks EA trends Literature study An optimist s vision for EA and ESA Conclusion mwrinfosecurity.com MWR InfoSecurity 3
4 Introduction: Brief history and overview of EA 26 Years of EA 1960s and 1970s (Information Architectures) 1987 (John Zachman) 1990s (Term EA, different views start to form) 2000s (Many different approaches to EA emerge) mwrinfosecurity.com MWR InfoSecurity 4
5 Introduction: Brief history and overview of EA... Overview of EA What is Enterprise Architecture? Enables translating business vision into enterprise change Enables management of complexity Purpose/Goals: Effectiveness, Efficiency, Agility, and Durability What is an EA framework? Reference structure that provides models, tools and processes to plan, produce and operate an EA programme mwrinfosecurity.com MWR InfoSecurity 5
6 Common problems faced by EA programmes At the very least, these questions will be addressed: Should my organisation implement an Enterprise Architecture? Which EA framework is the best? We ve spent a fortune on EA, why are we not getting ROI? Why do EA programmes commonly fail? What are the current business trends in EA? How do we get started with EA? mwrinfosecurity.com MWR InfoSecurity 6
7 Security as part of EA Zoom in on Security mwrinfosecurity.com MWR InfoSecurity 7
8 Security as part of EA There are many security standards ISO (BS 7799) NIST rev3 PCI-DSS Etc There are Risk Frameworks RiskIT (Risk framework by ISACA) ISO Etc There are Enterprise Security Architecture (ESA) Frameworks SABSA (Sherwood Applied Business Security Architecture) IAEAF (Information Assurance Enterprise Architectural Framework) OSA (Open security architecture) mwrinfosecurity.com MWR InfoSecurity 8
9 Security as part of EA... Positioning Enterprise Security Architecture Business architecture Goals of ESA: Establish common language Structured management of security complexity Enable business-to-security alignment Traceability to business reqs. Security Architecture Information Architecture Technology architecture mwrinfosecurity.com MWR InfoSecurity 9
10 Security as part of EA... Positioning Enterprise Security Architecture ESA is a subset of EA Stretches across all other Architectures mwrinfosecurity.com MWR InfoSecurity 10
11 Security as part of EA... Business assets Information assets Technology assets mwrinfosecurity.com MWR InfoSecurity 11
12 Security as part of EA... SABSA as an example Risk driven methodology Consists of frameworks, models, methods and processes Free for use by all Overarches all other security standards Everything is driven from an analysis of the business requirements for security The SABSA layered model The SABSA lifecycle mwrinfosecurity.com MWR InfoSecurity 12 Source: SABSA whitepaper
13 Security as part of EA... SABSA as an example Business View Business view of What Business view of Why Business view of How Business view of Who Business view of Where Business view of When Architect s View Designer s View Builder s View The SABSA matrix Tradesman s View Service Manager s View mwrinfosecurity.com MWR InfoSecurity 13 Source: SABSA whitepaper
14 Security as part of EA... The SABSA Matrix Business View Architect s View Designer s View Builder s View Tradesman s View Service Manager s View mwrinfosecurity.com MWR InfoSecurity 14 Source: SABSA whitepaper
15 Security as part of EA... SABSA as an example The SABSA Business Attributes mwrinfosecurity.com MWR InfoSecurity 15 Source: SABSA whitepaper
16 A comparison of 4 EA frameworks Zoom out back to the Enterprise mwrinfosecurity.com MWR InfoSecurity 16
17 A comparison of 4 EA frameworks Over the past decade many EA approaches have emerged, 4 are leading the pack: 1. Zachman framework for EA 2. The Open Group Architecture Framework (TOGAF) 3. Federal Enterprise Architecture (FEA) 4. Gartner Enterprise Architecture Framework mwrinfosecurity.com MWR InfoSecurity 17
18 A comparison of 4 EA frameworks... In comparing these frameworks, the following will be shown: 1. A summary/overview of each framework 2. A score-sheet, directly comparing the frameworks 3. Some usage statistics (mostly from USA and Europe) mwrinfosecurity.com MWR InfoSecurity 18
19 A comparison of 4 EA frameworks... Zachman framework for EA Taxonomy Categorising deliverables Planning tool Views & view-points Also: Limited usefulness as EA History in manufacturing Broad acceptance mwrinfosecurity.com MWR InfoSecurity 19
20 A comparison of 4 EA frameworks... The ARCHITECT John Sherwood John Zachman SABSA VS. 6 x 6 matrix Views View-points Enterprise Security Framework Enterprise Framework mwrinfosecurity.com MWR InfoSecurity 20
21 A comparison of 4 EA frameworks... TOGAF Process driven (via ADM) Enterprise Continuum (general -> specific) Technical reference models (TRM) Standards information bases (SIB) Also: Holistic perspective History in defence Broad acceptance mwrinfosecurity.com MWR InfoSecurity 21
22 A comparison of 4 EA frameworks... FEA Segmented enterprise 5 Reference models Development process Planning and communication tool Also: Holistic perspective US-Gov Standard Broad US-Gov acceptance mwrinfosecurity.com MWR InfoSecurity 22
23 A comparison of 4 EA frameworks... Gartner Better described as a practice EA as a service to large enterprises mwrinfosecurity.com MWR InfoSecurity 23
24 A comparison of 4 EA frameworks... Score-sheet (2007) Rating Scale: 1. Very poor Public 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 24
25 A comparison of 4 EA frameworks... Score-sheet (2012) Rating Scale: 1. Very poor Public 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 25
26 A comparison of EA frameworks: Usage survey 2003 Organisation's Own None Zachman Other TOGAF Source: Capgemini EA survey % 5% 10% 15% 20% 25% 30% 35% 40% mwrinfosecurity.com MWR InfoSecurity 26
27 A comparison of EA frameworks: Usage survey 2012 Organisation's Own TOGAF Pragmatic EA Other MoDAF Zachman None FEA Source: Ovum EA survey % 5% 10% 15% 20% 25% mwrinfosecurity.com MWR InfoSecurity 27
28 EA trends: Literature study Gartner: Analysts predict that 95% of organisations will support multiple approaches to EA by 2015 By 2020 the majority of Global 1000 organisations will support EA as a distinct discipline To prepare for 2020, Gartner advises to: Ensure that EA practices are driven by the business direction EA should lead from the top, and be driven from the top Use EA to predict the impact of investment decisions Source: Gartner EA Hype Cycle 2012 mwrinfosecurity.com MWR InfoSecurity 28
29 EA trends: Literature study (Gartner EA Hype Cycle 2012) mwrinfosecurity.com MWR InfoSecurity 29
30 EA trends: Literature study The blended approach to EA Gartner identifies different approaches to EA Traditional Top down approach Federated Useful for larger organisations Middle-Out Most dynamic approach Managed Diversity Option based approach A true "blended" approach is one whereby the enterprise architecture (EA) team determines the appropriate mix of above EA approaches based on business-outcomedriven decision criteria. Source: Gartner EA Hype Cycle 2012 mwrinfosecurity.com MWR InfoSecurity 30
31 EA trends: Literature study Oracle Survey What does a partially successful or unsuccessful implementation look like? Isolation Trap Optimised An EA Maturity representation Enterprise Architecture Losing Fragmented Solution Architecture Source: Oracle EA survey mwrinfosecurity.com MWR InfoSecurity 31
32 An optimist s view of EA and ESA... The blended approach Rating Scale: 1. Very Public poor 2. Inadequate 3. Acceptable 4. Very Good Criteria Zachman TOGAF FEA Gartner Taxonomy Completeness Process Completeness Reference Model Guidance Practise Guidance SECURITY, of course Maturity Model Business Focus Governance Guidance Partitioning Guidance Prescriptive Catalogue Vendor Neutrality Information Availability Time to Value mwrinfosecurity.com MWR InfoSecurity 32
33 An optimist s view of EA and ESA... The blended approach Gartner SABSA TOGAF Zachman Requirements Definition a Process a a Goals and Artefacts a a mwrinfosecurity.com MWR InfoSecurity 33
34 An optimist s view of EA and ESA... The blended approach SABSA and TOGAF integration mwrinfosecurity.com MWR InfoSecurity 34
35 An optimist s view of EA and ESA... The blended approach Are we not increasing the complexity? mwrinfosecurity.com MWR InfoSecurity 35
36 An optimist s view of EA and ESA... The ideal state Market leading Strategic SECURE Compliant Competitive Cost effective Dynamic Efficient Documented Intelligent mwrinfosecurity.com MWR InfoSecurity 36
37 Conclusion For organisations practicing EA and ESA: EA and ESA are tools for change It takes time (track maturity) EA is not an IT function Drive from the top! Be open to a blended approach Include security here For EA and ESA professionals: Understand that ESA delivers into EA Manage expectations (long term value) The value of EA careers are increasing Be skilled in multiple frameworks mwrinfosecurity.com MWR InfoSecurity 37
38 Conclusion At the very least, these questions will be addressed: Should my organisation implement an Enterprise Architecture? -YES Which EA framework is the best? - BLEND We ve spent a fortune on EA, why are we not getting ROI? It takes time, but measure the maturity of your programme, and re-focus efforts on delivering business value Why do EA programmes commonly fail? Not driven from the top or focus shifts to shorter term solutions architecture What are the current business trends in EA? Blended EA approaches and EA tools How do we get started with EA? Combine Zachman, TOGAF and SABSA and let the TOGAF ADM guide your process mwrinfosecurity.com MWR InfoSecurity 38
39 mwrinfosecurity.com MWR InfoSecurity 39
40 References: [1] Article: A Comparison of the Top Four Enterprise-Architecture Methodologies by Roger Sessions [2] White-paper: A Comparison of the Five Major Enterprise Architecture Methodologies [3] Ovum Research: Amongst others: [4] Gartner: Hype Cycle for Enterprise Architecture, 2012 [5] TOGAF: [6] Whitepaper: The Oracle Enterprise Architecture Framework (Oracle October 2009) [7] Whitepaper: Enterprise Security Architecture [8] Whitepaper: TOGAF and SABSA Integration The Open Group (October 2011) mwrinfosecurity.com MWR InfoSecurity 40
An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview
Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering
More informationSABSA A Brief Introduction
SABSA A Brief Introduction Mark Battersby 2013-05-15 Agenda SABSA Overview SABSA Security Architecture SABSA Security Architecture Matrix Operational Security Architecture Matrix SABSA Business Attributes
More informationDeveloping the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
More informationEnterprise Architecture Roles in Delivering Business Capabilities
Enterprise Architecture Roles in Delivering Business Capabilities Alecia Heng Committee, IASA Malaysia President, Gorgeous Geeks, SIG IASA Malaysia Chief Business Architect, ATD Solution/ATD Learning Asia
More informationEnterprise Security Architecture
Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture
More informationEnterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationModule F13 The TOGAF Certification for People Program
Module F13 The TOGAF Certification for People Program V9.1 Edition Copyright 010-011 Slide 1 of All rights reserved Published by The Open Group, 011 The TOGAF Certification for People Program Slide of
More informationSecurity Architecture and Design from a Business/Enterprise Driven Viewpoint
Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry
More informationThe Perusal and Review of Different Aspects of the Architecture of Information Security
The Perusal and Review of Different Aspects of the Architecture of Information Security Vipin Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract The purpose of the security architecture
More informationSetting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
More informationManaging Change Using Enterprise Architecture
Managing Change Using Enterprise Architecture Abdallah El Kadi, PMP, CISSP, TOGAF Chief Executive Officer, Shift Technologies Managing Director, Open Group Arabia Email: Abdallah.Kadi@awrostamani.com Website:
More informationBackground: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
More informationThe Open Group Architectural Framework
The Open Group Architectural Framework Background TOGAF is a step-by-step method for developing an enterprise architecture, using a set of prescribed tools. It is freely available on the Open Group website
More informationAgile and Enterprise Architecture
08 Experience, Intelligence, Pragmatism, Commitment. Always striving to ensure outstanding delivery Agile and Enterprise Architecture Steve Marchant July 2013 Abstract The IT industry is evolving at an
More informationBusiness Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA
This article was downloaded by: [188.204.15.66] On: 20 February 2012, At: 01:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer
More informationEnterprise Architecture Management. Prof. Dr. Knut Hinkelmann MSc Business Information Systems
Literature This chapter is based on the following literature: F. Ahlemann et al. (eds.), Strategic Enterprise Architecture Management: Challenges, Best Practices, and Future Developments, Springer-Verlag
More informationENTERPRISE ARCHITECTURE AS THE CORE ENGINE FOR SUCCESSFUL BUSINESS TECHNOLOGY TRANSFORMATION
ENTERPRISE ARCHITECTURE AS THE CORE ENGINE FOR SUCCESSFUL BUSINESS TECHNOLOGY TRANSFORMATION Aaron Tan Dani aarontan@atdsolution.com / aarontan@iasahome.org Founder and Chairman, IASA Asia Pacific Chief
More informationSisyphus Would Be Proud
Ten Best Practices of EA Anne Lapkin Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must be
More informationAvancier Reference Model
Reference Model Architecture Context/Precursors (ESA 2) It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission of the copyright
More informationSOA: The missing link between Enterprise Architecture and Solution Architecture
SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing
More informationSolutions. An introduction to the science & art of system architecture engineering
Solutions Architecture 101 An introduction to the science & art of system architecture engineering » Architecture roles Architecture roles Defining the different types of architect Architecture Roles 2
More informationThe Open Group 2011. Cloud Work Group
The Open Group Cloud Work Group 18 May 2011 Heather Kreger SOA WG co-chair Liaison for SOA, Cloud IBM Cornwallis Rd B062, M307 Research Triangle Park, NC Tel 919-496-9572 Kreger@us.ibm.com www.opengroup.org
More informationWHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101
WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA
More informationHow to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationEnterprise Architecture: A Governance Framework
Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationFrom Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network
From Capability-Based Planning to Competitive Advantage Assembling Your Business Transformation Value Network Marc Lankhorst, BiZZdesign Iver Band, Cambia Health Solutions INTRODUCTIONS 2 1 Marc Lankhorst
More informationEA vs ITSM. itsmf 15.4.2014
EA vs ITSM itsmf 15.4.2014 EA vs ITSM SH Needs Business Goals 2 GOVERNANCE EVALUATE PLANNING ITSM IMPROVING OPERATING Business Programs Projects DEVELOPING EA IMPLEMENTING What is an enterprise in the
More informationJob Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks
Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary
More informationCOBIT 5 Introduction. 28 February 2012
COBIT 5 Introduction 28 February 2012 COBIT 5 Executive Summary 2012 ISACA. All rights reserved. 2 Information! Information is a key resource for all enterprises. Information is created, used, retained,
More informationITIL V3 - The Future Is Here
ITIL V3 - The Future Is Here Copyright Notice Copyright Axios Systems 2007. The information, which is contained in this document, is the property of Axios Systems. The contents of the document must not
More informationArchitecting enterprise BPM systems for optimal agility
Architecting enterprise BPM systems for optimal agility Dr Alexander Samarin www.samarin.biz About me An enterprise solutions architect From a programmer to a systems architect Experience in scientific,
More informationWhite Paper What Solutions Architects Should Know About The TOGAF ADM
White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently
More informationDevelopment of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and
More informationEnterprise Architecture (EA) is the blueprint
SETLabs Briefings VOL 6 NO 4 2008 Building Blocks for Enterprise Business Architecture By Eswar Ganesan and Ramesh Paturi A unified meta-model of elements can lead to effective business analysis Enterprise
More informationPractice Description Business process management and enterprise architecture
Practice Description Business process management and enterprise architecture 1. Description of the practice The BPM & EA practice assists organisations in 1 keeping in control of the performance of their
More informationGrowth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
More informationTOGAF overview and relation
TOGAF overview and relation with ITIL3 ITSMF Egypt Tom van Sante Supplier representative boardmember tom.vansante@kpn.com Thames Tower, 37-45 Station Road, Reading, RG1 1LX United Kingdom Tel +44 118 950
More informationApproach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
More informationITC 19 th November 2015 Creation of Enterprise Architecture Practice
ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG
More informationCriticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation
More informationA Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB 76131 Karlsruhe,
More informationPOSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I
POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I THE POSITION The Enterprise Architect will be supporting the Experian Consumer Services UK&I Architecture functions and processes. The Enterprise Architect
More informationSOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
More informationGovernment Enterprise Architecture
Government Enterprise Architecture GEA-NZ v3.0 Context Document September 2014 Crown copyright. This copyright work is licensed under the Creative Commons Attribution 3.0 New Zealand licence. In essence,
More informationVisualizing the Business Impact of Technical Cyber Risks
Visualizing the Business Impact of Technical Cyber Risks May 21, 2014 Henk Jonkers Senior Research Consultant, BiZZdesign Agenda Introduction and problem statement Enterprise Architecture with ArchiMate
More informationHow To Compare Itil To Togaf
ITSM vs EA KAOS ITSM vs EA SH Needs Business Goals 2 GOVERNANCE EVALUATE PLANNING ITSM IMPROVING OPERATING Business Programs Projects DEVELOPING EA IMPLEMENTING IT service - ITIL 3 Lifecycle approach Service
More informationThe Cornwell Enterprise Architecture Maturity Dashboard
The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard
More informationBenefits of the SAP Enterprise Architecture Framework for Enterprise SOA
Benefits of the SAP Enterprise Framework for Enterprise SOA Franck Lopez Global Director, Enterprise & Enterprise SOA Portfolio SAP Field Services, Global Strategic Initiatives TechTour 07, Philadelphia,
More informationSUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
More informationGovernment-wide Enterprise Architecture In KOREA. National Computerization Agency
Government-wide Enterprise Architecture In KOREA Content 1. About NCA 2. Works on Enterprise Architecture 3. Government-wide Enterprise Archtecture Framework 4. Comparison with TOGAF 5. Future Work 2 About
More informationSAP Enterprise Architecture Framework Unveiled: Aligning IT to the Business
SAP Enterprise Framework Unveiled: Aligning IT to the Business Franck Lopez Global Director, Enterprise & Enterprise SOA Portfolio SAP Field Services, Global Strategic Initiatives TechTour 07, Palo Alto,
More informationBPM case study: Competency Centre in a large Swiss bank
mwd a d v i s o r s Best Practice Insight BPM case study: Competency Centre in a large Swiss bank Neil Ward-Dutton Premium Advisory Report October 2010 This report examines the implementation of a BPM
More informationAgenda. Seda Overview Seda EA Project Requirements Enterprise Architecture Approach
Seda Case Study "To effectively communicate, we must realize that we are all different in the way we perceive the world and use this understanding as a guide to our communication with others." -- Tony
More informationIntegrated Performance Management
How is it aligned with shareholder value? White paper, Business Consulting 1 Introduction In order to enhance shareholder value and align employees efforts with this overarching objective, businesses have
More information1.0 Background and Problem Statement
S-TRAIS: A Method for Security Requirements Engineering Using a Standards- Based Network Security Reference Model (Standards-Traceable Reference Architecture for Information Systems) Peter Stephenson Netigy
More informationFive Core Principles of Successful Business Architecture
Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core
More informationPractitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
More informationA COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKS Lise Urbaczewski, Eastern Michigan University, lurbacze@emich.edu Stevan Mrdalj, Eastern Michigan University, smrdalj@emich.edu ABSTRACT An Enterprise
More informationSecurity Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
More informationINFORMATION TECHNOLOGY FLASH REPORT
INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally
More informationESKITP5022 Software Development Level 2 Role
Overview This sub discipline covers the core competencies required to create software to address the needs of business problems and opportunities, resulting in a variety of software solutions, ranging
More informationEnterprise Architecture Service
Service Service Definition Government Procurement Service - G-Cloud III Services - Q-LOT4-13 February 2013 Contact: GCloud@sapient.com Service Contents Contents 01 Executive Summary...3 02 Service...4
More informationAdvanced Topics for TOGAF Integrated Management Framework
Instructor: Robert Weisman MSc, PEng, PMP CD Robert.weisman@buildthevision.ca Advanced Topics for TOGAF Integrated Management Framework ROBERT WEISMAN CEO BUILD THE VISION, INC. WWW.BUILDTHEVISION.CA EMAIL:
More informationReal-time: changing the billing landscape
Real-time: changing the billing landscape Intelligent Next Generation Billing Congress Berlin, November 2006 Eirwen Nichols, Principal Analyst Email: eirwen.nichols@ovum.com Direct line: +44(0)20 7551
More informationHow Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008
How Managed Services Has Changed Remote Infrastructure Management Presented by: Bill Whitney March 26, 2008 Why are businesses looking to partners such as Managed Service Providers (MSPs) for remote infrastructure
More informationThe Value of the Project Management Office. March 2009 A survey conducted by Pole to Pole Communications, on behalf of CA
The Value of the Project Management Office March 2009 A survey conducted by Pole to Pole Communications, on behalf of CA CONTENTS THE VALUE OF THE PROJECT MANAGEMENT OFFICE 02 Contents 1.0 Survey highlights
More informationArchiMate and TOGAF. What is the added value?
ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way
More informationIncreasing the Role (and Impact) of BPM in Your Organization. Taking BPM and BPMS enabled BPM to the next level
Increasing the Role (and Impact) of BPM in Your Organization Taking BPM and BPMS enabled BPM to the next level Dan Morris Thought Leadership Author business transformation books PEX Columnist since 2011
More informationTOGAF. TOGAF & Major IT Frameworks, Architecting the Family. by Danny Greefhorst, MSc., Director of ArchiXL. IT Governance and Strategy
TOGAF TOGAF & Major IT Frameworks, Architecting the Family by Danny Greefhorst, MSc., Director of ArchiXL TOGAF is a registered trademark of The Open Group. Copyright 2013 ITpreneurs. All rights reserved.
More informationAdapting an Enterprise Architecture for Business Intelligence
Adapting an Enterprise Architecture for Business Intelligence Pascal von Bergen 1, Knut Hinkelmann 2, Hans Friedrich Witschel 2 1 IT-Logix, Schwarzenburgstr. 11, CH-3007 Bern 2 Fachhochschule Nordwestschweiz,
More informationA Ready Business has total visibility and control. Seamlessly manage your global telecommuncations in a secure environment
A Ready Business has total visibility and control Seamlessly manage your global telecommuncations in a secure environment 2 We live in a world of rapid and unpredictable change 22% Only 22% of businesses
More informationPractical meta data solutions for the large data warehouse
K N I G H T S B R I D G E Practical meta data solutions for the large data warehouse PERFORMANCE that empowers August 21, 2002 ACS Boston National Meeting Chemical Information Division www.knightsbridge.com
More informationWhy Data Governance - 1 -
Data Governance Why Data Governance - 1 - Industry: Lack of Data Governance is a Key Issue Faced During Projects As projects address process improvements, they encounter unidentified data processes that
More informationA Comparison of Common Business Modeling Approaches to GODS Generic Business Architecture
A Comparison of Common Business Modeling Approaches to GODS Generic Business Architecture Adrian Grigoriu Contents GODS single page generic Business Architecture (gba), in brief... 2 Mapping scope and
More informationDESIGNING SECURE ENTERPRISE ARCHITECTURES. A comprehensive approach: framework, method, and modelling language
DESIGNING SECURE ENTERPRISE ARCHITECTURES A comprehensive approach: framework, method, and modelling language I II MASTER THESIS SANDER VAN DEN BOSCH DESIGNING SECURE ENTERPRISE ARCHITECTURES Enschede,
More informationIllustrations and Answers for TDT4252 exam, June 2012. Sobah Abbas Petersen IDI/NTNU
Illustrations and Answers for TDT4252 exam, June 2012 Sobah Abbas Petersen IDI/NTNU 1 1. Enterprise Architecture 1a. main role of an Enterprise Architecture: to bridge the business strategy and IT strategy
More informationData analytics the changing use of data within Internal Audit
Data analytics the changing use of data within Internal Kiran Sudhakar Associate Director, Grant Thornton UK Overview Areas of discussion Introduction Common questions asked Evolution of data analytics
More informationPatrick Bossert Director of Asset Information September 2014. patrick.bossert@networkrail.co.uk
Patrick Bossert Director of Asset Information September 2014 patrick.bossert@networkrail.co.uk Asset Information Offering Rail Better Information Services Purpose: Provide trusted asset-related information
More informationSoftware Development in the Large!
Software Development in the Large! Peter Eeles Executive IT Architect, IBM peter.eeles@uk.ibm.com IBM Rational Software Development Conference 2007 2007 IBM Corporation Agenda IBM Rational Software Development
More informationWhy Two Thirds of Enterprise Architecture Projects Fail
Why Two Thirds of Enterprise Architecture Projects Fail An explanation for the limited success of architecture projects Sven Roeleven Solution Manager Business White Paper December 2010 Contents Introduction
More informationJudith Jones Architecting-the-Enterprise
Developing Developing ure ure Skills Skills In this session we will explore the architecture role and skills of Enterprise ure the TOGAF Skills Framework and varieties of s Is your organisation up to the
More informationExtended Enterprise Architecture Framework Essentials Guide
Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve
More informationSetting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework
Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework Karoline Westerlund, IT-strategist Umeå University, Sweden retirement Service Catalogue Defined framework Formalized
More informationAligning TOGAF and NAF Experiences from the Norwegian Armed Forces
Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces Håvard D. Jørgensen 1, Tore Liland 2, Stein Skogvold 3 1 Commitment AS, PO Box 534, N-1327 Lysaker, Norway 2 Norwegian Defence Logistics
More informationGobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI
Gobierno de TI Enfrentando al Reto IT Facing the Challenge Everett C. Johnson, CPA International President ISACA and ITGI 1 Add titles Agenda Agenda IT governance keys IT governance focus areas: theory
More informationDigital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions
Digital Asset the way we see it Digital Asset Delivering greater value from your assets by using better asset information to improve investment decisions In its recent survey on the UK economy, the OECD
More informationProtecting Malaysia in the Connected world
Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE
More informationWhite Paper An Enterprise Security Program and Architecture to Support Business Drivers
White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security
More informationSparx Systems Enterprise Architect for Team Players
Course Description 4 day - expert led onsite training and hands-on workshops Experience hands-on modeling and learn how to use Enterprise Architect with your next project. Discover surprising ways to improve
More informationKey Account Management
Key Account Management Brent Warren What is KAM? the art of developing long-term relationships with selected customers The Financial Times. KAM is an art not a formula. It is a process of development,
More information, Head of IT Strategy and Architecture. Application and Integration Strategy
IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL
More informationOMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study
OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study Michael Guttman CTO, The Voyant Group mguttman@thevoyantgroup.com Overview of Voyant H.Q. West Chester, PA Business
More informationEnterprise Architecture Review
Enterprise Architecture Review Arquitectura multivapa mediante Ajax y ORM Héctor Arturo Flórez Fernández * Fecha de recepción: octubre 29 de 2010 Fecha de aceptación: noviembre 23 de 2010 Abstract Enterprise
More informationSHAREPOINT SOLUTIONS
SHAREPOINT SHAREPOINT SOLUTIONS Connected Systems is one of Australia s premier SharePoint Services practice and has extensive SharePoint expertise in the following areas: Strategic Consulting (Information
More informationG-Cloud III Services Service Definition Accenture Cloud Security Services
G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.
More informationIntegrating an ITILv3 Service Management Architecture into Business Architectures
Integrating an ITILv3 Service Management Architecture into Business Architectures Key Challenges experienced and Lessons Learned Trevor Lea-Cox, 2011 1 Introducing Service Management 2, 2012, 2012 1 ITIL
More informationProject organisation and establishing a programme management office
PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital
More information