SABSA A Brief Introduction
|
|
- Egbert Robbins
- 7 years ago
- Views:
Transcription
1 SABSA A Brief Introduction Mark Battersby
2 Agenda SABSA Overview SABSA Security Architecture SABSA Security Architecture Matrix Operational Security Architecture Matrix SABSA Business Attributes SABSA Strategy and Concept/Design Process SABSA Architecture Development Process SABSA Lifecycle 2011 Capgemini. All rights reserved. 2
3 SABSA Overview The SABSA (Sherwood Applied Business Security Architecture) framework has evolved as a "best practice" method for delivering cohesive information security solutions to enterprises SABSA is a six-layer model covering all four parts of the IT lifecycle: Strategy, Design, Implementation and Management & Operations SABSA ensures the security needs of your enterprise are met completely and that security services are designed, delivered, and supported as an integral part of your IT Management infrastructure SABSA is essentially a model and methodology for developing risk-driven enterprise information security 2011 Capgemini. All rights reserved. 3
4 SABSA Security Architecture Contextual Security Architecture: Business View: Business Risk Model Business Process Model Conceptual Security Architecture: Architects View: Control Objectives Security Strategies & Architecture Logical Security Architecture: Designers View: Security Policies Security Services Physical Security Architecture Builder s view: Security Rules, Practices, Procedures Security Mechanisms Component Security Architecture Tradesman s view: Security Standards Security Products & Tools Operational Security Architecture: Facility Manager s View: Operational Risk Mgmt Security Service Mgmt 2011 Capgemini. All rights reserved.
5 Enterprise Security Architecture Matrix Assets (What) Motivation (Why) Process (How) People (Who) Location (Where) Time (When) Contextual The Business Business Risk Model Business Process Model Business Organization and Relationships Business Geography Business Time Dependencies Conceptual Business Attributes Profile Control Objectives Security Strategies and Architectural Layering Security Entity Model and Trust Framework Security Domain Model Security-Related Lifetimes and Deadlines Logical Business Information Model Security Policies Security Services Entity Schema and Privilege Profiles Security Domain Definitions and Associations Security Processing Cycle Physical Business Data Model Security Rules, Practices and Procedurees Security Mechanisms Users, Applications and the User Interface Platform and Network Infrastructure Control Structure Execution Component Detailed Data Structures Security Standards Security Products and Tools Identities, Functions, Actions and ACLs Processes, Nodes, Addresses and Protocols Security Step Timing and Sequencing Operational Assurance of Operational Continuity Operational Risk Management Security Service Management and Support Application and User Management and Support Security of Sites, Networks and Platforms Security Operations Schedule An IA Architecture is a consistent set of principles, policies and standards that sets the direction and vision for the development and operation of the organisation s communication and information services so that they are aligned with and support the business needs of the organisation in an Assured way 2011 Capgemini. All rights reserved. 5
6 SABSA Operational Security Architecture Matrix 2011 Capgemini. All rights reserved. 6
7 SABSA Business Attributes 2011 Capgemini. All rights reserved. 7
8 SABSA Business Attributes 2011 Capgemini. All rights reserved. 8
9 SABSA Strategy and Concept/Design Process 2011 Capgemini. All rights reserved. 9
10 SABSA Architecture Development Process 2011 Capgemini. All rights reserved. 10
11 SABSA Lifecycle Strategy & Concept Contextual Conceptual Manage & Measure Design Logical, Physical, Component, Operational Attributes defined and measured Implement Copyright SABSA Limited. Printed with permission From: Capgemini. All rights reserved.
12 Questions? 2011 Capgemini. All rights reserved. 12
13 More Information Please contact: Mark Battersby Capgemini. All rights reserved. 13
14 The information contained in this presentation is proprietary Capgemini. All rights reserved
Enterprise Security Architecture
Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture
More informationAn Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview
Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering
More informationEnterprise Architectures (EA) & Security
Enterprise Architectures (EA) & Security A synopsis of current state EA s and enterprise security as an add on Marcel Schlebusch 2013-07-18 mwrinfosecurity.com MWR InfoSecurity mwrinfosecurity.com MWR
More informationSecurity Architecture and Design from a Business/Enterprise Driven Viewpoint
Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry
More informationArchiMate and TOGAF. What is the added value?
ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way
More information1.0 Background and Problem Statement
S-TRAIS: A Method for Security Requirements Engineering Using a Standards- Based Network Security Reference Model (Standards-Traceable Reference Architecture for Information Systems) Peter Stephenson Netigy
More informationEnterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
More informationData Integration Using Universal Data Models and Effective Human Dynamics. Presented by Len Silverston, Universal Data Models, LLC
Data Integration Using Universal Data Models and Effective Human Dynamics Presented by Len Silverston, Universal Data Models, LLC 2009 Universal Data Models, LLC - All Rights Reserved 1 1 Purpose: Share
More informationDeveloping the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
More informationEnterprise Security Architecture
White Paper Enterprise John Sherwood, Andrew Clark & David Lynas Contact: info@sabsa.org Executive Summary SABSA is a methodology for developing risk-driven enterprise information security and information
More informationRUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch
RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the
More informationMITA Information Architecture. May 8, 2006
MITA Information Architecture May 8, 2006 Purpose of the MITA Information Architecture Align information requirements with Medicaid enterprise vision and direction Lower overall life-cycle costs Enable
More informationCOPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
More informationIndependent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.
Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!
More informationSecurity Engineering Approach for the Development of Secure Information Systems
Engineering Approach for the Development of Secure Information Systems Young-Gab Kim and Sungdeok Cha College of Information and Communication, Korea University, 1, 5-ga, Anam-dong, Sungbuk-gu, 136-701,
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationDeveloping an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh
Developing an Architectural Framework towards achieving Cyber Resiliency Presented by Deepak Singh Presentation Content Cyber Threat Landscape Cyber Attack and Threat Profile Cyber Threat Map Cyber Security
More informationApproach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
More informationBackground: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
More informationChap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
More informationManaging the Services Lifecycle SOA & BPM
Managing the Services Lifecycle SOA & BPM Agenda The service Lifecycle what does it look like? Methods and processes for service evolution Supporting tools & techniques Governing the service-cycle Best
More informationRe-Design an Operational Database Author: Sovan Sinha (Business Intelligence Architect) May 4 th, 2009
Re-design an Operational Database Introduction In today s world it is seen that lot of organizations go for a complete re-design of there database. Let s have a look why do we need to technically re-design
More informationEnterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationOracle BI 10g: Analytics Overview
Oracle BI 10g: Analytics Overview Student Guide D50207GC10 Edition 1.0 July 2007 D51731 Copyright 2007, Oracle. All rights reserved. Disclaimer This document contains proprietary information and is protected
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationPractitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
More informationModel Driven Business Architecture. Pete Rivett CTO, Adaptive pete.rivett@adaptive.com
Model Driven Business Architecture Pete Rivett CTO, Adaptive pete.rivett@adaptive.com Copyright Adaptive Ltd. 2001 Outline What is business architecture? User needs Information needs (metamodels) Use of
More informationHigh-level Workshop on Modernization of Official Statistics. Common Statistical Production Architecture
High-level Workshop on Modernization of Official Statistics Nizhni Novgorod, Russian Federation, 10-12 June 2014 Common Statistical Production Architecture Session 1: Standards and Tools for the Modernisation
More informationBuilding Reference Security Architecture
Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect Information Security Too many organizations still
More informationOpen Group SOA Governance. San Diego 2009
Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes
More informationArchitecture Definitions
Architecture Definitions Dana Bredemeyer Bredemeyer Consulting Tel: (812) 335-1653 Fax: (812) 335-1652 Email: dana@bredemeyer.com Web: Ruth Malan Bredemeyer Consulting Tel: (812) 335-1653 Fax: (812) 335-1652
More informationPOLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
More informationMedicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006
Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 CMS has worked with a number of stakeholders over the past two years to
More informationCopyright 2013 wolfssl Inc. All rights reserved. 2
- - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.
More informationRepository-Centric Enterprise Architecture
Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.
More informationDefining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
More informationDer Mythos vom Re-Use
Der Mythos vom Re-Use Was ist dran an der Wiederverwendung? Uwe Friedrichsen, codecentric GmbH SET 2009, Zürich, 5. Mai 2009 Uwe Friedrichsen Architect Consultant Project Manager Coach Software Architecture
More informationObjects and Object Relations Around Business Modelling and Business Architecture. Professor Mark von Rosing
Objects and Object Relations Around Business Modelling and Business Architecture Professor Mark von Rosing Prof. Mark von Rosing Professor BPM & EA Guru Business Transformation Evangelist Internationally
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationExadata in the Retail Sector
Exadata in the Retail Sector Jon Mead Managing Director - Rittman Mead Consulting Agenda Introduction Business Problem Approach Design Considerations Observations Wins Summary Q&A What it is not... Introductions
More informationCisco and VMware Virtualization Planning and Design Service
Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization
More informationApplying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
More informationCAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary
UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 3, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationUsing SOA to Enhance Email Notifications. Rajas Kirtane 8/11/2014
Using SOA to Enhance Email Notifications Rajas Kirtane 8/11/2014 Agenda Introduction Business Challenge Solution Overview Key Learning's Q & A In collaboration with The information contained in this document
More informationSolutions. An introduction to the science & art of system architecture engineering
Solutions Architecture 101 An introduction to the science & art of system architecture engineering » Architecture roles Architecture roles Defining the different types of architect Architecture Roles 2
More informationAutomating the process of building. with BPM Systems
Automating the process of building flexible Web Warehouses with BPM Systems Andrea Delgado, Adriana Marotta Instituto de Computación, Facultad de Ingeniería Universidad de la República, Montevideo, Uruguay
More informationGuy Tozer, Doriq Associates DG Conference Europe 2009
Guy Tozer, Doriq Associates DG Conference Europe 2009 Background Speaker Introduction Audience Profile Purpose and Focus of the Presentation Ground-rules and Capabilities doriq associates 2008 2 Enterprise
More informationStandard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks
Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions
More informationSystem Architecture Review Glossary
AAP Architect ASAI Availability Bulk Mail Business Case Review Change Management Chief Enterprise Architect Application Architecture Planning. Replaced by the SAR (System Architecture Review) process,
More informationThe Role of the Software Architect
IBM Software Group The Role of the Software Architect Peter Eeles peter.eeles@uk.ibm.com 2004 IBM Corporation Agenda Architecture Architect Architecting Requirements Analysis and design Implementation
More informationQueensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
More informationSecurity Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
More informationCustomer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
More informationTechnical Layer (Technical Interoperability) Information Layer (Information Interoperability. Business Layer (Business Process Interoperability)
Layers of Interoperability Technical Layer (Technical Interoperability) Information Layer (Information Interoperability Business Layer (Business Process Interoperability) Information Interoperability Identify
More informationModellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003
Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 20-21 The Unified Process Dynamic dimension Two dimensions Content
More informationWhat an Architect Needs to Know
Corporate Technology What an Architect Needs to Know Experiences from the Siemens Curriculum for Engineers Frank Buschmann Siemens AG Corporate Technology Systems Architecture and Platforms Copyright Siemens
More informationVisual Paradigm product adoption roadmap
Visual Paradigm product adoption roadmap Model-Code-Deploy Platform Easy and Intelligent Business Process Modeler Streamlined Design and Development Environment Access Database with Object- Oriented Technology
More informationConceptual Model for Enterprise Governance. Walter L Wilson
Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2
More informationService Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com
Service Oriented Architecture Based Integration Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com Mike Rosen ACCESS TO THE EXPERTS Consultant Chief Enterprise Architect for service and
More informationSOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
More informationITIL V3 differences from V2
ITIL V3 differences from V2 Stuart Rance FISM, CISSP 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda Overall differences Brief
More informationConcept of Operations for Line of Business Initiatives
Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3
More informationExposing Data as a Service in the Army Enterprise
Exposing as a Service in the Army Enterprise ABSTRACT DoD directives have been urging adoption of a Net-Centric approach toward information sharing, which makes it necessary to streamline the way data
More informationITIL Service Lifecycles and the Project Manager
1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction
More informationBusiness Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA
This article was downloaded by: [188.204.15.66] On: 20 February 2012, At: 01:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer
More informationThe Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies
The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies A White Paper by: Ian Foo Technical Lead, Cisco Systems, Inc. April 2008 Copyright 2008 The Open Group All rights reserved. No
More informationCAPABILITY MATURITY MODEL & ASSESSMENT
ENTERPRISE DATA GOVERNANCE CAPABILITY MATURITY MODEL & ASSESSMENT www.datalynx.com.au Data Governance Data governance is a key mechanism for establishing control of corporate data assets and enhancing
More informationG-Cloud Enterprise Applications for a Mobile Workforce. October 2015. G-Cloud. service definitions
G-Cloud Enterprise Applications for a Mobile Workforce October 2015 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 3 Why Capgemini... 4 Our Approach... 4 Benefits...
More informationPOSITION LOCATION REPORTING RELATIONSHIP
POSITION LOCATION REPORTING RELATIONSHIP Solutions Architect Sydney Managing Architect ORGANISATIONAL CONTEXT The National Health Call Centre Network Ltd (NHCCN), now trading as Healthdirect Australia,
More informationIntegration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
Copyright (c) 2004 Booz Allen Hamilton. All rights reserved 1 Integration of Information Assurance (IA) into DoDAF Architectures Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
More informationBusiness Capability Model A Starting Point for Enterprise Architecture
Business Capability Model A Starting Point for Enterprise Architecture Huw Morgan email: hmorgan@toronto.ca Head Enterprise Architecture City of Toronto, Ontario Canada Salah Sharieh email: Salah@ivedha.com
More informationContents. Acknowledgments
Abstract Acknowledgments Acronyms iii v xiii 1 Introduction 1 1.1 Problems and Motivation 3 1.1.1 Competition by Web/Internet Application Service Providers 3 1.1.2 Web-Telecom Service and Application Convergence
More informationIMPORTANT! THE CONTENT OF THIS DOCUMENT IS THE PROPERTY (IP) OF SHAREPOINTPEOPLE.DK, A DIVISION OF NETMEDIA SOFTWARE APS.
IMPORTANT! THE CONTENT OF THIS DOCUMENT IS THE PROPERTY (IP) OF SHAREPOINTPEOPLE.DK, A DIVISION OF NETMEDIA SOFTWARE APS. THIS DOCUMENT MAY ONLY BE USED FOR INSPIRATIONAL PURPOSES BY THE PERSON IT HAS
More informationEvolv Technology & Support Delivers Platform Updates & Customer Support Insights
Ahead of the Change, Ahead of the Curve Evolv Technology & Support Delivers Platform Updates & Customer Support Insights Craig Lovell VP of Product Development Sandrine Moreau VP of Customer Support Agenda
More informationA Simple Enterprise Security Architecture (SESA): Towards a Pedagogic Architecture for Teaching Cyber Security
A Simple Enterprise Security Architecture (SESA): Towards a Pedagogic Architecture for Teaching Cyber Security Harjinder Singh Lallie E-Security Group, WMG, University of Warwick, Coventry, CV4 7AL, UK,
More informationG-Cloud III Services Service Definition Accenture Cloud Security Services
G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.
More informationCareer Tracks- Information Technology Family
Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services
More informationWHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT
WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT CONTENTS 1. THE NEED FOR DATA GOVERNANCE... 2 2. DATA GOVERNANCE... 2 2.1. Definition... 2 2.2. Responsibilities... 3 3. ACTIVITIES... 6 4. THE
More informationLDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
More informationInnovation Software Landscape
Innovation Software Landscape Analysis of available innovation management tool December 2011 Transform to the power of digital Managing innovation in a more structured way is gaining ground; key focus
More informationGuiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing
Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase
More informationCloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG
Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationOPERATIONAL DATA STORE
OPERATIONAL DATA STORE Reference Roadmap, Plan and the Key Considerations in Cloud, Big data and Virtualization Mainstream - By Amit Soni March, 2015 Summary Traditionally Operational Data Store (ODS)
More informationCharles Betz Enterprise Architect & Author
Charles Betz Enterprise Architect & Author Charlie Betz is Director of Technical Strategy (aka Chief Architect) for a major US telecom and ecommerce hosting provider, currently assigned to one of the largest
More informationThe role of IT in business-led Data Governance. by First San Francisco Partners
The role of IT in business-led Data Governance by First San Francisco Partners 2 It s been said the first step in solving any problem is recognizing there is one. Fortunately today, more and more companies
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationJob Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks
Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary
More informationIncreasing Development Knowledge with EPFC
The Eclipse Process Framework Composer Increasing Development Knowledge with EPFC Are all your developers on the same page? Are they all using the best practices and the same best practices for agile,
More informationCompetency Approach to Human Resource Management
Competency Approach to Human Resource Management What do we mean when we say COMPETENCY? A Competency is an underlying characteristic of a person which enables him /her to deliver superior performance
More informationMASTER OF SOFTWARE ENGINEERING DEGREE TRACKS 1. WEB DEVELOPMENT/JAVA:
MASTER OF SOFTWARE ENGINEERING DEGREE TRACKS Students seeking a professional focus in the Master of Software Engineering program may choose to follow a specific set of courses referred to as a track, that
More informationData Governance and CA ERwin Active Model Templates
Data Governance and CA ERwin Active Model Templates Vani Mishra TechXtend March 19, 2015 ER07 Presenter Bio About the Speaker: Vani is a TechXtend Data Modeling practice manager who has over 10+ years
More informationEnabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
More informationSOA CERTIFIED CONSULTANT
SOA CERTIFIED CONSULTANT (5 Days) A Certified SOA Consultant is required to obtain proficiency in a cross-section of key SOA topic areas, including both conceptual and technical aspects of service-oriented
More informationEnterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood
Enterprise Architecture 101 (Includes numerous samples/ templates produced using TOGAF methodology) Enterprise Architecture Key Question What is Enterprise Architecture? Why Enterprise Architecture? What
More informationThe Tropos and MaSE Agent-Oriented Software Engineering Methodologies. Msury Mahunnah, Tallinn University of Technology
The Tropos and MaSE Agent-Oriented Software Engineering Methodologies Msury Mahunnah, Tallinn University of Technology Mailing list for the course aine.aom@lists.ttu.ee You can join at http://lists.ttu.ee/mailman/listinfo/aine.aom
More informationGuidelines for the Success of a Business Process Management Initiative
Guidelines for the Success of a Business Process Management Initiative Insert Company Logo June 8 th 2012 Agenda Business Process Management Lifecycle Making change sustainable Business Process Governance
More informationEnterprise Security Architecture Concepts and Practice
Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy
More informationELCA Forum 2014 An architecture for building successful Omni-channel IT systems
ELCA Forum 2014 An architecture for building successful Omni-channel IT systems Philipp Oser, Lead Architect Niall Sweeney, Solution Architect September 2014 SPEAKER Philipp Oser Philipp is a Lead Architect
More information