SABSA A Brief Introduction

Size: px
Start display at page:

Download "SABSA A Brief Introduction"

Transcription

1 SABSA A Brief Introduction Mark Battersby

2 Agenda SABSA Overview SABSA Security Architecture SABSA Security Architecture Matrix Operational Security Architecture Matrix SABSA Business Attributes SABSA Strategy and Concept/Design Process SABSA Architecture Development Process SABSA Lifecycle 2011 Capgemini. All rights reserved. 2

3 SABSA Overview The SABSA (Sherwood Applied Business Security Architecture) framework has evolved as a "best practice" method for delivering cohesive information security solutions to enterprises SABSA is a six-layer model covering all four parts of the IT lifecycle: Strategy, Design, Implementation and Management & Operations SABSA ensures the security needs of your enterprise are met completely and that security services are designed, delivered, and supported as an integral part of your IT Management infrastructure SABSA is essentially a model and methodology for developing risk-driven enterprise information security 2011 Capgemini. All rights reserved. 3

4 SABSA Security Architecture Contextual Security Architecture: Business View: Business Risk Model Business Process Model Conceptual Security Architecture: Architects View: Control Objectives Security Strategies & Architecture Logical Security Architecture: Designers View: Security Policies Security Services Physical Security Architecture Builder s view: Security Rules, Practices, Procedures Security Mechanisms Component Security Architecture Tradesman s view: Security Standards Security Products & Tools Operational Security Architecture: Facility Manager s View: Operational Risk Mgmt Security Service Mgmt 2011 Capgemini. All rights reserved.

5 Enterprise Security Architecture Matrix Assets (What) Motivation (Why) Process (How) People (Who) Location (Where) Time (When) Contextual The Business Business Risk Model Business Process Model Business Organization and Relationships Business Geography Business Time Dependencies Conceptual Business Attributes Profile Control Objectives Security Strategies and Architectural Layering Security Entity Model and Trust Framework Security Domain Model Security-Related Lifetimes and Deadlines Logical Business Information Model Security Policies Security Services Entity Schema and Privilege Profiles Security Domain Definitions and Associations Security Processing Cycle Physical Business Data Model Security Rules, Practices and Procedurees Security Mechanisms Users, Applications and the User Interface Platform and Network Infrastructure Control Structure Execution Component Detailed Data Structures Security Standards Security Products and Tools Identities, Functions, Actions and ACLs Processes, Nodes, Addresses and Protocols Security Step Timing and Sequencing Operational Assurance of Operational Continuity Operational Risk Management Security Service Management and Support Application and User Management and Support Security of Sites, Networks and Platforms Security Operations Schedule An IA Architecture is a consistent set of principles, policies and standards that sets the direction and vision for the development and operation of the organisation s communication and information services so that they are aligned with and support the business needs of the organisation in an Assured way 2011 Capgemini. All rights reserved. 5

6 SABSA Operational Security Architecture Matrix 2011 Capgemini. All rights reserved. 6

7 SABSA Business Attributes 2011 Capgemini. All rights reserved. 7

8 SABSA Business Attributes 2011 Capgemini. All rights reserved. 8

9 SABSA Strategy and Concept/Design Process 2011 Capgemini. All rights reserved. 9

10 SABSA Architecture Development Process 2011 Capgemini. All rights reserved. 10

11 SABSA Lifecycle Strategy & Concept Contextual Conceptual Manage & Measure Design Logical, Physical, Component, Operational Attributes defined and measured Implement Copyright SABSA Limited. Printed with permission From: Capgemini. All rights reserved.

12 Questions? 2011 Capgemini. All rights reserved. 12

13 More Information Please contact: Mark Battersby Capgemini. All rights reserved. 13

14 The information contained in this presentation is proprietary Capgemini. All rights reserved

Enterprise Security Architecture

Enterprise Security Architecture Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture

More information

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering

More information

Enterprise Architectures (EA) & Security

Enterprise Architectures (EA) & Security Enterprise Architectures (EA) & Security A synopsis of current state EA s and enterprise security as an add on Marcel Schlebusch 2013-07-18 mwrinfosecurity.com MWR InfoSecurity mwrinfosecurity.com MWR

More information

Security Architecture and Design from a Business/Enterprise Driven Viewpoint

Security Architecture and Design from a Business/Enterprise Driven Viewpoint Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry

More information

ArchiMate and TOGAF. What is the added value?

ArchiMate and TOGAF. What is the added value? ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way

More information

1.0 Background and Problem Statement

1.0 Background and Problem Statement S-TRAIS: A Method for Security Requirements Engineering Using a Standards- Based Network Security Reference Model (Standards-Traceable Reference Architecture for Information Systems) Peter Stephenson Netigy

More information

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013 Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of

More information

Data Integration Using Universal Data Models and Effective Human Dynamics. Presented by Len Silverston, Universal Data Models, LLC

Data Integration Using Universal Data Models and Effective Human Dynamics. Presented by Len Silverston, Universal Data Models, LLC Data Integration Using Universal Data Models and Effective Human Dynamics Presented by Len Silverston, Universal Data Models, LLC 2009 Universal Data Models, LLC - All Rights Reserved 1 1 Purpose: Share

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

Enterprise Security Architecture

Enterprise Security Architecture White Paper Enterprise John Sherwood, Andrew Clark & David Lynas Contact: info@sabsa.org Executive Summary SABSA is a methodology for developing risk-driven enterprise information security and information

More information

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the

More information

MITA Information Architecture. May 8, 2006

MITA Information Architecture. May 8, 2006 MITA Information Architecture May 8, 2006 Purpose of the MITA Information Architecture Align information requirements with Medicaid enterprise vision and direction Lower overall life-cycle costs Enable

More information

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5

More information

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum. Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!

More information

Security Engineering Approach for the Development of Secure Information Systems

Security Engineering Approach for the Development of Secure Information Systems Engineering Approach for the Development of Secure Information Systems Young-Gab Kim and Sungdeok Cha College of Information and Communication, Korea University, 1, 5-ga, Anam-dong, Sungbuk-gu, 136-701,

More information

Federal Enterprise Architecture and Service-Oriented Architecture

Federal Enterprise Architecture and Service-Oriented Architecture Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010

More information

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh Developing an Architectural Framework towards achieving Cyber Resiliency Presented by Deepak Singh Presentation Content Cyber Threat Landscape Cyber Attack and Threat Profile Cyber Threat Map Cyber Security

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

Managing the Services Lifecycle SOA & BPM

Managing the Services Lifecycle SOA & BPM Managing the Services Lifecycle SOA & BPM Agenda The service Lifecycle what does it look like? Methods and processes for service evolution Supporting tools & techniques Governing the service-cycle Best

More information

Re-Design an Operational Database Author: Sovan Sinha (Business Intelligence Architect) May 4 th, 2009

Re-Design an Operational Database Author: Sovan Sinha (Business Intelligence Architect) May 4 th, 2009 Re-design an Operational Database Introduction In today s world it is seen that lot of organizations go for a complete re-design of there database. Let s have a look why do we need to technically re-design

More information

Enterprise Architecture Assessment Guide

Enterprise Architecture Assessment Guide Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Oracle BI 10g: Analytics Overview

Oracle BI 10g: Analytics Overview Oracle BI 10g: Analytics Overview Student Guide D50207GC10 Edition 1.0 July 2007 D51731 Copyright 2007, Oracle. All rights reserved. Disclaimer This document contains proprietary information and is protected

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Model Driven Business Architecture. Pete Rivett CTO, Adaptive pete.rivett@adaptive.com

Model Driven Business Architecture. Pete Rivett CTO, Adaptive pete.rivett@adaptive.com Model Driven Business Architecture Pete Rivett CTO, Adaptive pete.rivett@adaptive.com Copyright Adaptive Ltd. 2001 Outline What is business architecture? User needs Information needs (metamodels) Use of

More information

High-level Workshop on Modernization of Official Statistics. Common Statistical Production Architecture

High-level Workshop on Modernization of Official Statistics. Common Statistical Production Architecture High-level Workshop on Modernization of Official Statistics Nizhni Novgorod, Russian Federation, 10-12 June 2014 Common Statistical Production Architecture Session 1: Standards and Tools for the Modernisation

More information

Building Reference Security Architecture

Building Reference Security Architecture Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect Information Security Too many organizations still

More information

Open Group SOA Governance. San Diego 2009

Open Group SOA Governance. San Diego 2009 Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes

More information

Architecture Definitions

Architecture Definitions Architecture Definitions Dana Bredemeyer Bredemeyer Consulting Tel: (812) 335-1653 Fax: (812) 335-1652 Email: dana@bredemeyer.com Web: Ruth Malan Bredemeyer Consulting Tel: (812) 335-1653 Fax: (812) 335-1652

More information

POLAR IT SERVICES. Business Intelligence Project Methodology

POLAR IT SERVICES. Business Intelligence Project Methodology POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...

More information

Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006

Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 CMS has worked with a number of stakeholders over the past two years to

More information

Copyright 2013 wolfssl Inc. All rights reserved. 2

Copyright 2013 wolfssl Inc. All rights reserved. 2 - - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.

More information

Repository-Centric Enterprise Architecture

Repository-Centric Enterprise Architecture Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.

More information

Defining a Secure Mobile Framework Architecture at DHA

Defining a Secure Mobile Framework Architecture at DHA Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA

More information

Der Mythos vom Re-Use

Der Mythos vom Re-Use Der Mythos vom Re-Use Was ist dran an der Wiederverwendung? Uwe Friedrichsen, codecentric GmbH SET 2009, Zürich, 5. Mai 2009 Uwe Friedrichsen Architect Consultant Project Manager Coach Software Architecture

More information

Objects and Object Relations Around Business Modelling and Business Architecture. Professor Mark von Rosing

Objects and Object Relations Around Business Modelling and Business Architecture. Professor Mark von Rosing Objects and Object Relations Around Business Modelling and Business Architecture Professor Mark von Rosing Prof. Mark von Rosing Professor BPM & EA Guru Business Transformation Evangelist Internationally

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Exadata in the Retail Sector

Exadata in the Retail Sector Exadata in the Retail Sector Jon Mead Managing Director - Rittman Mead Consulting Agenda Introduction Business Problem Approach Design Considerations Observations Wins Summary Q&A What it is not... Introductions

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

Applying 4+1 View Architecture with UML 2. White Paper

Applying 4+1 View Architecture with UML 2. White Paper Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was

More information

CAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary

CAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 3, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Using SOA to Enhance Email Notifications. Rajas Kirtane 8/11/2014

Using SOA to Enhance Email Notifications. Rajas Kirtane 8/11/2014 Using SOA to Enhance Email Notifications Rajas Kirtane 8/11/2014 Agenda Introduction Business Challenge Solution Overview Key Learning's Q & A In collaboration with The information contained in this document

More information

Solutions. An introduction to the science & art of system architecture engineering

Solutions. An introduction to the science & art of system architecture engineering Solutions Architecture 101 An introduction to the science & art of system architecture engineering » Architecture roles Architecture roles Defining the different types of architect Architecture Roles 2

More information

Automating the process of building. with BPM Systems

Automating the process of building. with BPM Systems Automating the process of building flexible Web Warehouses with BPM Systems Andrea Delgado, Adriana Marotta Instituto de Computación, Facultad de Ingeniería Universidad de la República, Montevideo, Uruguay

More information

Guy Tozer, Doriq Associates DG Conference Europe 2009

Guy Tozer, Doriq Associates DG Conference Europe 2009 Guy Tozer, Doriq Associates DG Conference Europe 2009 Background Speaker Introduction Audience Profile Purpose and Focus of the Presentation Ground-rules and Capabilities doriq associates 2008 2 Enterprise

More information

Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks

Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions

More information

System Architecture Review Glossary

System Architecture Review Glossary AAP Architect ASAI Availability Bulk Mail Business Case Review Change Management Chief Enterprise Architect Application Architecture Planning. Replaced by the SAR (System Architecture Review) process,

More information

The Role of the Software Architect

The Role of the Software Architect IBM Software Group The Role of the Software Architect Peter Eeles peter.eeles@uk.ibm.com 2004 IBM Corporation Agenda Architecture Architect Architecting Requirements Analysis and design Implementation

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security

More information

Customer Bank Account Management System Technical Specification Document

Customer Bank Account Management System Technical Specification Document Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6

More information

Technical Layer (Technical Interoperability) Information Layer (Information Interoperability. Business Layer (Business Process Interoperability)

Technical Layer (Technical Interoperability) Information Layer (Information Interoperability. Business Layer (Business Process Interoperability) Layers of Interoperability Technical Layer (Technical Interoperability) Information Layer (Information Interoperability Business Layer (Business Process Interoperability) Information Interoperability Identify

More information

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 20-21 The Unified Process Dynamic dimension Two dimensions Content

More information

What an Architect Needs to Know

What an Architect Needs to Know Corporate Technology What an Architect Needs to Know Experiences from the Siemens Curriculum for Engineers Frank Buschmann Siemens AG Corporate Technology Systems Architecture and Platforms Copyright Siemens

More information

Visual Paradigm product adoption roadmap

Visual Paradigm product adoption roadmap Visual Paradigm product adoption roadmap Model-Code-Deploy Platform Easy and Intelligent Business Process Modeler Streamlined Design and Development Environment Access Database with Object- Oriented Technology

More information

Conceptual Model for Enterprise Governance. Walter L Wilson

Conceptual Model for Enterprise Governance. Walter L Wilson Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2

More information

Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com

Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com Service Oriented Architecture Based Integration Mike Rosen CTO, AZORA Technologies, Inc. Mike.Rosen@Azoratech.com Mike Rosen ACCESS TO THE EXPERTS Consultant Chief Enterprise Architect for service and

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

ITIL V3 differences from V2

ITIL V3 differences from V2 ITIL V3 differences from V2 Stuart Rance FISM, CISSP 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda Overall differences Brief

More information

Concept of Operations for Line of Business Initiatives

Concept of Operations for Line of Business Initiatives Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3

More information

Exposing Data as a Service in the Army Enterprise

Exposing Data as a Service in the Army Enterprise Exposing as a Service in the Army Enterprise ABSTRACT DoD directives have been urging adoption of a Net-Centric approach toward information sharing, which makes it necessary to streamline the way data

More information

ITIL Service Lifecycles and the Project Manager

ITIL Service Lifecycles and the Project Manager 1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction

More information

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA This article was downloaded by: [188.204.15.66] On: 20 February 2012, At: 01:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer

More information

The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies

The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies A White Paper by: Ian Foo Technical Lead, Cisco Systems, Inc. April 2008 Copyright 2008 The Open Group All rights reserved. No

More information

CAPABILITY MATURITY MODEL & ASSESSMENT

CAPABILITY MATURITY MODEL & ASSESSMENT ENTERPRISE DATA GOVERNANCE CAPABILITY MATURITY MODEL & ASSESSMENT www.datalynx.com.au Data Governance Data governance is a key mechanism for establishing control of corporate data assets and enhancing

More information

G-Cloud Enterprise Applications for a Mobile Workforce. October 2015. G-Cloud. service definitions

G-Cloud Enterprise Applications for a Mobile Workforce. October 2015. G-Cloud. service definitions G-Cloud Enterprise Applications for a Mobile Workforce October 2015 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 3 Why Capgemini... 4 Our Approach... 4 Benefits...

More information

POSITION LOCATION REPORTING RELATIONSHIP

POSITION LOCATION REPORTING RELATIONSHIP POSITION LOCATION REPORTING RELATIONSHIP Solutions Architect Sydney Managing Architect ORGANISATIONAL CONTEXT The National Health Call Centre Network Ltd (NHCCN), now trading as Healthdirect Australia,

More information

Integration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004

Integration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004 Copyright (c) 2004 Booz Allen Hamilton. All rights reserved 1 Integration of Information Assurance (IA) into DoDAF Architectures Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004

More information

Business Capability Model A Starting Point for Enterprise Architecture

Business Capability Model A Starting Point for Enterprise Architecture Business Capability Model A Starting Point for Enterprise Architecture Huw Morgan email: hmorgan@toronto.ca Head Enterprise Architecture City of Toronto, Ontario Canada Salah Sharieh email: Salah@ivedha.com

More information

Contents. Acknowledgments

Contents. Acknowledgments Abstract Acknowledgments Acronyms iii v xiii 1 Introduction 1 1.1 Problems and Motivation 3 1.1.1 Competition by Web/Internet Application Service Providers 3 1.1.2 Web-Telecom Service and Application Convergence

More information

IMPORTANT! THE CONTENT OF THIS DOCUMENT IS THE PROPERTY (IP) OF SHAREPOINTPEOPLE.DK, A DIVISION OF NETMEDIA SOFTWARE APS.

IMPORTANT! THE CONTENT OF THIS DOCUMENT IS THE PROPERTY (IP) OF SHAREPOINTPEOPLE.DK, A DIVISION OF NETMEDIA SOFTWARE APS. IMPORTANT! THE CONTENT OF THIS DOCUMENT IS THE PROPERTY (IP) OF SHAREPOINTPEOPLE.DK, A DIVISION OF NETMEDIA SOFTWARE APS. THIS DOCUMENT MAY ONLY BE USED FOR INSPIRATIONAL PURPOSES BY THE PERSON IT HAS

More information

Evolv Technology & Support Delivers Platform Updates & Customer Support Insights

Evolv Technology & Support Delivers Platform Updates & Customer Support Insights Ahead of the Change, Ahead of the Curve Evolv Technology & Support Delivers Platform Updates & Customer Support Insights Craig Lovell VP of Product Development Sandrine Moreau VP of Customer Support Agenda

More information

A Simple Enterprise Security Architecture (SESA): Towards a Pedagogic Architecture for Teaching Cyber Security

A Simple Enterprise Security Architecture (SESA): Towards a Pedagogic Architecture for Teaching Cyber Security A Simple Enterprise Security Architecture (SESA): Towards a Pedagogic Architecture for Teaching Cyber Security Harjinder Singh Lallie E-Security Group, WMG, University of Warwick, Coventry, CV4 7AL, UK,

More information

G-Cloud III Services Service Definition Accenture Cloud Security Services

G-Cloud III Services Service Definition Accenture Cloud Security Services G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.

More information

Career Tracks- Information Technology Family

Career Tracks- Information Technology Family Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services

More information

WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT

WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT CONTENTS 1. THE NEED FOR DATA GOVERNANCE... 2 2. DATA GOVERNANCE... 2 2.1. Definition... 2 2.2. Responsibilities... 3 3. ACTIVITIES... 6 4. THE

More information

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

Innovation Software Landscape

Innovation Software Landscape Innovation Software Landscape Analysis of available innovation management tool December 2011 Transform to the power of digital Managing innovation in a more structured way is gaining ground; key focus

More information

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase

More information

Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

OPERATIONAL DATA STORE

OPERATIONAL DATA STORE OPERATIONAL DATA STORE Reference Roadmap, Plan and the Key Considerations in Cloud, Big data and Virtualization Mainstream - By Amit Soni March, 2015 Summary Traditionally Operational Data Store (ODS)

More information

Charles Betz Enterprise Architect & Author

Charles Betz Enterprise Architect & Author Charles Betz Enterprise Architect & Author Charlie Betz is Director of Technical Strategy (aka Chief Architect) for a major US telecom and ecommerce hosting provider, currently assigned to one of the largest

More information

The role of IT in business-led Data Governance. by First San Francisco Partners

The role of IT in business-led Data Governance. by First San Francisco Partners The role of IT in business-led Data Governance by First San Francisco Partners 2 It s been said the first step in solving any problem is recognizing there is one. Fortunately today, more and more companies

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks

Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary

More information

Increasing Development Knowledge with EPFC

Increasing Development Knowledge with EPFC The Eclipse Process Framework Composer Increasing Development Knowledge with EPFC Are all your developers on the same page? Are they all using the best practices and the same best practices for agile,

More information

Competency Approach to Human Resource Management

Competency Approach to Human Resource Management Competency Approach to Human Resource Management What do we mean when we say COMPETENCY? A Competency is an underlying characteristic of a person which enables him /her to deliver superior performance

More information

MASTER OF SOFTWARE ENGINEERING DEGREE TRACKS 1. WEB DEVELOPMENT/JAVA:

MASTER OF SOFTWARE ENGINEERING DEGREE TRACKS 1. WEB DEVELOPMENT/JAVA: MASTER OF SOFTWARE ENGINEERING DEGREE TRACKS Students seeking a professional focus in the Master of Software Engineering program may choose to follow a specific set of courses referred to as a track, that

More information

Data Governance and CA ERwin Active Model Templates

Data Governance and CA ERwin Active Model Templates Data Governance and CA ERwin Active Model Templates Vani Mishra TechXtend March 19, 2015 ER07 Presenter Bio About the Speaker: Vani is a TechXtend Data Modeling practice manager who has over 10+ years

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

SOA CERTIFIED CONSULTANT

SOA CERTIFIED CONSULTANT SOA CERTIFIED CONSULTANT (5 Days) A Certified SOA Consultant is required to obtain proficiency in a cross-section of key SOA topic areas, including both conceptual and technical aspects of service-oriented

More information

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood Enterprise Architecture 101 (Includes numerous samples/ templates produced using TOGAF methodology) Enterprise Architecture Key Question What is Enterprise Architecture? Why Enterprise Architecture? What

More information

The Tropos and MaSE Agent-Oriented Software Engineering Methodologies. Msury Mahunnah, Tallinn University of Technology

The Tropos and MaSE Agent-Oriented Software Engineering Methodologies. Msury Mahunnah, Tallinn University of Technology The Tropos and MaSE Agent-Oriented Software Engineering Methodologies Msury Mahunnah, Tallinn University of Technology Mailing list for the course aine.aom@lists.ttu.ee You can join at http://lists.ttu.ee/mailman/listinfo/aine.aom

More information

Guidelines for the Success of a Business Process Management Initiative

Guidelines for the Success of a Business Process Management Initiative Guidelines for the Success of a Business Process Management Initiative Insert Company Logo June 8 th 2012 Agenda Business Process Management Lifecycle Making change sustainable Business Process Governance

More information

Enterprise Security Architecture Concepts and Practice

Enterprise Security Architecture Concepts and Practice Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy

More information

ELCA Forum 2014 An architecture for building successful Omni-channel IT systems

ELCA Forum 2014 An architecture for building successful Omni-channel IT systems ELCA Forum 2014 An architecture for building successful Omni-channel IT systems Philipp Oser, Lead Architect Niall Sweeney, Solution Architect September 2014 SPEAKER Philipp Oser Philipp is a Lead Architect

More information