TECHNOLOGY TRANSFER PRESENTS MIKE ROSEN MAY 18-19, 2015 MAY 20-21, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
|
|
- Gavin Jacobs
- 7 years ago
- Views:
Transcription
1 TECHNOLOGY TRANSFER PRESENTS MIKE ROSEN Business Architecture Preparation for the Certification exam Enterprise Security Architecture MAY 18-19, 2015 MAY 20-21, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it
2 Business Architecture: Preparation for the Certification exam ABOUT THIS SEMINAR Business Architecture has become mainstream and is the fastest growing area of Enterprise Architecture. The Business Architecture Body of Knowledge (BIZBOK) is now at V4.1, and continues to expand on industry best practices. Starting in 2015, an international certification will be available for individual practitioners to become Certified Business Architect based on the BIZBOK and related business material. Whether you are interested in certification or not, this course will provide an overview of Business Architecture and help participants develop their skills and techniques. For those looking toward certification, it will help you prepare to take the certification exam. The seminar is structured as a combination of presentation, interactive discussion and group based exercises, so participants get the chance to apply the concepts learned during the facilitated exercises. Seminar ObjectiveS Delegates will gain an understanding of the skills required to become a Certified Business Architect, including: What is Business Architecture? What is the BIZBOK? What are the foundational techniques? How do you apply Business Architecture to specific business scenarios? How is Business Architecture related to other business domains? How do you use Business Architecture to help define and execute strategy? How do you use Business Architecture to align with IT systems? What is a Certified Business Architect? How do you prepare for the certification exam? WhO ShOuld attend Architects looking to become a Certified Business Architect. Existing architects who want to sharpen their skills, new architects who want to learn Best Practices, and anyone who aspires to become a business architect.
3 OUTLINE DAy 1 DAy 2 Foundation and core Skills Business Architecture Foundational Concepts - Introduction - Core principles - Goals and Objectives Business Architecture Core Mapping Knowledge - Capability Mapping - Value Mapping - Information Mapping - Organizational Mapping - Cross Mappings Business Architecture Extended Mapping Knowledge - Stakeholder Mapping - Strategy Mapping - Initiative Mapping - Product Mapping - Extended Cross Mappings extended Skills Business Architecture Alignment with Related Business Disciplines - Portfolio Management - BPM - Requirements Definition - Lean Six Sigma - Case Management Business Architecture and Business Performance Analysis - Measures and Metrics - Heat Mapping Business Architect Role - Competency Model Business Architecture Governance - Maturity Model Business Architecture and IT Architecture Alignment - Architecture Framework Alignment - SOA - IT Transformations Business Architecture Situation and Scenario Usage - Common Scenarios - Understanding and Identifying Scenarios - Using Scenarios to Guide Business Architecture Activities Business Architecture Infrastructure Management - Knowledge Base - Tools
4 Enterprise Security Architecture ABOUT THIS SEMINAR Security is becoming the most important issue for enterprises and CIOs. The new threats are everywhere. It s not high school kids hacking for fun anymore. Cybercrime is sponsored by governments, corporations, and organized crime that have the resources to hire top talent, and the patience to pick away, for months at a time, until an attack has been successful. Previous security models that constructed a fortress around the enterprise are no longer effective. In addition to the increasingly sophisticated attackers, the proliferation of devices adds millions of new vulnerability points. And even if your enterprise is secure, your partners and global outsourcers might not be, providing a vector into your enterprise. Liabilities from security breaches damage brands and dwarf other losses. Security is no longer just the concern of a few specialized personnel. It will be elevated to a top priority of CEOs and senior leaderships, either proactively, or reactively in response to yet another expensive incident. Executives have and will lose their job as a consequence of breaches. However, the CIO and IT is also best positioned to address Security and raise awareness to the business. This seminar will provide a practical, comprehensive, and architectural approach to helping CIOs and security personnel address evolving security threats and environment. The seminar is structured as a combination of presentation, interactive discussion and group based exercises, so participants get the chance to apply the concepts learned to example scenarios during the facilitated exercises. Seminar ObjectiveS Delegates will gain an understanding of the issues and requirements for creating an enterprise security architecture, including answers to the following: What are the main issues to consider when planning to address security? What are the new 3rd platform threats and vulnerabilities? What are new approaches to understand and identifying them? How do we make sure that our policies, processes, information assurance, application level security, technology, and analysis solutions work together? How do we transition from a fortress mentality to deperimeterization? What is an Enterprise Security Architecture and how do we create one? WhO ShOuld attend Architects Mangers CIOs CISOs and who want to know the important concepts, understand the new threats, and identify how to address them in today s security environment.
5 OUTLINE DAy 1 DAy 2 Security Fundamentals and threats Introduction Four questions that keeps the CISO awake at night Case studies Enter the 3rd Platform - What is the 3rd Platform - New threats and vulnerabilities - Cloud - Mobile - Social Understanding and identifying new threats Event correlation Integrating information to analyze and correlate? - New sources of threat data designing a Security architecture Key elements of an overall security strategy Effective defense-in-depth? Goodbye Fortress, Hello Deparimeterization Principles for security policies Information integrity Application security containers Prioritizing tactics for maximum impact Holistic Enterprise Security Architecture - Business Architecture considerations - Information Architecture considerations - Application Architecture considerations - Technology Architecture considerations - Service Architecture considerations Mitigating risk from partners and suppliers Conclusion
6 INFORMATION PARTICIPATION FEE business architecture 1200 enterprise Security architecture 1200 Special price for the delegates who attend both seminars: 2300 The fee includes all seminar documentation, luncheon and coffee breaks. VENUE Roma, Residenza di Ripetta Via di Ripetta, 231 Rome (Italy) SEMINAR TIMETABLE 9.30 am pm 2.00 pm pm HOW TO REGISTER you must send the registration form with the receipt of the payment to: TECHNOLOGy TRANSFER S.r.l. Piazza Cavour, Rome (Italy) Fax within may 4, 2015 PAYMENT Wire transfer to: Technology Transfer S.r.l. Banca: Cariparma Agenzia 1 di Roma IBAN Code: IT 03 W BIC/SWIFT: CRPPIT2P546 GENERAL CONDITIONS DISCOUNT The participants who will register 30 days before the seminar are entitled to a 5% discount. If a company registers 5 participants to the same seminar, it will pay only for 4. Those who benefit of this discount are not entitled to other discounts for the same seminar. CANCELLATION POLICY A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event date will be liable for the full fee. CANCELLATION LIABILITY In the case of cancellation of an event for any reason, Technology Transfer s liability is limited to the return of the registration fee only. MIKE FERGUSON business architecture Rome May 18-19, 2015 Residenza di Ripetta - Via di Ripetta, 231 Registration fee: 1200 first name... surname... job title... Stamp and signature enterprise Security architecture Rome May 20-21, 2015 Residenza di Ripetta - Via di Ripetta, 231 Registration fee: 1200 organisation... address... postcode... both SeminarS Special price for the delegates who attend both seminars: 2300 city... country... If anyone registered is unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable. telephone... fax Send your registration form with the receipt of the payment to: Technology Transfer S.r.l. Piazza Cavour, Rome (Italy) Tel Fax info@technologytransfer.it
7 SPEAKER mike rosen is Chief Scientist at Wilton Consulting Group, which provides expert consulting in Business Architecture, Enterprise Architecture, Service-Oriented Architecture, and Enterprise Solutions. Mr. Rosen is also a founding member and Vice President of the Business Architects Guild,an analyst and Research Advisor for IDC, and Editorial Director for SOA Institute. His current emphasis is on the use of business architecture to improve execution of strategy and on the architecture and implementation of agile, flexible business solutions. He has years of experience in the architecture and design of applications for global corporations and 20+ years of product development experience. Mr. Rosen is an internationally recognized speaker and author of several books including applied SOa: architecture and design Strategies.
TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it MODERN DATA
More informationTECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED ANALYTICS WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it ADVANCED
More informationTECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG. Strategic Management of the IT Organization
TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG Strategic Management of the IT Organization DEVELOPING A BALANCED SCORECARD TO MEASURE IT PERFORMANCE AND TO ALIGN IT AND BUSINESS ROME NOVEMBER 11-13, 2015
More informationTECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS
TECHNOLOGY TRANSFER PRESENTS MARK MADSEN SOCIAL MEDIA, WEB ANALYTICS AND BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS ROME MAY 12-13, 2011 VISCONTI PALACE HOTEL
More informationTECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS DECEMBER 10-11, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME
More informationMAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY
LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
More informationTECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER From EAI to SOA to Cloud Integration ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION DECEMBER 12-14, 2011 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
More informationTECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it
More informationSTEPHEN FEW SHOW ME THE NUMBERS
TECHNOLOGY TRANSFER PRESENTS STEPHEN FEW SHOW ME THE NUMBERS Designing Tables and Graphs to Enlighten MAY 6, 2009 DATA VISUALIZATION FOR DISCOVERY AND ANALYSIS Simple Graphing Techniques for Analyzing
More informationTECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM ANALYTICS JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
More informationTECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT APRIL 27-29, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
More informationTECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY MAY 11-13, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
More informationDANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
LA TECHNOLOGY TRANSFER PRESENTS PRESENTA DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it
More informationTECHNOLOGY TRANSFER PRESENTS OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS Data Virtualization for Agile Business Intelligence Systems New Database Technology for Data Warehousing OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA
More informationTECHNOLOGY TRANSFER PRESENTS SHAKU. Is it the new face of APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS SHAKU ATRE DASHBOARD Is it the new face of Business Intelligence? APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
More informationTECHNOLOGY TRANSFER PRESENTS KEN VAN WYK JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK BREAKING AND FIXING WEB APPLICATIONS SECURITY PENETRATION TESTING IOS APPS JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)
More informationTECHNOLOGY TRANSFER PRESENTS VLADIMIR NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS VLADIMIR BACVANSKI MODERN INFORMATION ARCHITECTURE DEVELOPING WITH SCALA NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
More informationKEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
More informationMICHAEL SCHMITZ NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MICHAEL SCHMITZ DATA WAREHOUSING Advanced Design and Implementation Issues ETL FOR THE DATA WAREHOUSE A Template-Driven Approach NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA
More informationTECHNOLOGY TRANSFER PRESENTS MIKE MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE BUSINESS INTEGRATION USING BUSINESS INTELLIGENCE, BAM AND EVENT PROCESSING FOR BUSINESS OPTIMIZATION MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA
More informationMAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) Architectures, Technologies and Best Practices OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME
More informationThe Logical Data Warehouse
TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS The Logical Data Warehouse Design, Architecture, and Technology Incorporating Big Data, Hadoop and NoSQL in Data Warehouse and Business Intelligence Systems
More informationJOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME
More informationData Management, Analytics and Business Intelligence
TECHNOLOGY TRANSFER PRESENTS Rome, June 25-26 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL SUMMIT 2 0 1 5 Data Management, Analytics and Business Intelligence A B O U T T H E S U M M I T
More informationMIKE FERGUSON OCTOBER 1-2, 2007 OCTOBER 3-4, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BUSINESS INTELLIGENCE AND PERFORMANCE MANAGEMENT: BI 2.0 in the Real-Time Intelligent Enterprise ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT OCTOBER
More informationT E C H N O L O G Y T R A N S F E R P R E S E N T S
T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 4-5 2014 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL S U M M I T 2 0 1 4 BIG DATA ANALYTICS A B o U T T H E S U M M I T In
More informationTECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 3-4, 2015 JUNE 5, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON Big Data and Analytics From Strategy to Implementation Data Virtualization in Practice JUNE 3-4, 2015 JUNE 5, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231
More informationMIKE FERGUSON ENTERPRISE SERVICE ORIENTED APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE SERVICE ORIENTED ARCHITECTURE AND INTEGRATION ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA
More informationTECHNOLOGY TRANSFER PRESENTS INTERNATIONAL. Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE BIG DATA
TECHNOLOGY TRANSFER PRESENTS Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL CONFERENCE 2 0 1 5 BIG DATA A B O U T T H E S U M M I T The last twelve months can only be described
More informationTECHNOLOGY TRANSFER PRESENTS CRAIG AGILE SOFTWARE DEVELOPMENT. Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013
TECHNOLOGY TRANSFER PRESENTS CRAIG LARMAN AGILE SOFTWARE DEVELOPMENT Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013 AGILE, LEAN & ITERATIVE DEVELOPMENT Management Overview MAY 13,
More informationEnterprise Web & Cloud Computing
T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 1-3, 2010 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE E U R O P E 2 0 1 0 Enterprise Web & Cloud Computing A B O U T T H E C O
More informationKEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop
TECHNOLOGY TRANSFER PRESENTS KEVIN CARDWELL Q/SA (Qualified Security Analyst) Penetration Tester & Optional Q/PTL (Qualified Penetration Licence) Workshop MAY 18-22, 2009 VISCONTI PALACE HOTEL - VIA FEDERICO
More informationSONDRA SCHNEIDER JOHN NUNES
TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME
More informationDefending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
More informationAddressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
More informationVendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com
Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: marketing@achromicpoint.com
More informationSeamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
More informationwww.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationCYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
More informationApplication Overhaul. Key Initiative Overview
Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an
More informationAccenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationTECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON JUNE 6-7, 2016 JUNE 8-9, 2016 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON Big Data and Analytics From Strategy to Implementation Enterprise Data Governance & Master Data Management JUNE 6-7, 2016 JUNE 8-9, 2016 RESIDENZA DI RIPETTA
More informationCyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
More informationImplementing Practical Information Security Programs
Implementing Practical Information Security Programs CISO Summit March 17-19, 2013 Presented by: David Cass, SVP & Chief Information Security Officer, Elsevier Information Security & Data Protection Office
More informationA NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
More informationMaximize the synergies between ITIL and DevOps
BEST PRACTICES WHITE PAPER Maximize the synergies between ITIL and DevOps By Anthony Orr, Director of Service Management, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationGlobal Process Innovation Value Proposition
Global Process Innovation Value Proposition 1 Global Process Innovation will help your organization implement sustainable Business Process Management that delivers strategic value. With active support
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationW H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationSetting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
More informationCyber Risk & Insurance
Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The
More informationBuilding the Agile Enterprise. The MK/OMG Press
Brochure More information from http://www.researchandmarkets.com/reports/1757796/ Building the Agile Enterprise. The MK/OMG Press Description: In the last ten years IT has brought fundamental changes to
More informationAgile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
More informationState Governments at Risk: The Data Breach Reality
State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
More informationCERTIFICATION PROGRAM. For more information www.staffingindustry.com/certification memberservices@staffingindustry.com 800.950.
CERTIFICATION PROGRAM For more information www.staffingindustry.com/certification memberservices@staffingindustry.com 800.950.9496 PROGRAM DESCRIPTION PROGRAM DESCRIPTION Staffing Industry Analysts Certified
More informationCyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK
Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and
More informationISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING
ISTQB ADVANCED LEVEL TEST MANAGER CERTIFICATE IN SOFTWARE TESTING Copyright 2015 ps_testware 1/6 Introduction The International Software Testing Qualifications Board (ISTQB) consists of Member Boards representing
More informationEnterprise Business Service Management
Technical white paper Enterprise Business Service Management Key steps and components of a successful solution Table of contents Executive Summary... 2 Setting the goal establishing an IT initiative...
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationWhat if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?
What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade
More informationSecure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
More informationEfficient BPMN: from Anti-Patterns to Best Practices
Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for
More informationIT Governance. Key Initiative Overview
Michael Gerrard Research Vice President and Distinguished Analyst IT governance addresses two major topics: demand governance ( doing the right things ) and supply-side governance ( doing things right
More informationRisk Management Policy
Risk Management Policy Risk Management Policy Record Number D14/79827 Responsible Manager Manager Strategy and Governance Last reviewed 10 March 2015 Adoption reference Council Resolution number 90.5 Previous
More informationApplying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
More informationThe NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
More informationENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY OVERVIEW AND BACKGROUND DEFINITION OF ESRM
ENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY OVERVIEW AND BACKGROUND Organizations are continuously exposed to a host of evolving threats which create a multitude of security risks.
More informationSTREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT
STREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT CAPITALIZE ON EXPERT KNOWLEDGE TO GAIN MAXIMUM VALUE ON THESE VITAL ISSUES Understand the basic questions you need to consider when developing an
More informationCOMBATING CYBER THREATS: A HOW TO FOR THE CISO.
www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------
More informationOracle Education @ USF
Oracle Education @ USF Oracle Education @ USF helps increase your employability and also trains and prepares you for the competitive job market at a much lower cost compared to Oracle University. Oracle
More informationCYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
More informationAccelerating Software Security With HP. Rob Roy Federal CTO HP Software
Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National
More informationIG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationBest Practices to Improve Breach Readiness
Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security
More informationThe Resilient IT Infrastructure
The Resilient IT Infrastructure Jeremy Wong Senior Vice President BCM Institute Republic Polytechnic, Block W4, Level 1, LR-W4B 25 November 2013 Jeremy Wong Senior Vice President Business Continuity Management
More informationAnn Geyer Tunitas Group. CGEIT Domains
1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%
More informationEASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant
The Integrated CMMI-based Improvement Framework for Test and Evaluation Jeffrey L. Dutton Principal Consultant Engineering and Services Performance Improvement LLC 22 Copyrights and Service Marks CMMI
More informationA Business Analysis Perspective on Business Process Management
A Business Analysis Perspective on Business Process Management October 2013 Discussion Points! Why have Roles?! What is Business Analysis?! Who is the Business Analyst?! Business Analysis & Business Process
More informationRealizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
More informationStrategic Planning. Key Initiative Overview
David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change
More informationDemand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA
Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and
More informationProject Management Professional (PMP ) Exam Preparation
Project Management Professional (PMP ) Exam Preparation Learn the most effective methods of delivering projects within cost, schedule and resource constraints April 10 14, 2011 American University of Sharjah
More informationCyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
More informationWHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
More informationPMA1. Strategic Project Portfolio & Program Management
PMA1. Strategic Project Portfolio & Program Management Course Description This workshop helps participants focus on managing their project with a view on its place in the whole organisation. It introduces
More informationProfessor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC
Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE
More informationAdvancing Your Business Analysis Career Intermediate and Senior Role Descriptions
Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions The role names listed in the Career Road Map from International Institute of Business Analysis (IIBA) are not job titles
More informationIT MANAGEMENT TRAINING PROGRAM. Denmark. Bridge. Gap. the. between business and IT
IT MANAGEMENT TRAINING PROGRAM Denmark Bridge the Gap between business and IT Bridge the Gap between business and IT Benefits: FOR THE ORGANIZATION The personal performance of the trainee is significantly
More informationInformation Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com
Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate
More informationCyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
More informationCIOs: How to Become the CEO s Business Partner
CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate
More informationBEST PRACTICES IN CHANGE MANAGEMENT
BEST PRACTICES IN CHANGE MANAGEMENT 2016 EDITION Executive Summary Best Practices in Change Management 2016 edition slide 1 THE LARGEST BODY OF KNOWLEDGE ON CHANGE MANAGEMENT Continuing to lead the discipline
More informationHow To Improve Your Business Process
Business Process Improvement Introduction A four-day workshop covering the methods, diagnostics and tools for optimizing and modeling production and service processes. Course Objectives This practical
More informationA Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
More information