The Role of the Chief Information Security Officer

Size: px
Start display at page:

Download "The Role of the Chief Information Security Officer"

Transcription

1 The Role of the Chief Information Security Officer Advisor: Co-advisor: Prof. André Vasconcelos Prof. Miguel Mira da Silva Tiago Martins Catarino

2 Motivation Uncertainty as to which standards and guides define the CISO s intervention range. In the literature, it is not clear which is the system of interest that should be within CISO s intervention area. 2

3 Research Problem How can an organization implement the CISO s role using COBIT 5 for Information Security in ArchiMate? o Can we perform a gap analysis between the organization s AS-IS to what is defined in the COBIT 5 for Information Security, regarding: Processes and base practices; Key practices; Information types; Roles. o Can the ArchiMate notation model all the concepts defined in the COBIT 5 for Information Security? o Can we identify inconsistencies between the RACI charts, defined in COBIT 5 Enabling Processes, and the CISO s role addressed by COBIT 5 for Information Security? 3

4 Theoretical Background COBIT 5 o o COBIT 5 Framework; COBIT 5 for Information Security. 4

5 Theoretical Background Enterprise Architecture o ArchiMate Provides instruments to enable enterprise architects to describe, analyze and visualize the relationships among business domains in an unambiguous way. 5

6 Objectives Propose a method using ArchiMate to integrate COBIT 5 for Information Security with EA principles, methods and models in order to properly implement the CISO s role. o Create a method that: Figures out what processes and activities, key practices and business functions that the CISO should be held responsible; Identifies information types that the CISO is responsible to originate; Finds what organization s roles are performing the CISO s job; Hopefully improves the information security maturity level of the organization; Identifies inconsistencies between roles assignments, in particular the CISO s role. 6

7 Proposal 1. Model COBIT 5 for Information Security 7. Analysis & TO-BE Design 2. Model Organization s EA 3. Information Types mapping 4. Processes Outputs mapping 5. Key Practices mapping 6. Roles mapping 7

8 Demonstration CISO s Business Functions and Information Types viewpoint (COBIT 5 for Information Security) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 8

9 Demonstration DemoCorp s Business Functions and Information Types viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 9

10 Demonstration DemoCorp to COBIT 5 for Information Security s Information Types viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 10

11 Demonstration DemoCorp to COBIT 5 for Information Security s Information Types Missing viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 11

12 Demonstration DemoCorp to APO01 Manage the IT Management Framework Process viewpoint Step 1 Step 2 Step 3 No links between the process s outputs of COBIT 5 and DemoCorp Step 4 Step 5 Step 6 Step 7 12

13 Demonstration DemoCorp to COBIT 5 for Information Security s Key Practices viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 13

14 Demonstration DemoCorp to COBIT 5 for Information Security s Missing Practices viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 14

15 Demonstration DemoCorp to COBIT 5 for Information Security s Roles viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 15

16 Demonstration Migration Viewpoint: Information Types (General) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 16

17 Evaluation CISO s evolution in DemoCorp 2008 CISO s role was created to address the certification requirements of a production s process CISO s role became an organic structure The ISMS (Information Security Management System) was certified according to the ISO requirements 17

18 Evaluation The following solution s objectives were fully achieved: 1. Figure out what processes and activities, key practices and business functions that the CISO should be held responsible for; 2. Identify information types that the CISO is responsible for originating; 3. Identify which organization roles are performing the CISO s job; 4. Improve the information security maturity level of the organization; 5. Identify inconsistencies between roles assignments, in particular the CISO s role. 18

19 Communication 13 th European Mediterranean & Middle Eastern Conference on Information Systems (EMCIS) o Paper accepted in the EMCIS conference as a full paper (June 23, 2016). o Title: Inconsistencies in Information Security Roles 19

20 Conclusion Main Contributions o o A method for implementing the CISO s role using COBIT 5 for Information Security in ArchiMate, which comprises 7 steps; Identification of inconsistencies between roles assignments, in particular the CISO s role, which are defined in the assignments matrix charts of COBIT 5 Enabling Processes, and the roles addressed by COBIT 5 for Information Security. 20

21 Conclusion Future Work o o o o Develop a solution s proposal that addresses the inconsistencies detected; Demonstrate and evaluate the method in different industries; Specialize the proposed method by industry/type of organization (e.g. SME and Banking); Extend the research proposal in order to comprise others architectural levels (application and technology layers). 21

22 The Role of the Chief Information Security Officer Advisor: Co-advisor: Prof. André Vasconcelos Prof. Miguel Mira da Silva Tiago Martins Catarino 22

What is TOGAF? How to Perform EA with TOGAF ADM Tool? Written Date : January 20, 2017

What is TOGAF? How to Perform EA with TOGAF ADM Tool? Written Date : January 20, 2017 What is TOGAF? How to Perform EA with TOGAF ADM Tool? Written Date : January 20, 2017 Enterprise Architecture is essential to every business, yet it's not easy to master. Have you ever thought that you

More information

ArchiMate

ArchiMate ArchiMate 3.0 www.austech.edu.au WHAT IS ARCHIMATE 3.0?? ArchiMate is a modelling language for Enterprise Architecture that provides instruments for Enterprise Architects to understand, visualise, and

More information

ArchiMate Trick or Treat?

ArchiMate Trick or Treat? July ArchiMate 3.0 - Trick or Treat? Bruno Vandenborre EA Forum Contents Introduction Why ArchiMate 3.0? What is new, has changed, or improved? Conclusion Page 2 Introduction What is ArchiMate? A language

More information

ArchiMate 2.0. A Step Towards A Common Language. Michelle van den Berg EA Consultant. 44 Montgomery Street Suite 960 San Francisco, CA USA

ArchiMate 2.0. A Step Towards A Common Language. Michelle van den Berg EA Consultant. 44 Montgomery Street Suite 960 San Francisco, CA USA ArchiMate 2.0 A Step Towards A Common Language Michelle van den Berg EA Consultant michelle.vandenberg@opengroup.co.za 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 Fax

More information

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints

More information

The Open Group ArchiMate 2 Tool Certification. Conformance Statement

The Open Group ArchiMate 2 Tool Certification. Conformance Statement The Open Group ArchiMate 2 Tool Certification Conformance Statement Version 1.0.1 September 2017 Copyright 2017, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval

More information

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) ISACA Pasitikėjimas informacinėmis sistemomis ir jų nauda Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) Dainius Jakimavičius, CGEIT ISACA Lietuva tyrimų ir metodikos koordinatorius

More information

The ERA of Enterprise Architecture 2.0

The ERA of Enterprise Architecture 2.0 The ERA of Enterprise Architecture 2.0 Aaron Tan Dani aarontan@atdsolution.com / aarontan@iasahome.org Founder and Chairman, IASA Asia Pacific / Chief Architect, ATD Solution Asia Pacific www.atdsolution.com

More information

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF full course details This is an accredited online training course, designed by TOGAF experts to prepare you with everything you need to

More information

TOGAF days. Course description

TOGAF days. Course description TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise

More information

Enterprise Architects establishes Enterprise Architecture Capability Development at Cambridge Assessment

Enterprise Architects establishes Enterprise Architecture Capability Development at Cambridge Assessment Enterprise Architects establishes Enterprise Architecture Capability Development at Cambridge Assessment October 2013 The European Central bank was establishing an Enterprise Architecture and IT Architecture

More information

Enterprise Architecture Views and Viewpoints in ArchiMate

Enterprise Architecture Views and Viewpoints in ArchiMate member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints

More information

Visualizing IT at the Department of Homeland Security with the ArchiMate Visual Modeling Language

Visualizing IT at the Department of Homeland Security with the ArchiMate Visual Modeling Language Visualizing IT at the Department of Homeland Security with the ArchiMate Visual Modeling Language By Iver Band Overview Department of Homeland Security (DHS) Chief Information Officer (CIO) Luke McCormack

More information

ArchiMate 2.0 Standard Courseware. Course Introduction

ArchiMate 2.0 Standard Courseware. Course Introduction ArchiMate 2.0 Standard Courseware Unit 0: Course Introduction ArchiMate, The Open Group, and TOGAF are registered trademarks of The Open Group in the United States and other countries. Course Introduction

More information

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define

More information

ArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan. This course covers all learning materials for ArchiMate v3

ArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan. This course covers all learning materials for ArchiMate v3 ArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan This course covers all learning materials for ArchiMate v3 Delivery: e-learning Certificate: Examination (included) Accredited by: The Open Group Mock

More information

The-Open-Group 0G TOGAF 8 Certification for Practitioners. Download Full Version :

The-Open-Group 0G TOGAF 8 Certification for Practitioners. Download Full Version : The-Open-Group 0G0-081 TOGAF 8 Certification for Practitioners Download Full Version : http://killexams.com/pass4sure/exam-detail/0g0-081 What guides and supports the evolution of the Solutions Continuum?

More information

Calgary: 10th Floor Bankers Hall, West Tower 888-3rd Street SW, Calgary, AB T2P 5C5 p: f:

Calgary: 10th Floor Bankers Hall, West Tower 888-3rd Street SW, Calgary, AB T2P 5C5 p: f: Modelling Using Archimate and Sparx EA Course Number: MOD-300 Format: Instructor Led, Classroom or Virtual Standard Duration: 36 hours, can be shortened to 24 hours for experienced audiences This 36 hour

More information

HITRUST ON THE CLOUD. Navigating Healthcare Compliance

HITRUST ON THE CLOUD. Navigating Healthcare Compliance HITRUST ON THE CLOUD Navigating Healthcare Compliance As the demand for digital health solutions increases, the IT regulatory landscape continues to evolve. Staying ahead of new cybersecurity rules and

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

ArchiMate Tool Certification Conformance Requirements

ArchiMate Tool Certification Conformance Requirements ArchiMate Tool Certification Conformance Requirements Version 2.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

Introduction in the Dragon1 open EA Method

Introduction in the Dragon1 open EA Method Introduction in the Dragon1 open EA Method Dragon1 starts the third wave in Enterprise Architecture: Entering the era of Visual EA Management Overview Revision date: 28 November 2013 Management Overview

More information

Module E1 TOGAF 9.1 Changes Overview

Module E1 TOGAF 9.1 Changes Overview Personal PDF. For non-commercial use only Module E1 TOGAF 9.1 Changes Overview V9.1 Copyright 2009-2011 Slide 1 All rights reserved Published by The Open Group, 2011 TOGAF 9.1 Changes Overview Slide 2

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see ARCHIMATE 2.1 A POCKET GUIDE The Open Group Publications available from Van Haren Publishing The TOGAF Series: TOGAF Version 9.1 TOGAF Version 9.1 A Pocket Guide TOGAF 9 Foundation Study Guide, 3rd Edition

More information

The Open Group Certification for People. IT4IT Program Configuration

The Open Group Certification for People. IT4IT Program Configuration The Open Group Certification for People IT4IT Program Configuration Version 1.0 March 2016 Copyright 2016, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval

More information

Planning and Implementing ITIL in ICT Organisations

Planning and Implementing ITIL in ICT Organisations CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to

More information

corso Pragmatic Roadmapping with IBM Rational System Architect and ArchiMate White Paper Executive Summary Introduction By Martin Owen, CEO, CORSO

corso Pragmatic Roadmapping with IBM Rational System Architect and ArchiMate White Paper Executive Summary Introduction By Martin Owen, CEO, CORSO corso White Paper Pragmatic Roadmapping with IBM Rational System Architect and ArchiMate By Martin Owen, CEO, CORSO Executive Summary Roadmapping is a fundamental part of strategic planning and enterprise

More information

Delin Mathew, Developping a Semantic Mapping between TOGAF and BSI-IT-Grundschutz

Delin Mathew, Developping a Semantic Mapping between TOGAF and BSI-IT-Grundschutz Delin Mathew, delin.mathew@rwth-aachen.de Developping a Semantic Mapping between TOGAF and BSI-IT-Grundschutz Background Enterprise Architecture (EA) Enterprise Architecture Framework (EAF) Zachman Framework,

More information

Why do architects need more than TOGAF?

Why do architects need more than TOGAF? Why do architects need more than TOGAF? To bridge the gap between a high-level management framework for EA and solution/implementation projects You need something like BCS professional certificates in

More information

Technology Transformation. Transformation. Excellence. Governance. PMO

Technology Transformation. Transformation. Excellence. Governance. PMO Technology Transformation Transformation. Excellence. Governance. PMO THE FIRM Resilience& is a UK-based network of independently owned and managed consulting firms and independent experts who are leading

More information

SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure

SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure platforms to cloud systems. Promotions will occur less often

More information

The Open Group Certification for People. TOGAF Program Configuration

The Open Group Certification for People. TOGAF Program Configuration The Open Group Certification for People TOGAF Program Configuration Version 1.1 June 2016 Copyright 2014-2016, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval

More information

BPMN, Capabilities and Requirements in QualiWare Lifecycle Manager

BPMN, Capabilities and Requirements in QualiWare Lifecycle Manager BPMN, Capabilities and Requirements in QualiWare Lifecycle Manager Version: 2017-01-24 2017 CloseReach Ltd. All Rights Reserved 1 Workshop Content A brief introduction to Business Process Model and Notation

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

Enterprise Architect for an Enterprise Architecture. The combination of Sparx EA and ArchiMate 2.0

Enterprise Architect for an Enterprise Architecture. The combination of Sparx EA and ArchiMate 2.0 Enterprise Architect for an Enterprise Architecture The combination of Sparx EA and ArchiMate 2.0 Introduction Bert Dingemans Independent architect and EA consultant Specialised in architecture repositories

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

EXIN Expert in IT Service Management based on ISO/IEC Preparation Guide

EXIN Expert in IT Service Management based on ISO/IEC Preparation Guide EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see ARCHIMATE 3.0 A POCKET GUIDE The Open Group Publications available from Van Haren Publishing The TOGAF Series: TOGAF Version 9.1 TOGAF Version 9.1 A Pocket Guide TOGAF 9 Foundation Study Guide, 3rd Edition

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

Enterprise Architecture Frameworks

Enterprise Architecture Frameworks Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises

More information

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

HPE Enterprise Maps Data Model, ArchiMate, TOGAF. HPE Software, Cloud and Automation

HPE Enterprise Maps Data Model, ArchiMate, TOGAF. HPE Software, Cloud and Automation HPE Enterprise Maps Data Model, ArchiMate, TOGAF HPE Software, Cloud and Automation Data Model Enterprise Maps ArchiMate Overview Modeling language for EA 2002-2004 - NL university + government + industry

More information

1. What is the relationship between non-functional requirements and technology architecture?

1. What is the relationship between non-functional requirements and technology architecture? SAP EDUCATION SAMPLE QUESTIONS: P_EA_1 SAP Certified Professional - Enterprise Architect Disclaimer: These sample questions are for self-evaluation purposes only and do not appear on the actual certification

More information

COBIT 5 Update October 2010

COBIT 5 Update October 2010 COBIT 5 Update October 2010 ISACA Tel Aviv Chapter Conference October 20th, 2010 Kaya Kazmirci ISACA Istanbul Chapter President COBIT 5 Initiative The initiative charge from the Board of Directors is to

More information

IT Expert (Enterprise Network and Infrastructure Architect)

IT Expert (Enterprise Network and Infrastructure Architect) IT Expert (Enterprise Network and Infrastructure Architect) Reference 2015-221-EXT Type of contract Who can apply Salary Working time Place of work Closing date for applications Fixed-term contract which

More information

Avancier Methods (AM) Software Architecture Diagrams

Avancier Methods (AM) Software Architecture Diagrams Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission

More information

TOGAF Transforming Business

TOGAF Transforming Business TOGAF 9.2 - Transforming Business The Open Group EA Forum ArchiMate, DirecNet, Making Standards Work, OpenPegasus, Platform 3.0, The Open Group, TOGAF, UNIX, and The Open Brand X logo are registered trademarks

More information

Strategy & Architecture Framework. Modeling Language Alain De Preter - All rights reserved - Tous droits réservés

Strategy & Architecture Framework. Modeling Language Alain De Preter - All rights reserved - Tous droits réservés Strategy & Architecture Framework Modeling Language Modeling Language Performers People Tools & Repositories Competitive Advantage perform Knowledge & control Process Methods Guidelines & Techniques TO-BE

More information

TOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:

TOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language: TOGAF Certified (Level 1 and 2) 9.1 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (vouchers included) Accredited By: The Open Group

More information

The South African EA Forum

The South African EA Forum The South African EA Forum Follow the EA Forum on Twitter Our upcoming events Twitter: @EAforumSA #ogza http://opengroup.co.za/ea-forum Leading the development of open, vendor-neutral IT standards and

More information

Conceptual Framework

Conceptual Framework ArchiMate in a Nutshell v11 Conceptual Framework Generic Meta Model / Framework / Meta Model Creative Commons Attribution-No Derivative Works Licence 2.0 Attribution: You may copy, distribute and display

More information

ENTERPRISE ARCHITECTS CONCERN LEGAL REQUIREMENTS FOR THE COMPLIANCE WITH THE LAW

ENTERPRISE ARCHITECTS CONCERN LEGAL REQUIREMENTS FOR THE COMPLIANCE WITH THE LAW ENTERPRISE ARCHITECTS CONCERN LEGAL REQUIREMENTS FOR THE COMPLIANCE WITH THE LAW Vytautas ČYRAS Vilnius University Lithuania Vytautas.Cyras@mif.vu.lt Reinhard RIEDL Bern University of Applied Sciences

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

IT GOVERNANCE AND CORPORATE STRATEGY

IT GOVERNANCE AND CORPORATE STRATEGY IT GOVERNANCE AND CORPORATE STRATEGY Lawrence Ribeiro October 2014 Agenda n What is IT governance? n What are the results of IT governance? n IT governance and Enterprise Architecture n IT governance solution

More information

Agenda. TÜV Secure it GmbH short introduction. Risk Analysis Case Study. Certification Procedure. w w w. t u v. c o m 2/ 18. TÜV Secure it GmbH 2003

Agenda. TÜV Secure it GmbH short introduction. Risk Analysis Case Study. Certification Procedure. w w w. t u v. c o m 2/ 18. TÜV Secure it GmbH 2003 Agenda TÜV Secure it GmbH short introduction Risk Analysis Case Study Certification Procedure 2/ 18 Let TÜV Secure it Be Your Guide Who we are. Subsidiary of TÜV Rheinland Group TÜV Secure it: Specialists

More information

COBIT 5 Implementation Certification Training Course - Brochure

COBIT 5 Implementation Certification Training Course - Brochure COBIT 5 Implementation Certification Training Course - Brochure Unlock your True Potential Course Name : COBIT 5 Implementation Version : INVL_Cobit5_BR_02_080_1.1 Course ID : ITSG-131 www.invensislearning.com

More information

ArchiMate Certification for People Conformance Requirements

ArchiMate Certification for People Conformance Requirements ArchiMate Certification for People Conformance Requirements Version 2.0.1 January 2013 Copyright 2013, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval

More information

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI Page 1 Page 2 cobit 5 for risk isaca information assurance cobit 5 for risk pdf cobit 5 for risk isaca information assurance

More information

On the Design and Implementation of a Generalized Process for Business Statistics

On the Design and Implementation of a Generalized Process for Business Statistics On the Design and Implementation of a Generalized Process for Business Statistics M. Bruno, D. Infante, G. Ruocco, M. Scannapieco 1. INTRODUCTION Since the second half of 2014, Istat has been involved

More information

Exam Requirements v4.1

Exam Requirements v4.1 COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information

More information

TOGAF Enterprise Edition Version 8.1

TOGAF Enterprise Edition Version 8.1 TOGAF Enterprise Edition Version 8.1 A Presentation to the The Open Group Architecture Briefing San Diego 4 th February 2004 Graham John Spencer Bird Vice Director, President Architecture Forum Mobile

More information

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES Dear Executive, you requested more information, here are three quick questions Would you know if your company

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

EIRA v Release notes

EIRA v Release notes EIRA v2.0.0 Release notes Disclaimer: ArchiMate is a registered trademarks of The Open Group. ArchiMate is copyright of The Open Group. All rights reserved. Archi is a registered trademark of Phillip Beauvoir.

More information

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology ArchiMate Core Structural Concepts Behavioral Concepts Informational Concepts interaction Technology Application Layer Concept Description Notation Concept Description Notation Actor An organizational

More information

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014 ISACA MADRID DECEMBER 2014 Robert E Stroud CEGIT CRISC International President December 2014 CHANGING DYNAMICS OF BUSINESS Source: http://www.securedgenetworks.com/secure-edge-networks-blog/bid/84023/10-ways-mobile-device-management-can-help-your-school

More information

Business Architecture concepts and components: BA Process Flow

Business Architecture concepts and components: BA Process Flow Business Architecture concepts and components: BA Process Flow Giulio Barcaroli Directorate for Methodology and Statistical Process Design Istat ESTP Training Course Enterprise Architecture and the different

More information

Generic vs. Domain-specific Modeling Languages

Generic vs. Domain-specific Modeling Languages Generic vs. Domain-specific Modeling Languages Knut Hinkelmann Generic vs. Domain-specific Modeling Languages Domain-specific languages are notation which are defined to model knowledge about a specific

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

Study Guide. ArchiMate 3 Foundation. Sample. Preparation for the ArchiMate 3 Part 1 Examination. Prepared by Andrew Josey, The Open Group

Study Guide. ArchiMate 3 Foundation. Sample. Preparation for the ArchiMate 3 Part 1 Examination. Prepared by Andrew Josey, The Open Group Study Guide ArchiMate 3 Foundation Preparation for the ArchiMate 3 Part 1 Examination Prepared by Andrew Josey, The Open Group Copyright 2014-2017, The Open Group All rights reserved. No part of this publication

More information

Frameworks and Standards

Frameworks and Standards Frameworks and Standards Chris Davis and Mike Schiller. IT Auditing: Using Controls to Protect Information Assets (second edition) Autumn, 2011 Prepared by Nataliia Semenenko Content Why do we need frameworks

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

CISO as Change Agent: Getting to Yes

CISO as Change Agent: Getting to Yes SESSION ID: CXO-W02F CISO as Change Agent: Getting to Yes Frank Kim Chief Information Security Officer SANS Institute @fykim Outline Catch the Culture Shape the Strategy Build the Business Case 2 #1 Catch

More information

EIRA v Release notes

EIRA v Release notes EIRA v2.1.0 Release notes Disclaimer: ArchiMate is a registered trademarks of The Open Group. ArchiMate is copyright of The Open Group. All rights reserved. Archi is a registered trademark of Phillip Beauvoir.

More information

European Interoperability Reference Architecture (EIRA) overview

European Interoperability Reference Architecture (EIRA) overview European Interoperability Reference Architecture (EIRA) overview Version 0.8.3 beta 09/01/2015 ISA Action 2.1: European Interoperability Architecture Specific Contract N. 54 Framework contract N. DI/07171

More information

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,

More information

Integrated Management Systems. Dr. David Brewer, FBCS, MIOD

Integrated Management Systems. Dr. David Brewer, FBCS, MIOD Integrated Management Systems Dr. David Brewer, FBCS, MIOD Agenda Introduction Theoretical framework Practical experience Current state-of-the-art Benefits Summary INTRODUCTION What is a management system?

More information

CO-EVOC: An Enterprise Architecture Model Co-Evolution Operations Catalog

CO-EVOC: An Enterprise Architecture Model Co-Evolution Operations Catalog CO-EVOC: An Enterprise Architecture Model Co-Evolution Operations Catalog Nuno Silva University of Lisbon nuno.miguel@tecnico.ulisboa.pt Completed Research Miguel Mira da Silva University of Lisbon mms@tecnico.ulisboa.pt

More information

DoD Architecture Framework Version 2.0

DoD Architecture Framework Version 2.0 wreath stars Text DoD Architecture Framework Version 2.0 Volume 2: Architectural Data and Models Architect s Guide 28 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION PAGE 1. INTRODUCTION...

More information

Leveraging COBIT to Implement Information Security

Leveraging COBIT to Implement Information Security DISCUSS THIS ARTICLE Leveraging COBIT to Implement Information By John Frisken, CA COBIT Focus 5 May 2015 In delivering IT security consulting services to large enterprises in Australia, particularly in

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

The ASEAN Energy Management Scheme: an example of successful regional cooperation

The ASEAN Energy Management Scheme: an example of successful regional cooperation The ASEAN Energy Management Scheme: an example of successful regional cooperation Pierre Cazelles Regional Advisor - AEMAS Director Partnerships Asia, International Copper Association Energy Efficiency

More information

Improving the Practice of DoD Architecting with the Architecture Specification Model

Improving the Practice of DoD Architecting with the Architecture Specification Model Improving the Practice of DoD Architecting with the Architecture Specification Model Huei Wan Ang, Dave Nicholson, and Brad Mercer The MITRE Corporation Abstract As the Department of Defense (DoD) moves

More information

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information

More information

Going UP? More you know, less you no! How to talk about Privacy with your boss in the elevator?

Going UP? More you know, less you no! How to talk about Privacy with your boss in the elevator? Going UP? How to talk about Privacy with your boss in the elevator? Before you do things right, you have to do the right things. Why good communication between business and IT areas is so important to

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

The Evolution of IT Service Management

The Evolution of IT Service Management The Evolution of IT Service Management IT Service Management And Convergence of ITIL, ASL, ISO, and COBIT BCS Rideau Presentation March 21 st 2007 Phil Mustaphi Discussion Topics Introduction ITIL why,

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

An informal discussion Life Cycle Interaction & Control Points for Enterprise ~ Solution Architecture.

An informal discussion Life Cycle Interaction & Control Points for Enterprise ~ Solution Architecture. An informal discussion Life Cycle Interaction & Control Points for Enterprise ~ Solution Architecture. Manchester - 27 th March 2018 Daljit Roy Banger MSc FBCS EA SIG Hosted by the BCS Manchester Branch

More information

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.

Present. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours. Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge

More information

Using ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL Relationship

Using ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL Relationship Using ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL Relationship Marco Vicente 1, Nelson Gama 1,2, and Miguel Mira da Silva 1 1 Instituto Superior Tecnico, Av Rovisco Pais, 1049-001

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005

More information

e-leadership metrics and scoreboard

e-leadership metrics and scoreboard LEAD E-Leadership Skills for Small and Medium Sized Enterprises e-leadership metrics and scoreboard Service contract for the European Commission Eriona Dashja empirica GmbH Enterprise and Industry General

More information