The Role of the Chief Information Security Officer
|
|
- Emory Chase
- 6 years ago
- Views:
Transcription
1 The Role of the Chief Information Security Officer Advisor: Co-advisor: Prof. André Vasconcelos Prof. Miguel Mira da Silva Tiago Martins Catarino
2 Motivation Uncertainty as to which standards and guides define the CISO s intervention range. In the literature, it is not clear which is the system of interest that should be within CISO s intervention area. 2
3 Research Problem How can an organization implement the CISO s role using COBIT 5 for Information Security in ArchiMate? o Can we perform a gap analysis between the organization s AS-IS to what is defined in the COBIT 5 for Information Security, regarding: Processes and base practices; Key practices; Information types; Roles. o Can the ArchiMate notation model all the concepts defined in the COBIT 5 for Information Security? o Can we identify inconsistencies between the RACI charts, defined in COBIT 5 Enabling Processes, and the CISO s role addressed by COBIT 5 for Information Security? 3
4 Theoretical Background COBIT 5 o o COBIT 5 Framework; COBIT 5 for Information Security. 4
5 Theoretical Background Enterprise Architecture o ArchiMate Provides instruments to enable enterprise architects to describe, analyze and visualize the relationships among business domains in an unambiguous way. 5
6 Objectives Propose a method using ArchiMate to integrate COBIT 5 for Information Security with EA principles, methods and models in order to properly implement the CISO s role. o Create a method that: Figures out what processes and activities, key practices and business functions that the CISO should be held responsible; Identifies information types that the CISO is responsible to originate; Finds what organization s roles are performing the CISO s job; Hopefully improves the information security maturity level of the organization; Identifies inconsistencies between roles assignments, in particular the CISO s role. 6
7 Proposal 1. Model COBIT 5 for Information Security 7. Analysis & TO-BE Design 2. Model Organization s EA 3. Information Types mapping 4. Processes Outputs mapping 5. Key Practices mapping 6. Roles mapping 7
8 Demonstration CISO s Business Functions and Information Types viewpoint (COBIT 5 for Information Security) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 8
9 Demonstration DemoCorp s Business Functions and Information Types viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 9
10 Demonstration DemoCorp to COBIT 5 for Information Security s Information Types viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 10
11 Demonstration DemoCorp to COBIT 5 for Information Security s Information Types Missing viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 11
12 Demonstration DemoCorp to APO01 Manage the IT Management Framework Process viewpoint Step 1 Step 2 Step 3 No links between the process s outputs of COBIT 5 and DemoCorp Step 4 Step 5 Step 6 Step 7 12
13 Demonstration DemoCorp to COBIT 5 for Information Security s Key Practices viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 13
14 Demonstration DemoCorp to COBIT 5 for Information Security s Missing Practices viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 14
15 Demonstration DemoCorp to COBIT 5 for Information Security s Roles viewpoint Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 DemoCorp COBIT 5 Step 7 15
16 Demonstration Migration Viewpoint: Information Types (General) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 16
17 Evaluation CISO s evolution in DemoCorp 2008 CISO s role was created to address the certification requirements of a production s process CISO s role became an organic structure The ISMS (Information Security Management System) was certified according to the ISO requirements 17
18 Evaluation The following solution s objectives were fully achieved: 1. Figure out what processes and activities, key practices and business functions that the CISO should be held responsible for; 2. Identify information types that the CISO is responsible for originating; 3. Identify which organization roles are performing the CISO s job; 4. Improve the information security maturity level of the organization; 5. Identify inconsistencies between roles assignments, in particular the CISO s role. 18
19 Communication 13 th European Mediterranean & Middle Eastern Conference on Information Systems (EMCIS) o Paper accepted in the EMCIS conference as a full paper (June 23, 2016). o Title: Inconsistencies in Information Security Roles 19
20 Conclusion Main Contributions o o A method for implementing the CISO s role using COBIT 5 for Information Security in ArchiMate, which comprises 7 steps; Identification of inconsistencies between roles assignments, in particular the CISO s role, which are defined in the assignments matrix charts of COBIT 5 Enabling Processes, and the roles addressed by COBIT 5 for Information Security. 20
21 Conclusion Future Work o o o o Develop a solution s proposal that addresses the inconsistencies detected; Demonstrate and evaluate the method in different industries; Specialize the proposed method by industry/type of organization (e.g. SME and Banking); Extend the research proposal in order to comprise others architectural levels (application and technology layers). 21
22 The Role of the Chief Information Security Officer Advisor: Co-advisor: Prof. André Vasconcelos Prof. Miguel Mira da Silva Tiago Martins Catarino 22
What is TOGAF? How to Perform EA with TOGAF ADM Tool? Written Date : January 20, 2017
What is TOGAF? How to Perform EA with TOGAF ADM Tool? Written Date : January 20, 2017 Enterprise Architecture is essential to every business, yet it's not easy to master. Have you ever thought that you
More informationArchiMate
ArchiMate 3.0 www.austech.edu.au WHAT IS ARCHIMATE 3.0?? ArchiMate is a modelling language for Enterprise Architecture that provides instruments for Enterprise Architects to understand, visualise, and
More informationArchiMate Trick or Treat?
July ArchiMate 3.0 - Trick or Treat? Bruno Vandenborre EA Forum Contents Introduction Why ArchiMate 3.0? What is new, has changed, or improved? Conclusion Page 2 Introduction What is ArchiMate? A language
More informationArchiMate 2.0. A Step Towards A Common Language. Michelle van den Berg EA Consultant. 44 Montgomery Street Suite 960 San Francisco, CA USA
ArchiMate 2.0 A Step Towards A Common Language Michelle van den Berg EA Consultant michelle.vandenberg@opengroup.co.za 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 Fax
More informationEnterprise Architecture Views and Viewpoints in ArchiMate - Reference
Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints
More informationThe Open Group ArchiMate 2 Tool Certification. Conformance Statement
The Open Group ArchiMate 2 Tool Certification Conformance Statement Version 1.0.1 September 2017 Copyright 2017, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval
More informationISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )
ISACA Pasitikėjimas informacinėmis sistemomis ir jų nauda Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) Dainius Jakimavičius, CGEIT ISACA Lietuva tyrimų ir metodikos koordinatorius
More informationThe ERA of Enterprise Architecture 2.0
The ERA of Enterprise Architecture 2.0 Aaron Tan Dani aarontan@atdsolution.com / aarontan@iasahome.org Founder and Chairman, IASA Asia Pacific / Chief Architect, ATD Solution Asia Pacific www.atdsolution.com
More informationTOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF
TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF full course details This is an accredited online training course, designed by TOGAF experts to prepare you with everything you need to
More informationTOGAF days. Course description
TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise
More informationEnterprise Architects establishes Enterprise Architecture Capability Development at Cambridge Assessment
Enterprise Architects establishes Enterprise Architecture Capability Development at Cambridge Assessment October 2013 The European Central bank was establishing an Enterprise Architecture and IT Architecture
More informationEnterprise Architecture Views and Viewpoints in ArchiMate
member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints
More informationVisualizing IT at the Department of Homeland Security with the ArchiMate Visual Modeling Language
Visualizing IT at the Department of Homeland Security with the ArchiMate Visual Modeling Language By Iver Band Overview Department of Homeland Security (DHS) Chief Information Officer (CIO) Luke McCormack
More informationArchiMate 2.0 Standard Courseware. Course Introduction
ArchiMate 2.0 Standard Courseware Unit 0: Course Introduction ArchiMate, The Open Group, and TOGAF are registered trademarks of The Open Group in the United States and other countries. Course Introduction
More informationFundamentals to Creating Architectures using ISO/IEC/IEEE Standards
Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define
More informationArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan. This course covers all learning materials for ArchiMate v3
ArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan This course covers all learning materials for ArchiMate v3 Delivery: e-learning Certificate: Examination (included) Accredited by: The Open Group Mock
More informationThe-Open-Group 0G TOGAF 8 Certification for Practitioners. Download Full Version :
The-Open-Group 0G0-081 TOGAF 8 Certification for Practitioners Download Full Version : http://killexams.com/pass4sure/exam-detail/0g0-081 What guides and supports the evolution of the Solutions Continuum?
More informationCalgary: 10th Floor Bankers Hall, West Tower 888-3rd Street SW, Calgary, AB T2P 5C5 p: f:
Modelling Using Archimate and Sparx EA Course Number: MOD-300 Format: Instructor Led, Classroom or Virtual Standard Duration: 36 hours, can be shortened to 24 hours for experienced audiences This 36 hour
More informationHITRUST ON THE CLOUD. Navigating Healthcare Compliance
HITRUST ON THE CLOUD Navigating Healthcare Compliance As the demand for digital health solutions increases, the IT regulatory landscape continues to evolve. Staying ahead of new cybersecurity rules and
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationArchiMate Tool Certification Conformance Requirements
ArchiMate Tool Certification Conformance Requirements Version 2.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationIntroduction in the Dragon1 open EA Method
Introduction in the Dragon1 open EA Method Dragon1 starts the third wave in Enterprise Architecture: Entering the era of Visual EA Management Overview Revision date: 28 November 2013 Management Overview
More informationModule E1 TOGAF 9.1 Changes Overview
Personal PDF. For non-commercial use only Module E1 TOGAF 9.1 Changes Overview V9.1 Copyright 2009-2011 Slide 1 All rights reserved Published by The Open Group, 2011 TOGAF 9.1 Changes Overview Slide 2
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
ARCHIMATE 2.1 A POCKET GUIDE The Open Group Publications available from Van Haren Publishing The TOGAF Series: TOGAF Version 9.1 TOGAF Version 9.1 A Pocket Guide TOGAF 9 Foundation Study Guide, 3rd Edition
More informationThe Open Group Certification for People. IT4IT Program Configuration
The Open Group Certification for People IT4IT Program Configuration Version 1.0 March 2016 Copyright 2016, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval
More informationPlanning and Implementing ITIL in ICT Organisations
CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to
More informationcorso Pragmatic Roadmapping with IBM Rational System Architect and ArchiMate White Paper Executive Summary Introduction By Martin Owen, CEO, CORSO
corso White Paper Pragmatic Roadmapping with IBM Rational System Architect and ArchiMate By Martin Owen, CEO, CORSO Executive Summary Roadmapping is a fundamental part of strategic planning and enterprise
More informationDelin Mathew, Developping a Semantic Mapping between TOGAF and BSI-IT-Grundschutz
Delin Mathew, delin.mathew@rwth-aachen.de Developping a Semantic Mapping between TOGAF and BSI-IT-Grundschutz Background Enterprise Architecture (EA) Enterprise Architecture Framework (EAF) Zachman Framework,
More informationWhy do architects need more than TOGAF?
Why do architects need more than TOGAF? To bridge the gap between a high-level management framework for EA and solution/implementation projects You need something like BCS professional certificates in
More informationTechnology Transformation. Transformation. Excellence. Governance. PMO
Technology Transformation Transformation. Excellence. Governance. PMO THE FIRM Resilience& is a UK-based network of independently owned and managed consulting firms and independent experts who are leading
More informationSHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure
SHANGHAI We predict that, in the next three years, more companies will outsource their infrastructure needs and migrate their infrastructure platforms to cloud systems. Promotions will occur less often
More informationThe Open Group Certification for People. TOGAF Program Configuration
The Open Group Certification for People TOGAF Program Configuration Version 1.1 June 2016 Copyright 2014-2016, The Open Group All rights reserved. This publication may be reproduced, stored in a retrieval
More informationBPMN, Capabilities and Requirements in QualiWare Lifecycle Manager
BPMN, Capabilities and Requirements in QualiWare Lifecycle Manager Version: 2017-01-24 2017 CloseReach Ltd. All Rights Reserved 1 Workshop Content A brief introduction to Business Process Model and Notation
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationEnterprise Architect for an Enterprise Architecture. The combination of Sparx EA and ArchiMate 2.0
Enterprise Architect for an Enterprise Architecture The combination of Sparx EA and ArchiMate 2.0 Introduction Bert Dingemans Independent architect and EA consultant Specialised in architecture repositories
More informationDigital Service Management (DSM)
Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is
More informationEXIN Expert in IT Service Management based on ISO/IEC Preparation Guide
EXIN Expert in IT Service Management based on ISO/IEC 20000 Preparation Guide Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
ARCHIMATE 3.0 A POCKET GUIDE The Open Group Publications available from Van Haren Publishing The TOGAF Series: TOGAF Version 9.1 TOGAF Version 9.1 A Pocket Guide TOGAF 9 Foundation Study Guide, 3rd Edition
More information"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary
Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationEnterprise Architecture Frameworks
Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises
More informationSABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )
SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures
More informationHPE Enterprise Maps Data Model, ArchiMate, TOGAF. HPE Software, Cloud and Automation
HPE Enterprise Maps Data Model, ArchiMate, TOGAF HPE Software, Cloud and Automation Data Model Enterprise Maps ArchiMate Overview Modeling language for EA 2002-2004 - NL university + government + industry
More information1. What is the relationship between non-functional requirements and technology architecture?
SAP EDUCATION SAMPLE QUESTIONS: P_EA_1 SAP Certified Professional - Enterprise Architect Disclaimer: These sample questions are for self-evaluation purposes only and do not appear on the actual certification
More informationCOBIT 5 Update October 2010
COBIT 5 Update October 2010 ISACA Tel Aviv Chapter Conference October 20th, 2010 Kaya Kazmirci ISACA Istanbul Chapter President COBIT 5 Initiative The initiative charge from the Board of Directors is to
More informationIT Expert (Enterprise Network and Infrastructure Architect)
IT Expert (Enterprise Network and Infrastructure Architect) Reference 2015-221-EXT Type of contract Who can apply Salary Working time Place of work Closing date for applications Fixed-term contract which
More informationAvancier Methods (AM) Software Architecture Diagrams
Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission
More informationTOGAF Transforming Business
TOGAF 9.2 - Transforming Business The Open Group EA Forum ArchiMate, DirecNet, Making Standards Work, OpenPegasus, Platform 3.0, The Open Group, TOGAF, UNIX, and The Open Brand X logo are registered trademarks
More informationStrategy & Architecture Framework. Modeling Language Alain De Preter - All rights reserved - Tous droits réservés
Strategy & Architecture Framework Modeling Language Modeling Language Performers People Tools & Repositories Competitive Advantage perform Knowledge & control Process Methods Guidelines & Techniques TO-BE
More informationTOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:
TOGAF Certified (Level 1 and 2) 9.1 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (vouchers included) Accredited By: The Open Group
More informationThe South African EA Forum
The South African EA Forum Follow the EA Forum on Twitter Our upcoming events Twitter: @EAforumSA #ogza http://opengroup.co.za/ea-forum Leading the development of open, vendor-neutral IT standards and
More informationConceptual Framework
ArchiMate in a Nutshell v11 Conceptual Framework Generic Meta Model / Framework / Meta Model Creative Commons Attribution-No Derivative Works Licence 2.0 Attribution: You may copy, distribute and display
More informationENTERPRISE ARCHITECTS CONCERN LEGAL REQUIREMENTS FOR THE COMPLIANCE WITH THE LAW
ENTERPRISE ARCHITECTS CONCERN LEGAL REQUIREMENTS FOR THE COMPLIANCE WITH THE LAW Vytautas ČYRAS Vilnius University Lithuania Vytautas.Cyras@mif.vu.lt Reinhard RIEDL Bern University of Applied Sciences
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationIT GOVERNANCE AND CORPORATE STRATEGY
IT GOVERNANCE AND CORPORATE STRATEGY Lawrence Ribeiro October 2014 Agenda n What is IT governance? n What are the results of IT governance? n IT governance and Enterprise Architecture n IT governance solution
More informationAgenda. TÜV Secure it GmbH short introduction. Risk Analysis Case Study. Certification Procedure. w w w. t u v. c o m 2/ 18. TÜV Secure it GmbH 2003
Agenda TÜV Secure it GmbH short introduction Risk Analysis Case Study Certification Procedure 2/ 18 Let TÜV Secure it Be Your Guide Who we are. Subsidiary of TÜV Rheinland Group TÜV Secure it: Specialists
More informationCOBIT 5 Implementation Certification Training Course - Brochure
COBIT 5 Implementation Certification Training Course - Brochure Unlock your True Potential Course Name : COBIT 5 Implementation Version : INVL_Cobit5_BR_02_080_1.1 Course ID : ITSG-131 www.invensislearning.com
More informationArchiMate Certification for People Conformance Requirements
ArchiMate Certification for People Conformance Requirements Version 2.0.1 January 2013 Copyright 2013, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval
More informationDOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI Page 1 Page 2 cobit 5 for risk isaca information assurance cobit 5 for risk pdf cobit 5 for risk isaca information assurance
More informationOn the Design and Implementation of a Generalized Process for Business Statistics
On the Design and Implementation of a Generalized Process for Business Statistics M. Bruno, D. Infante, G. Ruocco, M. Scannapieco 1. INTRODUCTION Since the second half of 2014, Istat has been involved
More informationExam Requirements v4.1
COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information
More informationTOGAF Enterprise Edition Version 8.1
TOGAF Enterprise Edition Version 8.1 A Presentation to the The Open Group Architecture Briefing San Diego 4 th February 2004 Graham John Spencer Bird Vice Director, President Architecture Forum Mobile
More informationSPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES
SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES Dear Executive, you requested more information, here are three quick questions Would you know if your company
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationEIRA v Release notes
EIRA v2.0.0 Release notes Disclaimer: ArchiMate is a registered trademarks of The Open Group. ArchiMate is copyright of The Open Group. All rights reserved. Archi is a registered trademark of Phillip Beauvoir.
More informationArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology
ArchiMate Core Structural Concepts Behavioral Concepts Informational Concepts interaction Technology Application Layer Concept Description Notation Concept Description Notation Actor An organizational
More informationISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014
ISACA MADRID DECEMBER 2014 Robert E Stroud CEGIT CRISC International President December 2014 CHANGING DYNAMICS OF BUSINESS Source: http://www.securedgenetworks.com/secure-edge-networks-blog/bid/84023/10-ways-mobile-device-management-can-help-your-school
More informationBusiness Architecture concepts and components: BA Process Flow
Business Architecture concepts and components: BA Process Flow Giulio Barcaroli Directorate for Methodology and Statistical Process Design Istat ESTP Training Course Enterprise Architecture and the different
More informationGeneric vs. Domain-specific Modeling Languages
Generic vs. Domain-specific Modeling Languages Knut Hinkelmann Generic vs. Domain-specific Modeling Languages Domain-specific languages are notation which are defined to model knowledge about a specific
More informationIT123: SABSA Foundation Training
IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom
More informationStudy Guide. ArchiMate 3 Foundation. Sample. Preparation for the ArchiMate 3 Part 1 Examination. Prepared by Andrew Josey, The Open Group
Study Guide ArchiMate 3 Foundation Preparation for the ArchiMate 3 Part 1 Examination Prepared by Andrew Josey, The Open Group Copyright 2014-2017, The Open Group All rights reserved. No part of this publication
More informationFrameworks and Standards
Frameworks and Standards Chris Davis and Mike Schiller. IT Auditing: Using Controls to Protect Information Assets (second edition) Autumn, 2011 Prepared by Nataliia Semenenko Content Why do we need frameworks
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More informationTraining Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner
Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationCISO as Change Agent: Getting to Yes
SESSION ID: CXO-W02F CISO as Change Agent: Getting to Yes Frank Kim Chief Information Security Officer SANS Institute @fykim Outline Catch the Culture Shape the Strategy Build the Business Case 2 #1 Catch
More informationEIRA v Release notes
EIRA v2.1.0 Release notes Disclaimer: ArchiMate is a registered trademarks of The Open Group. ArchiMate is copyright of The Open Group. All rights reserved. Archi is a registered trademark of Phillip Beauvoir.
More informationEuropean Interoperability Reference Architecture (EIRA) overview
European Interoperability Reference Architecture (EIRA) overview Version 0.8.3 beta 09/01/2015 ISA Action 2.1: European Interoperability Architecture Specific Contract N. 54 Framework contract N. DI/07171
More informationThe Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide
Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,
More informationIntegrated Management Systems. Dr. David Brewer, FBCS, MIOD
Integrated Management Systems Dr. David Brewer, FBCS, MIOD Agenda Introduction Theoretical framework Practical experience Current state-of-the-art Benefits Summary INTRODUCTION What is a management system?
More informationCO-EVOC: An Enterprise Architecture Model Co-Evolution Operations Catalog
CO-EVOC: An Enterprise Architecture Model Co-Evolution Operations Catalog Nuno Silva University of Lisbon nuno.miguel@tecnico.ulisboa.pt Completed Research Miguel Mira da Silva University of Lisbon mms@tecnico.ulisboa.pt
More informationDoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 2: Architectural Data and Models Architect s Guide 28 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION PAGE 1. INTRODUCTION...
More informationLeveraging COBIT to Implement Information Security
DISCUSS THIS ARTICLE Leveraging COBIT to Implement Information By John Frisken, CA COBIT Focus 5 May 2015 In delivering IT security consulting services to large enterprises in Australia, particularly in
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationCOBIT 5 Implementation
COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical
More informationThe ASEAN Energy Management Scheme: an example of successful regional cooperation
The ASEAN Energy Management Scheme: an example of successful regional cooperation Pierre Cazelles Regional Advisor - AEMAS Director Partnerships Asia, International Copper Association Energy Efficiency
More informationImproving the Practice of DoD Architecting with the Architecture Specification Model
Improving the Practice of DoD Architecting with the Architecture Specification Model Huei Wan Ang, Dave Nicholson, and Brad Mercer The MITRE Corporation Abstract As the Department of Defense (DoD) moves
More informationแนวทางการพ ฒนา Information Security Professional ในประเทศไทย
แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information
More informationGoing UP? More you know, less you no! How to talk about Privacy with your boss in the elevator?
Going UP? How to talk about Privacy with your boss in the elevator? Before you do things right, you have to do the right things. Why good communication between business and IT areas is so important to
More informationPredstavenie štandardu ISO/IEC 27005
PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,
More informationThe Evolution of IT Service Management
The Evolution of IT Service Management IT Service Management And Convergence of ITIL, ASL, ISO, and COBIT BCS Rideau Presentation March 21 st 2007 Phil Mustaphi Discussion Topics Introduction ITIL why,
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationAn informal discussion Life Cycle Interaction & Control Points for Enterprise ~ Solution Architecture.
An informal discussion Life Cycle Interaction & Control Points for Enterprise ~ Solution Architecture. Manchester - 27 th March 2018 Daljit Roy Banger MSc FBCS EA SIG Hosted by the BCS Manchester Branch
More informationPresent. 5th May - Chennai. Internal. auditing. today: Beginning Auditor Tools and Techniques. 6 CPE hours.
Present 5th May - Chennai Internal auditing today: Beginning Auditor Tools and Techniques 6 CPE hours www.achromicpoint.com About the Seminar To become a successful auditor, a strong base of knowledge
More informationUsing ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL Relationship
Using ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL Relationship Marco Vicente 1, Nelson Gama 1,2, and Miguel Mira da Silva 1 1 Instituto Superior Tecnico, Av Rovisco Pais, 1049-001
More informationWhat is ISO/IEC 27001?
An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...
More informationC106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT
C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005
More informatione-leadership metrics and scoreboard
LEAD E-Leadership Skills for Small and Medium Sized Enterprises e-leadership metrics and scoreboard Service contract for the European Commission Eriona Dashja empirica GmbH Enterprise and Industry General
More information