Here’s an interesting question for you to think about: What’s the relationship between security policy and security architecture in your organization? I mean, how related and/or connected do you think they are? True story: In one of the organizations I work with, they actually had a fairly good structure and scope to their information security […]
Your mission: save the world
Grandiose? Maybe…but hey, I’m in that kind of mood right now, because my son decided tonight was the night he wanted to watch Justice League. Fortunately, he feel asleep before the really, really scary parts at the end—well, scary for a 5 year-old…but not too scary that he didn’t want to watch it. Now, I […]
What if information didn’t flow?
About 15 or 16 years ago, I was neck-deep in SOA, federated identity and defining my own framework of IEE1471:2000 views and viewpoints that I believed were the most relevant for enterprise (business) architecture, enterprise (technology) architecture and enterprise security architecture. Obviously, I was taking my first baby-steps with SABSA for the last one, but […]
Taming the security architecture beast
I was having a very interesting conversation today with a Security Architect who has done all of the SABSA training, and one of the things he mentioned was how overwhelming it all seemed. In fact, his position was that, because it was so big, it wasn’t really practical to use the whole thing—unless you were […]
Building Effective Security Architectures “rewind” sale
I’ll make this short: Today, based on conversations I’ve been having with some of you individually over the last several weeks unwilling to wait until next year because you need it right now, I’m re-opening enrollment to the Building Effective Security Architectures program (BESA for short), and from today until next Sunday the 19th, you […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 19
- Next Page »
