SlideShare a Scribd company logo
1 of 33
Enterprise
Systems
Architecture
Daljit R Banger FBCS
Aligning the Business
Operating Model and
the Technology
Ecosystem
Webinar : 28th June 2023
Video available available for AEA
Members at the AEA Portal
Agenda
• Part 1
• Definitions
• Some Basic Thinking
• A View – A Notional Stack
• Layers Discussed
• BOM
• Business Process
• Technology Layers (Capability-Service-Enabler)
• Alternate Views of Value
• Data layer
• Hygiene Services
• Part 2
• EU PSD2
• Data Privacy
• Recap
• Final Thought
• Q&A
} Intro / Stack View 25 Mins
} Use Cases 20 Mins
} Q&A 10~15 Mins
About Me
• 40 years of Industry proven experience having undertaken assignments
across the globe; UK, USA, Sweden, Switzerland, Finland, Hong Kong,
Brazil all on behalf of large multinational companies developing and
delivering IT Systems and Capabilities.
• Developed several systems, and successfully managed large professional
teams of Architects, Developers and Analysts,
• Published numerous articles and blogs.
• Master of Science (MSc) Degree and is a charted fellow of the BCS
(FBCS). As an active member in the British Computer Society (BCS) he
currently co-chairs the Enterprise Architecture Specialist Group and is an
elected member of the BCS Council)
• Book “Enterprise Systems Architecture – Aligning Business Operating
Models to Technology Landscapes” available on a wide variety of
platforms.
• Sad fact - In the Late 80’s I set up a Turbo C User Group in the UK and produced a
regular newsletter ,which I would post out via snail mail for the fun.
Innumerable EA definitions
Source for definitions : Multiple Web Sites
A Simple View/Definition
External Forces
Disruptors
Organization
Technology Ecosystem
Drives, Delivers and
Maintains Capabilities that
enable and support the
Organization in its mission
Creates, delivers and maintains
Value while seeking to meet its
Charter and Obligations
Other
Change Agents Structure and organize its
resources to deliver the
desired outcomes
Manage, Procure, Build and
Leverage Various Digital
Services to enable the desired
outcomes supporting change
Other
Change Agents
Realizing our Definition Contd..
The Stack (Another View)
1.Align and focus ICT and associated activities to
delivering value to the BOM
2.Developing Technology Synergies and cost
efficiencies
3.Promote Re-using System Components
4.Exposing System Services to new processes.
5.Understanding the impact of any change for
new systems on the performance and capacity
of enabling technologies
Dissecting the Stack – Level 0 (BOM)
BOM – Concerns to Consider
?
External
forces
Government
Regulators
Markets
Influential
Individuals
Competitors
Drivers for
Change
Strategy
Industry
cognitive AI
Climate
Pandemic
State
disruptors
Enterprise
Structure
Corp
Target
Lines of
business
Business
Models
B2B
B2C
C2B
C2C
Information
resources
Pull
Push
Financial
Management
Capital
Management
Funding
Cash Flow
Reporting
See YouTube Video : https://youtu.be/MYzh1DZ-vyE
Importance of understanding the BOM
Analyse the current
situation of your
organization.- Value
Streams , Forces,
Disruptors etc
Optimisation /
Efficiency
Drivers and
Capabilities
Determine the
Target
Operating
Model for the
organization.
Develop an
action plan.
Conduct a
'Proof of
Concept' - Tip
the Toes
before Diving
in !
Implement the
change plan.
Review /
Recalibrate
By analyzing and understanding the various
components of the Business and the Environment that
it operates in one and can plan for any drivers or
industry initiations that will impact the technology
ecosystem moving forward.
The Operating Model we move to the next level which
is the level that seeks to address the business
processes required to deliver the operating model and
more importantly address the process orchestrations
as we move through the various value delivering
streams of activity.
The BOM enables the understanding and
definition of an operating model (current /
future) this requires various process (level 1)
which when orchestrated act as the enablers
to deliver the value and drive the capabilities
(Level 2)
Level 1 – Business Processes
Process
Fundamentals Process
Representation
Business Processes
Core
Represents, at a minimum, the
individual tasks to be accomplished
to achieve a certain level of
uniformity in output, without
consideration to any underlying
resources (people, technology etc.).
e.g., take order, which can be
executed simply by writing on a
piece of paper the order or as
complex as capture via an order
entry system. However, irrespective
of approach, this is still an essential
process in the sales lifecycle that
must be captured and understood.
Guiding
Used as guardrails in the design
and governance of the
organization. In some cases, these
processes may be dictated in part
and audited by third parties e.g.,
evidence of Identity checks, which
may be part of a regulatory
requirement for finance
companies.
Enabling
Provide the fulfilment of a core
business process and subsequent
delivery of capabilities e.g., IT
Service Delivery, Marketing, HR etc.
Business Processes Cont.
Technology Centric Layers
Alternate View (Capability – Service – Enabler)
Example : Capability – Service – Enabler
A ‘Classification’ and Control Mechanism for
functional enablement
MES = Manufacturing Execution System
Technology Layers – Alternate Representations
Service to Application View
Leve 0 / Level 1 Enterprise Views (IAM Example)
System Context (API Example) View
The Stack is there to support the
mindset and act as another tick list
– However, for project specific
work will require various diagram
views
Enterprise Data Management
Data
People
Related
Reference
Operational
Financial
Asset
Systems /
Pipelines
Transactional
Transient
Master
V
Dimensions
AI Learning
Data
Cross Cutting Hygiene Services
Non
Functionals
Putting it all together - Single Unified View
PART 2
• EU PSD2
• Data Privacy
Industry Disruptor – EU PSD-2
The EU European Payment Services Directive (EU) 2015/2366 (PSD-2) - 2018
PSD-2 is having major impact on established companies operating in the financial sector, with the intent to further secure payments and
drive the unification of transactions via elevation of Application Program Interfaces (APIs) supported by the ‘Open Banking’ initiative
where there is a focus on securely exchanging data by connecting banks, third parties and technical providers under one interconnected
technical ecosystem
Introducing the concept of ‘trust and consent’ which must be given, obtained, revoked, validated and
time stamped for the new models to work.
A Payment Initiation Service Provider (PISP) lets a customer pay companies directly from their bank account rather
than using a debit or credit card through a third-party adopting the following simplistic workflow.
1. Customer provides ‘Consent’ to authorizes the PISP to transact using a designated bank account with their bank
where the authority is registered as Active.
2. Customer Initiates Purchase through a Digital Channel which accepts the payment method via the PISP
3. Merchant accepts the method of payment
4. Transaction is transferred to the PISP for payment
5. PISP Makes an API Call to the customer bank to check available funds and request funds transfer
6. Confirmation of funds and payment initiation sent performed to merchant.
7. Bank validates and releases funds to the merchant bank
8. Merchants bank account updated to reflect the credit.
Industry Disruptor – EU PSD-2 Cont.
Use Cases
PISP Workflow
AISP Workflow
Simple View/Definition
Impact on Service Provision (API) - PSD-2 Cont.
Expanding View to a Pattern / Solution
Simplifying Complexity for Stakeholders
Regulatory Change – EU GDPR
GDPR had a major impact on the way
organization collected, processed,
transformed, stored, presented, and
consumed information. This impact prior to
the law coming into force required
organizations to analyze subsequent impact
on their technology landscape and any new
capabilities to ensure compliance
On May 2018 the European Union’s General
Data Protection Regulation (GDPR) [21] came
into force representing the regulation for data
protection, privacy, and the transfer of
personal data outside of the EU and the
European Economic Area (EEA)
Regulatory Change – EU GDPR Contd..
Business Operating Model (BOM)
The key driver for change from the regulation was the
potential fines for non-compliance which influenced
changes to the BOM.
The appointment or nomination of an Organization Data
Protection Officer (DPO), whilst a standard function in
many government agencies and departments is now
replicated in the non-government sectors.
Consideration needed to need to be given to methods
and techniques for presenting, pulling, consuming, and
pushing information in and out of the organization
Business processes
Many organizations adopted a modified BOM and modified core
business processes with a major impact on existing projects in
which required be recalibration to meet the requirements of GDPR.
Additional Management and Reporting of GDPR was inevitable and
organizations re-evaluated existing business and technical process
(triggers, execution methods, data sets) for reporting. This analysis
resulted in the introduction or refinement of additional processes
some of which, but not limited to, were processes to support;
• The Management of Subject Access Requests (SARs)
• Complaints receipt and handling
• Notifications (received and sent) to Data Subjects
• Information retention (audit/traceability)
• Governance of Data and associated controls
• The DPO in their duties.
Capabilities Services
The channels of data exchange between the enterprise and data
subjects required review and in many cases updating, as this is the
point at which the subject provided his/her data to the Enterprise
Applications
The channels of data exchange between the enterprise
and data Applications which interacted with Users and
captured information required evaluation to ensure that
“consent was freely given” for the use of this information.
In case of Commercial off-the-shelf packages then the
requirement could easily be pushed back to the
vendor/supplier. However, in-house or 3rd party
developed custom development may have required
refactoring.
Applications which extract, transform, and push or pull
subject data to any 3rd party System internal or external
to the Organization would require analysis and, in many
cases, flagged for recalibration to ensure they remained
compliant with GDPR.
Data and Information
GDPR is a data-centric policy and therefore impacted the
way information was collected, transformed, shared, and
persisted both internally and externally of the organization.
Analysis of existing stores and custodians of the stores
required analysis, especially as full transparency must be
shown on who has access rights to the data and how those
access rights were controlled
DPOs required new Reporting Data Stores to enable them
to perform their duties in terms of analysis and regulatory
reporting where any data transferred outside of the
organization and outside of the country of operation
required closer scrutiny.
Data and Information Insights had to be developed to
ensure compliance was not only met but shown to be met
down to data objects in physical databases.
Technology Services
Most Technology Services i.e., the enablers will require semi-
analysis as there may be a need to analyze how the information
flows are orchestrated, both in and out of these domains,
Hygiene Services
• Disaster Recover System
•Security
One of the requirements of GDPR is the production of Data
Protection Impact Assessments or DPIAs – One can argue
UK Government Security Officers produce similar information
in the form of Risk Management & Accreditation Document
Set (RMADS) for secure accredited systems.
Regulatory Change – EU GDPR Contd..
Business Operating Model (BOM)
The key driver for change from the regulation was the
potential fines for non-compliance which influenced
changes to the BOM.
The appointment or nomination of an Organization Data
Protection Officer (DPO), whilst a standard function in
many government agencies and departments is now
replicated in the non-government sectors.
Consideration needed to need to be given to methods
and techniques for presenting, pulling, consuming, and
pushing information in and out of the organization
Business processes
Many organizations adopted a modified BOM and modified core
business processes with a major impact on existing projects in
which required be recalibration to meet the requirements of GDPR.
Additional Management and Reporting of GDPR was inevitable and
organizations re-evaluated existing business and technical process
(triggers, execution methods, data sets) for reporting. This analysis
resulted in the introduction or refinement of additional processes
some of which, but not limited to, were processes to support;
• The Management of Subject Access Requests (SARs)
• Complaints receipt and handling
• Notifications (received and sent) to Data Subjects
• Information retention (audit/traceability)
• Governance of Data and associated controls
• The DPO in their duties.
Capabilities Services
The channels of data exchange between the enterprise and data
subjects required review and in many cases updating, as this is the
point at which the subject provided his/her data to the Enterprise
Applications
The channels of data exchange between the enterprise
and data Applications which interacted with Users and
captured information required evaluation to ensure that
“consent was freely given” for the use of this information.
In case of Commercial off-the-shelf packages then the
requirement could easily be pushed back to the
vendor/supplier. However, in-house or 3rd party
developed custom development may have required
refactoring.
Applications which extract, transform, and push or pull
subject data to any 3rd party System internal or external
to the Organization would require analysis and, in many
cases, flagged for recalibration to ensure they remained
compliant with GDPR.
Data and Information
GDPR is a data-centric policy and therefore impacted the
way information was collected, transformed, shared, and
persisted both internally and externally of the organization.
Analysis of existing stores and custodians of the stores
required analysis, especially as full transparency must be
shown on who has access rights to the data and how those
access rights were controlled
DPOs required new Reporting Data Stores to enable them
to perform their duties in terms of analysis and regulatory
reporting where any data transferred outside of the
organization and outside of the country of operation
required closer scrutiny.
Data and Information Insights had to be developed to
ensure compliance was not only met but shown to be met
down to data objects in physical databases.
Technology Services
Most Technology Services i.e., the enablers will require semi-
analysis as there may be a need to analyze how the information
flows are orchestrated, both in and out of these domains,
Hygiene Services
• Disaster Recover System
•Security
One of the requirements of GDPR is the production of Data
Protection Impact Assessments or DPIAs – One can argue
UK Government Security Officers produce similar information
in the form of Risk Management & Accreditation Document
Set (RMADS) for secure accredited systems.
Value Creation
Value Preservation
Summary
Change is the only constant in life. - Heraclitus
Control
Inform
Direct
Final Thought
Questions &
Answers
Thank You
20% coupon DALBOOK20 is redeemable until July 29, 2023, for
use on ISBN 978-1-4842-8646-3 on link https://link.springer.com/

More Related Content

Similar to Presentation to the AEA (June 23)

40411923 business-analyst
40411923 business-analyst40411923 business-analyst
40411923 business-analystHar Da
 
Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020Accenture
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITILconnorsmaureen
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799Mulyadi Yusuf
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business caseRaquel Miranda
 
Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets  Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets InnoTech
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3Home
 
Legal Transformation and Contract Remediation
Legal Transformation and Contract RemediationLegal Transformation and Contract Remediation
Legal Transformation and Contract Remediationaccenture
 
Sample audit plan
Sample audit planSample audit plan
Sample audit planMaher Manan
 
Incepting Enterprise Applications
Incepting Enterprise ApplicationsIncepting Enterprise Applications
Incepting Enterprise ApplicationsGem WeBlog
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model OverviewMark Peacock
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Trainingjogemwind
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 
Ea As A Strategy M Veeraragaloo Approach
Ea As A Strategy   M Veeraragaloo ApproachEa As A Strategy   M Veeraragaloo Approach
Ea As A Strategy M Veeraragaloo ApproachMaganathin Veeraragaloo
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance programJohn Goodpasture
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2Sukumar Daniel
 
Running Your IT Helpdesk with Salesforce Service & Support
Running Your IT Helpdesk with Salesforce Service & SupportRunning Your IT Helpdesk with Salesforce Service & Support
Running Your IT Helpdesk with Salesforce Service & Supportdreamforce2006
 

Similar to Presentation to the AEA (June 23) (20)

40411923 business-analyst
40411923 business-analyst40411923 business-analyst
40411923 business-analyst
 
Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITIL
 
Business analyst
Business analystBusiness analyst
Business analyst
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business case
 
Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets  Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 
Vivek cv
Vivek cvVivek cv
Vivek cv
 
Legal Transformation and Contract Remediation
Legal Transformation and Contract RemediationLegal Transformation and Contract Remediation
Legal Transformation and Contract Remediation
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Incepting Enterprise Applications
Incepting Enterprise ApplicationsIncepting Enterprise Applications
Incepting Enterprise Applications
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model Overview
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 
Ea As A Strategy M Veeraragaloo Approach
Ea As A Strategy   M Veeraragaloo ApproachEa As A Strategy   M Veeraragaloo Approach
Ea As A Strategy M Veeraragaloo Approach
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2ITSM Transformation Strategies V 2
ITSM Transformation Strategies V 2
 
Running Your IT Helpdesk with Salesforce Service & Support
Running Your IT Helpdesk with Salesforce Service & SupportRunning Your IT Helpdesk with Salesforce Service & Support
Running Your IT Helpdesk with Salesforce Service & Support
 

More from Daljit Banger

Enterprise Architecture -A Recap : What, Why and Value
Enterprise Architecture  -A  Recap : What, Why and ValueEnterprise Architecture  -A  Recap : What, Why and Value
Enterprise Architecture -A Recap : What, Why and ValueDaljit Banger
 
Architectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project LifecycleArchitectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project LifecycleDaljit Banger
 
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...Daljit Banger
 
Developing a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable PatternDeveloping a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable PatternDaljit Banger
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Daljit Banger
 
Building a ICT Strategy with an Enterprise Architecture Mindset
Building a ICT Strategy  with an Enterprise Architecture MindsetBuilding a ICT Strategy  with an Enterprise Architecture Mindset
Building a ICT Strategy with an Enterprise Architecture MindsetDaljit Banger
 
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...Daljit Banger
 
Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Daljit Banger
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Daljit Banger
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture Daljit Banger
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016Daljit Banger
 
ICT Strategy Development Slides
ICT Strategy Development SlidesICT Strategy Development Slides
ICT Strategy Development SlidesDaljit Banger
 
EA Secuity Thinking - Practical Exercise
EA Secuity Thinking - Practical Exercise EA Secuity Thinking - Practical Exercise
EA Secuity Thinking - Practical Exercise Daljit Banger
 
BCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro SlidesBCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro SlidesDaljit Banger
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) Daljit Banger
 

More from Daljit Banger (16)

Enterprise Architecture -A Recap : What, Why and Value
Enterprise Architecture  -A  Recap : What, Why and ValueEnterprise Architecture  -A  Recap : What, Why and Value
Enterprise Architecture -A Recap : What, Why and Value
 
Architectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project LifecycleArchitectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project Lifecycle
 
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
 
Developing a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable PatternDeveloping a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable Pattern
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Building a ICT Strategy with an Enterprise Architecture Mindset
Building a ICT Strategy  with an Enterprise Architecture MindsetBuilding a ICT Strategy  with an Enterprise Architecture Mindset
Building a ICT Strategy with an Enterprise Architecture Mindset
 
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...
 
Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
 
ICT Strategy Development Slides
ICT Strategy Development SlidesICT Strategy Development Slides
ICT Strategy Development Slides
 
EA Secuity Thinking - Practical Exercise
EA Secuity Thinking - Practical Exercise EA Secuity Thinking - Practical Exercise
EA Secuity Thinking - Practical Exercise
 
BCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro SlidesBCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro Slides
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015)
 

Recently uploaded

Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 

Recently uploaded (20)

Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 

Presentation to the AEA (June 23)

  • 1. Enterprise Systems Architecture Daljit R Banger FBCS Aligning the Business Operating Model and the Technology Ecosystem Webinar : 28th June 2023 Video available available for AEA Members at the AEA Portal
  • 2. Agenda • Part 1 • Definitions • Some Basic Thinking • A View – A Notional Stack • Layers Discussed • BOM • Business Process • Technology Layers (Capability-Service-Enabler) • Alternate Views of Value • Data layer • Hygiene Services • Part 2 • EU PSD2 • Data Privacy • Recap • Final Thought • Q&A } Intro / Stack View 25 Mins } Use Cases 20 Mins } Q&A 10~15 Mins
  • 3. About Me • 40 years of Industry proven experience having undertaken assignments across the globe; UK, USA, Sweden, Switzerland, Finland, Hong Kong, Brazil all on behalf of large multinational companies developing and delivering IT Systems and Capabilities. • Developed several systems, and successfully managed large professional teams of Architects, Developers and Analysts, • Published numerous articles and blogs. • Master of Science (MSc) Degree and is a charted fellow of the BCS (FBCS). As an active member in the British Computer Society (BCS) he currently co-chairs the Enterprise Architecture Specialist Group and is an elected member of the BCS Council) • Book “Enterprise Systems Architecture – Aligning Business Operating Models to Technology Landscapes” available on a wide variety of platforms. • Sad fact - In the Late 80’s I set up a Turbo C User Group in the UK and produced a regular newsletter ,which I would post out via snail mail for the fun.
  • 4. Innumerable EA definitions Source for definitions : Multiple Web Sites
  • 5. A Simple View/Definition External Forces Disruptors Organization Technology Ecosystem Drives, Delivers and Maintains Capabilities that enable and support the Organization in its mission Creates, delivers and maintains Value while seeking to meet its Charter and Obligations Other Change Agents Structure and organize its resources to deliver the desired outcomes Manage, Procure, Build and Leverage Various Digital Services to enable the desired outcomes supporting change
  • 7. The Stack (Another View) 1.Align and focus ICT and associated activities to delivering value to the BOM 2.Developing Technology Synergies and cost efficiencies 3.Promote Re-using System Components 4.Exposing System Services to new processes. 5.Understanding the impact of any change for new systems on the performance and capacity of enabling technologies
  • 8. Dissecting the Stack – Level 0 (BOM)
  • 9. BOM – Concerns to Consider ? External forces Government Regulators Markets Influential Individuals Competitors Drivers for Change Strategy Industry cognitive AI Climate Pandemic State disruptors Enterprise Structure Corp Target Lines of business Business Models B2B B2C C2B C2C Information resources Pull Push Financial Management Capital Management Funding Cash Flow Reporting See YouTube Video : https://youtu.be/MYzh1DZ-vyE
  • 10. Importance of understanding the BOM Analyse the current situation of your organization.- Value Streams , Forces, Disruptors etc Optimisation / Efficiency Drivers and Capabilities Determine the Target Operating Model for the organization. Develop an action plan. Conduct a 'Proof of Concept' - Tip the Toes before Diving in ! Implement the change plan. Review / Recalibrate By analyzing and understanding the various components of the Business and the Environment that it operates in one and can plan for any drivers or industry initiations that will impact the technology ecosystem moving forward. The Operating Model we move to the next level which is the level that seeks to address the business processes required to deliver the operating model and more importantly address the process orchestrations as we move through the various value delivering streams of activity. The BOM enables the understanding and definition of an operating model (current / future) this requires various process (level 1) which when orchestrated act as the enablers to deliver the value and drive the capabilities (Level 2)
  • 11. Level 1 – Business Processes Process Fundamentals Process Representation
  • 12. Business Processes Core Represents, at a minimum, the individual tasks to be accomplished to achieve a certain level of uniformity in output, without consideration to any underlying resources (people, technology etc.). e.g., take order, which can be executed simply by writing on a piece of paper the order or as complex as capture via an order entry system. However, irrespective of approach, this is still an essential process in the sales lifecycle that must be captured and understood. Guiding Used as guardrails in the design and governance of the organization. In some cases, these processes may be dictated in part and audited by third parties e.g., evidence of Identity checks, which may be part of a regulatory requirement for finance companies. Enabling Provide the fulfilment of a core business process and subsequent delivery of capabilities e.g., IT Service Delivery, Marketing, HR etc.
  • 15. Alternate View (Capability – Service – Enabler)
  • 16. Example : Capability – Service – Enabler A ‘Classification’ and Control Mechanism for functional enablement MES = Manufacturing Execution System
  • 17. Technology Layers – Alternate Representations Service to Application View Leve 0 / Level 1 Enterprise Views (IAM Example) System Context (API Example) View The Stack is there to support the mindset and act as another tick list – However, for project specific work will require various diagram views
  • 18. Enterprise Data Management Data People Related Reference Operational Financial Asset Systems / Pipelines Transactional Transient Master V Dimensions AI Learning Data
  • 19. Cross Cutting Hygiene Services Non Functionals
  • 20. Putting it all together - Single Unified View
  • 21. PART 2 • EU PSD2 • Data Privacy
  • 22. Industry Disruptor – EU PSD-2 The EU European Payment Services Directive (EU) 2015/2366 (PSD-2) - 2018 PSD-2 is having major impact on established companies operating in the financial sector, with the intent to further secure payments and drive the unification of transactions via elevation of Application Program Interfaces (APIs) supported by the ‘Open Banking’ initiative where there is a focus on securely exchanging data by connecting banks, third parties and technical providers under one interconnected technical ecosystem Introducing the concept of ‘trust and consent’ which must be given, obtained, revoked, validated and time stamped for the new models to work. A Payment Initiation Service Provider (PISP) lets a customer pay companies directly from their bank account rather than using a debit or credit card through a third-party adopting the following simplistic workflow. 1. Customer provides ‘Consent’ to authorizes the PISP to transact using a designated bank account with their bank where the authority is registered as Active. 2. Customer Initiates Purchase through a Digital Channel which accepts the payment method via the PISP 3. Merchant accepts the method of payment 4. Transaction is transferred to the PISP for payment 5. PISP Makes an API Call to the customer bank to check available funds and request funds transfer 6. Confirmation of funds and payment initiation sent performed to merchant. 7. Bank validates and releases funds to the merchant bank 8. Merchants bank account updated to reflect the credit.
  • 23. Industry Disruptor – EU PSD-2 Cont. Use Cases PISP Workflow AISP Workflow Simple View/Definition
  • 24. Impact on Service Provision (API) - PSD-2 Cont.
  • 25. Expanding View to a Pattern / Solution
  • 27. Regulatory Change – EU GDPR GDPR had a major impact on the way organization collected, processed, transformed, stored, presented, and consumed information. This impact prior to the law coming into force required organizations to analyze subsequent impact on their technology landscape and any new capabilities to ensure compliance On May 2018 the European Union’s General Data Protection Regulation (GDPR) [21] came into force representing the regulation for data protection, privacy, and the transfer of personal data outside of the EU and the European Economic Area (EEA)
  • 28. Regulatory Change – EU GDPR Contd.. Business Operating Model (BOM) The key driver for change from the regulation was the potential fines for non-compliance which influenced changes to the BOM. The appointment or nomination of an Organization Data Protection Officer (DPO), whilst a standard function in many government agencies and departments is now replicated in the non-government sectors. Consideration needed to need to be given to methods and techniques for presenting, pulling, consuming, and pushing information in and out of the organization Business processes Many organizations adopted a modified BOM and modified core business processes with a major impact on existing projects in which required be recalibration to meet the requirements of GDPR. Additional Management and Reporting of GDPR was inevitable and organizations re-evaluated existing business and technical process (triggers, execution methods, data sets) for reporting. This analysis resulted in the introduction or refinement of additional processes some of which, but not limited to, were processes to support; • The Management of Subject Access Requests (SARs) • Complaints receipt and handling • Notifications (received and sent) to Data Subjects • Information retention (audit/traceability) • Governance of Data and associated controls • The DPO in their duties. Capabilities Services The channels of data exchange between the enterprise and data subjects required review and in many cases updating, as this is the point at which the subject provided his/her data to the Enterprise Applications The channels of data exchange between the enterprise and data Applications which interacted with Users and captured information required evaluation to ensure that “consent was freely given” for the use of this information. In case of Commercial off-the-shelf packages then the requirement could easily be pushed back to the vendor/supplier. However, in-house or 3rd party developed custom development may have required refactoring. Applications which extract, transform, and push or pull subject data to any 3rd party System internal or external to the Organization would require analysis and, in many cases, flagged for recalibration to ensure they remained compliant with GDPR. Data and Information GDPR is a data-centric policy and therefore impacted the way information was collected, transformed, shared, and persisted both internally and externally of the organization. Analysis of existing stores and custodians of the stores required analysis, especially as full transparency must be shown on who has access rights to the data and how those access rights were controlled DPOs required new Reporting Data Stores to enable them to perform their duties in terms of analysis and regulatory reporting where any data transferred outside of the organization and outside of the country of operation required closer scrutiny. Data and Information Insights had to be developed to ensure compliance was not only met but shown to be met down to data objects in physical databases. Technology Services Most Technology Services i.e., the enablers will require semi- analysis as there may be a need to analyze how the information flows are orchestrated, both in and out of these domains, Hygiene Services • Disaster Recover System •Security One of the requirements of GDPR is the production of Data Protection Impact Assessments or DPIAs – One can argue UK Government Security Officers produce similar information in the form of Risk Management & Accreditation Document Set (RMADS) for secure accredited systems.
  • 29. Regulatory Change – EU GDPR Contd.. Business Operating Model (BOM) The key driver for change from the regulation was the potential fines for non-compliance which influenced changes to the BOM. The appointment or nomination of an Organization Data Protection Officer (DPO), whilst a standard function in many government agencies and departments is now replicated in the non-government sectors. Consideration needed to need to be given to methods and techniques for presenting, pulling, consuming, and pushing information in and out of the organization Business processes Many organizations adopted a modified BOM and modified core business processes with a major impact on existing projects in which required be recalibration to meet the requirements of GDPR. Additional Management and Reporting of GDPR was inevitable and organizations re-evaluated existing business and technical process (triggers, execution methods, data sets) for reporting. This analysis resulted in the introduction or refinement of additional processes some of which, but not limited to, were processes to support; • The Management of Subject Access Requests (SARs) • Complaints receipt and handling • Notifications (received and sent) to Data Subjects • Information retention (audit/traceability) • Governance of Data and associated controls • The DPO in their duties. Capabilities Services The channels of data exchange between the enterprise and data subjects required review and in many cases updating, as this is the point at which the subject provided his/her data to the Enterprise Applications The channels of data exchange between the enterprise and data Applications which interacted with Users and captured information required evaluation to ensure that “consent was freely given” for the use of this information. In case of Commercial off-the-shelf packages then the requirement could easily be pushed back to the vendor/supplier. However, in-house or 3rd party developed custom development may have required refactoring. Applications which extract, transform, and push or pull subject data to any 3rd party System internal or external to the Organization would require analysis and, in many cases, flagged for recalibration to ensure they remained compliant with GDPR. Data and Information GDPR is a data-centric policy and therefore impacted the way information was collected, transformed, shared, and persisted both internally and externally of the organization. Analysis of existing stores and custodians of the stores required analysis, especially as full transparency must be shown on who has access rights to the data and how those access rights were controlled DPOs required new Reporting Data Stores to enable them to perform their duties in terms of analysis and regulatory reporting where any data transferred outside of the organization and outside of the country of operation required closer scrutiny. Data and Information Insights had to be developed to ensure compliance was not only met but shown to be met down to data objects in physical databases. Technology Services Most Technology Services i.e., the enablers will require semi- analysis as there may be a need to analyze how the information flows are orchestrated, both in and out of these domains, Hygiene Services • Disaster Recover System •Security One of the requirements of GDPR is the production of Data Protection Impact Assessments or DPIAs – One can argue UK Government Security Officers produce similar information in the form of Risk Management & Accreditation Document Set (RMADS) for secure accredited systems.
  • 30. Value Creation Value Preservation Summary Change is the only constant in life. - Heraclitus Control Inform Direct
  • 33. Thank You 20% coupon DALBOOK20 is redeemable until July 29, 2023, for use on ISBN 978-1-4842-8646-3 on link https://link.springer.com/

Editor's Notes

  1. Today presentation will offer you something to consider in your everyday role as an Enterprise or Solutions Architect
  2. There is no single agreed universal definition of Enterprise Architecture ? As you hop from organization to organization you will see different variants being use It must also be mentioned that a multitude of styles also exist e.g., Event Driven Architecture, Service Orientated etc
  3. Business Model Represents the model an organization will adopt to create, deliver and realize value for its stakeholders considering internal and external boundaries and constraints. Business Operating Model The Business Operating Model, as the name suggests, is the modus operandi and response to delivering the outcomes and capabilities required to achieve the Business Model goals. Both are driven by the question - What is the key driver that influences the stakeholder drivers ? • Every organization, irrelevant of size, be it a commercial or not-for-profit, will have an Operating Model either created, adopted, or inherited. • Organizations will seek to optimize or restructure their operating model to deliver maximum value to their organizations through optimization and efficiency savings to deliver critical value to internal and external stakeholders regularly, especially in times of environmental turbulence i.e. operational conditions change. • Operating Models are supported by both formal and informal processes. • Processes are delivered through a group or single set of orchestrated services or capabilities. • Capabilities can be rendered or presented via a single or group of application services. • Applications exploit and leverage Information and data services to deliver value to the capabilities. • Capabilities and Services are supported by technology enablers wrapped around sets of hygiene services (discussed later). • Any changes in structure or delivery of a business operating model will impact the downstream components and may result in required changes in the technology ecosystem i.e., have an impact either on technology or processes.
  4. V Dimensions – Volume, Value, Variety Velocity Variety Visualization
  5. 2018