SlideShare a Scribd company logo
Information Security &
Enterprise Architecture
Is information security
built-in or add-on
in the
plan, design and execution
of information and communication
systems?
Information Security
Requirements
INFORMATION
MANAGEMENT
INFORMATION SECURITY
Confidentiality Integrity Availability
1. Create
2. Store
3. Utilize
4. Share
5. Dispose
ENTERPRISE ARCHITECTURE
INFORMATION SECURITY
ENTERPRISE
ARCHITECTURE
INFORMATION SECURITY
PRINCIPLES LEGAL TECHNICAL GOVERNANCE
PROCESS
DATA
APPLICATION
TECHNOLOGY
ENTERPRISE
• "Enterprise" is an entity defined and organized
to create value
• The value creation is structured to be
composed of product, services, people,
location, performance, function, process,
data, application, technology, infrastructure
and providers.
johnmacasio@gmail.com
ARCHITECTURE
• Speaks of drawn model to describe
the holistic and particular view of the
system in actualizing the “value”
defined for the organization.
• Blueprint which define the baseline of
common and differentiated
information on how the system is
organized and expected to behave to
actualize the mandate, mission,
principles, vision, goals, objectives
and performance.
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
“You are going to do
architecture, because without
architecture, you cannot do
any of these things:
• Alignment
• Integration
• Change
• Reduced Time-to-Market
-John Zachman
Enterprise Architecture Framework
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
ALIGNMENT
• Enterprise architecture provides the
framework to enable better alignment of
business and information technology
objectives. The architecture used can also
serve as a communication tool.
VALUE OF ENTERPRISE ARCHITECTURE
INTEGRATION
• Enterprise architecture establishes the
infrastructure that enables business rules to
be consistently applied across the
organization, documents data flows, uses and
interfaces.
VALUE OF ENTERPRISE ARCHITECTURE
VALUE CREATION
• Enterprise architecture provides better
measurement of information technology
economic value in an environment
where there is a higher potential for
reusable hardware and software assets
VALUE OF ENTERPRISE ARCHITECTURE
CHANGE MANAGEMENT
• Enterprise architecture establishes consistent
infrastructure and formalizing the
management of the infrastructure and
information assets better enables an
organization-wide change management
process to be established to handle
information technology changes
VALUE OF ENTERPRISE ARCHITECTURE
COMPLIANCE
• Enterprise architecture provides the artifacts
necessary to ensure legal and regulatory
compliance for the technical infrastructure
and environment.
- Schekkerman, J. (2005). Trends in Enterprise Architecture,
Institute for Enterprise ArchitectureDevelopment
ENTERPRISE ARCHITECTURE DOMAIN
TECHNOLOGY
INFRASTRUCTURE
INFORMATION
DATA & APPLICATION
BUSINESS
FUNCTIONS
PROCESS &
POLICIES
ORGANIZATION &
STAKEHOLDERS
MANDATE
VISION
GOALS
PROGRAMS
1. Intention
2. Business
3. Information
4. Technology
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
1. BUSINESS ARCHITECTURE
Definition of the business strategy, governance,
organization, and key business processes of the
enterprise
2. APPLICATION ARCHITECTURE
Provision of functional blueprint for the
individual application system to be deployed,
the interaction between application system, and
their relationship to the core business processes
of the enterprise
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
3. DATA ARCHITECTURE
Structural definition of the logical and physical data
assets of the enterprise, and the associate data
management resources.
4. TECHNOLOGY ARCHITECTURE
Definition of the hardware, software and network
infrastructure to support the deployment of core
and mission-critical applications. It includes
description of technology standards and
methodology.
johnmacasio@gmail.com
ENTERPRISE ARCHITECTURE
COMPONENTS IN ICT SERVICES
USE CASE
APPLICATION
SYSTEM
DATA
SERVICES
APPLICATION
SERVICES
CONNECTIVITY
SERVICES
USERS
ACCESS
BUSINESS
PROCESSES
MEMBERSHIP
COLLECTION
BENEFITS
ACCREDITATION
DATA
ELEMENTS
DATABASE
SYSTEM
NETWORK
INFRASTRUCTURE
POINT OF PRESENCE
CUSTOMER
CLIENTS
PROVIDERS
SUPPLIERS
johnmacasio@gmail.com
E
Membership Collection Benefits Accreditation
CUSTOMER RELATIONSHIP MANAGEMENT
ENTERPRISE RESOURCE PLANNING
Planning Audit Risks Legal/Policy
ENTERPRISE PERFORMANCE MANAGEMENT
Finance
Human
Resource
Assets
Facilities
Technology
DATA
APPLICATION
BUSINESS
PROCESS
TECHNOLOGY
INFRASTRUCTURE
CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW
INFORMATION
SECURITY
E
N
T
E
R
P
R
I
S
E
A
R
C
H
I
T
E
C
T
U
R
E
johnmacasio@gmail.com
SUCCESS COMPONENTS OF
INFORMATION SYSTEM
Agency
Citizen
DeLone and McLean Model
johnmacasio@gmail.com
Enterprise Architecture
Information Security
Questions
Information
Security
Principles
Information
Security
Risks
Information
Security
Methodology
BUSINESS
FUNCTION
PROCESS
BUSINESS
DATA &
APPLICATION
BUSINESS
TECHNOLOGY
INFRASTRUCTURE
ENTERPRISE
INFORMATION
SECURITY
johnmacasio@gmail.com
Information
Security
Governance
NETWORKED INFORMATION
SUPPLIER & CUSTOMER
Information Security Means…
Information
Security
Confidentiality
Availability
Integrity
Secrecy, Privacy and Authority
Accurate, Complete and Reliable
Accessible, Immediate and Uptime
johnmacasio@gmail.com
johnmacasio@gmail.com
Information Insecurity Means…
StolenMisrepresented
Breached
Information is
not secure
when
something is
Misused
IncompleteUnauthorized
Compromised Denied
CASE: HEALTH INSURANCE
INFORMATION SECURITY
MEMBERSHIP
MANAGEMENT
COLLECTION
MANAGEMENT
BENEFITS
MANAGEMENT
ACCREDITATION
MANAGEMENT
payment
identification
claims
certification
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
FINANCIAL
MANAGEMENT
PERSONNEL
MANAGEMENT
ASSET
MANAGEMENT
LEGAL
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
AUDIT
MANAGEMENT
STRATEGY
MANAGEMENT
RISK
MANAGEMENT
PROJECT
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
INFRASTRUCTURE
MANAGEMENT
NETWORK
MANAGEMENT
APPLICATION
MANAGEMENT
DATA
MANAGEMENT
johnmacasio@gmail.com
Mitigating Information
Security Risk
Information
Security
Risk
Mitigation
Assessment
Policy Governance
Technology
johnmacasio@gmail.com
Why Who
What How
Security Policy Requirement
Governance
•Functional
Organization
•Roles and
Responsibilities
Competencies
•Knowledge, Skills and
Attitudes Requirements
•Training Program and
Certification
Process
•Business Workflow,
Procedures and Rules
•Risk Audit and Control
Procedures
Data
Infrastructure
•Acceptable Use
•Data Management
•Risk Audit and
Control Procedures
•Infrastructure
Management
•Sourcing &
Procurement
•Risk Audit and
Control
Governance
Guidance and
Implementation
Competency
Reference and
Assessment
Functions
Process
Models and
Control
Guidance
Data and Application
Security Models and
Acceptable Use
Physical Configuration
Network Models
Service Sourcing
Trusted Technology
Acceptable Use
No Need to
Reinvent the Wheel
1. Recognize security needs & question
2. Find the fitted practitioner standards
3. Apply standards to real life condition
4. Assess and improve the practice
johnmacasio@gmail.com
Governance
Competency
Process
Data
Infrastructure
Information Security
Risk Assessment
Information
Asset
Inventory
(Information
Systems)
Risk
Mitigation
Treatment
Prevention
Impact
Rating of
Vulnerability
Identification
Vulnerability
Threat Source
johnmacasio@gmail.com
1. Organization
2. Process
3. Data
4. Application
5. Infrastructure
What it means
to secure information…
1. Establish the governance and
management organization of
information security that
comply to best practice
standards.
johnmacasio@gmail.com
What it means
to secure information…
2. Identify the information
assets, and perform the
assessment of vulnerabilities
and threats that surround
the creation, storage, use
and sharing of information.
johnmacasio@gmail.com
What it means
to secure information…
3. Develop, document and
implement policies, standards,
procedures, and guidelines that
ensure confidentiality, integrity,
and availability in the person,
process, data, application and
infrastructure of information.
johnmacasio@gmail.com
What it means
to secure information…
4. Evaluate, acquire and use
security management tools to
classify data and risk, to audit
information system, to assess
and analyze risks in the solution
development and infrastructure,
to monitor and control areas of
vulnerabilities. and implement
security controls and appropriate
reactive responses to threats.
johnmacasio@gmail.com
Basic Security Steps
Authorized
Access
Device
Integrity
Data
Exchange
Protocol
Monitoring
& Audit
Network
Hardening
Service
Agreements
Information
Systems
Security
Standards
Risk
Assessment
& Policies
Security
Services
User
Training
johnmacasio@gmail.com
CHANGE…
1. We can only evaluate that which
is measurable
2. We can only test that which is
agreed.
3. We can only improve that which
is actualized.
4. We can only change that which
is established.
johnmacasio@gmail.com

More Related Content

What's hot

PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
ControlCase
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
Karthikeyan Dhayalan
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dumindu Pahalawatta
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
The Open Group SA
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
HasnolAhmad2
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai
 
CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
Karthikeyan Dhayalan
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
Alfred Ouyang
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
Donald E. Hester
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
Vidyalankar Institute of Technology
 

What's hot (20)

PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Security policies
Security policiesSecurity policies
Security policies
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 

Viewers also liked

Making IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyMaking IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture Strategy
Chiara Fox Ogan
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
James Melzer
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Priyanka Aash
 
ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTJohn Macasio
 
Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
Jesus Rodriguez
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
Insurance Technologies Corporation (ITC)
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise Architecture
John Macasio
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
AVEVA
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
GovCloud Network
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for DevelopersBrandon West
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journeyAbinav Munshi
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
OptiRisk India
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
Andrea L. Ames
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
Salmon Limited
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
inoday Consultancy Services Pvt. Ltd
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process Review
John Macasio
 

Viewers also liked (20)

Making IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyMaking IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture Strategy
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENT
 
Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise Architecture
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
TDD in Zend Framework 2
TDD in Zend Framework 2TDD in Zend Framework 2
TDD in Zend Framework 2
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for Developers
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journey
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process Review
 

Similar to Enterprise Architecture and Information Security

april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
Data For Good Regina
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureNathaniel Palmer
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data GovernanceBhavendra Chavan
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
MS IT-strategy.pptx
MS IT-strategy.pptxMS IT-strategy.pptx
MS IT-strategy.pptx
Mohamed Salama PMP OCP ITIL
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
Egyptian Engineers Association
 
Business Architecture.pptx
Business Architecture.pptxBusiness Architecture.pptx
Business Architecture.pptx
Naseer-ul-Hassan Rehman
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
PECB
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
William Francis
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group
 
enterprise-architecture part2.pptx
enterprise-architecture part2.pptxenterprise-architecture part2.pptx
enterprise-architecture part2.pptx
ErsignDLozano
 
enterprise-architecture.pptx
enterprise-architecture.pptxenterprise-architecture.pptx
enterprise-architecture.pptx
ErsignDLozano
 
2014 dqe handouts
2014 dqe handouts2014 dqe handouts
2014 dqe handouts
Data Blueprint
 
Data-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringData-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality Engineering
DATAVERSITY
 
ERP for IT
ERP for ITERP for IT
Info tech membership overview
Info tech membership overviewInfo tech membership overview
Info tech membership overview
David Xing
 
Enterprise solution design principles
Enterprise solution design principlesEnterprise solution design principles
Enterprise solution design principles
Leo Barella
 

Similar to Enterprise Architecture and Information Security (20)

april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
MS IT-strategy.pptx
MS IT-strategy.pptxMS IT-strategy.pptx
MS IT-strategy.pptx
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
 
Business Architecture.pptx
Business Architecture.pptxBusiness Architecture.pptx
Business Architecture.pptx
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
SIA LESSON.pptx
SIA LESSON.pptxSIA LESSON.pptx
SIA LESSON.pptx
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
 
enterprise-architecture part2.pptx
enterprise-architecture part2.pptxenterprise-architecture part2.pptx
enterprise-architecture part2.pptx
 
enterprise-architecture.pptx
enterprise-architecture.pptxenterprise-architecture.pptx
enterprise-architecture.pptx
 
2014 dqe handouts
2014 dqe handouts2014 dqe handouts
2014 dqe handouts
 
Data-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringData-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality Engineering
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
Info tech membership overview
Info tech membership overviewInfo tech membership overview
Info tech membership overview
 
Enterprise solution design principles
Enterprise solution design principlesEnterprise solution design principles
Enterprise solution design principles
 
Resume A
Resume AResume A
Resume A
 

More from John Macasio

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
John Macasio
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital Transformation
John Macasio
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management System
John Macasio
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness Assessment
John Macasio
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked Learner
John Macasio
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency Model
John Macasio
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
John Macasio
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the Millenials
John Macasio
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation template
John Macasio
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
John Macasio
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise Architecture
John Macasio
 
E-School Project
E-School ProjectE-School Project
E-School Project
John Macasio
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise Architecture
John Macasio
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status Checklist
John Macasio
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture Primer
John Macasio
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management Essentials
John Macasio
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services Planning
John Macasio
 
E-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersE-Governance and ICT for Government Managers
E-Governance and ICT for Government Managers
John Macasio
 
Mobile Presence of Governance and Management
Mobile Presence of Governance and ManagementMobile Presence of Governance and Management
Mobile Presence of Governance and Management
John Macasio
 
GCIO Competency and Training
GCIO Competency and TrainingGCIO Competency and Training
GCIO Competency and Training
John Macasio
 

More from John Macasio (20)

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital Transformation
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management System
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness Assessment
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked Learner
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency Model
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the Millenials
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation template
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise Architecture
 
E-School Project
E-School ProjectE-School Project
E-School Project
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise Architecture
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status Checklist
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture Primer
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management Essentials
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services Planning
 
E-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersE-Governance and ICT for Government Managers
E-Governance and ICT for Government Managers
 
Mobile Presence of Governance and Management
Mobile Presence of Governance and ManagementMobile Presence of Governance and Management
Mobile Presence of Governance and Management
 
GCIO Competency and Training
GCIO Competency and TrainingGCIO Competency and Training
GCIO Competency and Training
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Enterprise Architecture and Information Security

  • 2. Is information security built-in or add-on in the plan, design and execution of information and communication systems?
  • 3. Information Security Requirements INFORMATION MANAGEMENT INFORMATION SECURITY Confidentiality Integrity Availability 1. Create 2. Store 3. Utilize 4. Share 5. Dispose
  • 4. ENTERPRISE ARCHITECTURE INFORMATION SECURITY ENTERPRISE ARCHITECTURE INFORMATION SECURITY PRINCIPLES LEGAL TECHNICAL GOVERNANCE PROCESS DATA APPLICATION TECHNOLOGY
  • 5. ENTERPRISE • "Enterprise" is an entity defined and organized to create value • The value creation is structured to be composed of product, services, people, location, performance, function, process, data, application, technology, infrastructure and providers. johnmacasio@gmail.com
  • 6. ARCHITECTURE • Speaks of drawn model to describe the holistic and particular view of the system in actualizing the “value” defined for the organization. • Blueprint which define the baseline of common and differentiated information on how the system is organized and expected to behave to actualize the mandate, mission, principles, vision, goals, objectives and performance. johnmacasio@gmail.com
  • 7. Need for Enterprise Architecture johnmacasio@gmail.com
  • 8. Need for Enterprise Architecture johnmacasio@gmail.com
  • 9. Need for Enterprise Architecture johnmacasio@gmail.com
  • 10. Need for Enterprise Architecture johnmacasio@gmail.com
  • 11. Need for Enterprise Architecture johnmacasio@gmail.com
  • 12. Need for Enterprise Architecture johnmacasio@gmail.com
  • 13. Need for Enterprise Architecture johnmacasio@gmail.com
  • 14. Need for Enterprise Architecture johnmacasio@gmail.com
  • 15. Need for Enterprise Architecture johnmacasio@gmail.com
  • 16. VALUE OF ENTERPRISE ARCHITECTURE “You are going to do architecture, because without architecture, you cannot do any of these things: • Alignment • Integration • Change • Reduced Time-to-Market -John Zachman Enterprise Architecture Framework johnmacasio@gmail.com
  • 17. VALUE OF ENTERPRISE ARCHITECTURE ALIGNMENT • Enterprise architecture provides the framework to enable better alignment of business and information technology objectives. The architecture used can also serve as a communication tool.
  • 18. VALUE OF ENTERPRISE ARCHITECTURE INTEGRATION • Enterprise architecture establishes the infrastructure that enables business rules to be consistently applied across the organization, documents data flows, uses and interfaces.
  • 19. VALUE OF ENTERPRISE ARCHITECTURE VALUE CREATION • Enterprise architecture provides better measurement of information technology economic value in an environment where there is a higher potential for reusable hardware and software assets
  • 20. VALUE OF ENTERPRISE ARCHITECTURE CHANGE MANAGEMENT • Enterprise architecture establishes consistent infrastructure and formalizing the management of the infrastructure and information assets better enables an organization-wide change management process to be established to handle information technology changes
  • 21. VALUE OF ENTERPRISE ARCHITECTURE COMPLIANCE • Enterprise architecture provides the artifacts necessary to ensure legal and regulatory compliance for the technical infrastructure and environment. - Schekkerman, J. (2005). Trends in Enterprise Architecture, Institute for Enterprise ArchitectureDevelopment
  • 22. ENTERPRISE ARCHITECTURE DOMAIN TECHNOLOGY INFRASTRUCTURE INFORMATION DATA & APPLICATION BUSINESS FUNCTIONS PROCESS & POLICIES ORGANIZATION & STAKEHOLDERS MANDATE VISION GOALS PROGRAMS 1. Intention 2. Business 3. Information 4. Technology johnmacasio@gmail.com
  • 23. ARCHITECTURE DOMAINS 1. BUSINESS ARCHITECTURE Definition of the business strategy, governance, organization, and key business processes of the enterprise 2. APPLICATION ARCHITECTURE Provision of functional blueprint for the individual application system to be deployed, the interaction between application system, and their relationship to the core business processes of the enterprise johnmacasio@gmail.com
  • 24. ARCHITECTURE DOMAINS 3. DATA ARCHITECTURE Structural definition of the logical and physical data assets of the enterprise, and the associate data management resources. 4. TECHNOLOGY ARCHITECTURE Definition of the hardware, software and network infrastructure to support the deployment of core and mission-critical applications. It includes description of technology standards and methodology. johnmacasio@gmail.com
  • 25. ENTERPRISE ARCHITECTURE COMPONENTS IN ICT SERVICES USE CASE APPLICATION SYSTEM DATA SERVICES APPLICATION SERVICES CONNECTIVITY SERVICES USERS ACCESS BUSINESS PROCESSES MEMBERSHIP COLLECTION BENEFITS ACCREDITATION DATA ELEMENTS DATABASE SYSTEM NETWORK INFRASTRUCTURE POINT OF PRESENCE CUSTOMER CLIENTS PROVIDERS SUPPLIERS johnmacasio@gmail.com
  • 26. E Membership Collection Benefits Accreditation CUSTOMER RELATIONSHIP MANAGEMENT ENTERPRISE RESOURCE PLANNING Planning Audit Risks Legal/Policy ENTERPRISE PERFORMANCE MANAGEMENT Finance Human Resource Assets Facilities Technology DATA APPLICATION BUSINESS PROCESS TECHNOLOGY INFRASTRUCTURE CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW INFORMATION SECURITY E N T E R P R I S E A R C H I T E C T U R E johnmacasio@gmail.com
  • 27. SUCCESS COMPONENTS OF INFORMATION SYSTEM Agency Citizen DeLone and McLean Model johnmacasio@gmail.com
  • 28. Enterprise Architecture Information Security Questions Information Security Principles Information Security Risks Information Security Methodology BUSINESS FUNCTION PROCESS BUSINESS DATA & APPLICATION BUSINESS TECHNOLOGY INFRASTRUCTURE ENTERPRISE INFORMATION SECURITY johnmacasio@gmail.com Information Security Governance NETWORKED INFORMATION SUPPLIER & CUSTOMER
  • 29. Information Security Means… Information Security Confidentiality Availability Integrity Secrecy, Privacy and Authority Accurate, Complete and Reliable Accessible, Immediate and Uptime johnmacasio@gmail.com
  • 30. johnmacasio@gmail.com Information Insecurity Means… StolenMisrepresented Breached Information is not secure when something is Misused IncompleteUnauthorized Compromised Denied
  • 31. CASE: HEALTH INSURANCE INFORMATION SECURITY MEMBERSHIP MANAGEMENT COLLECTION MANAGEMENT BENEFITS MANAGEMENT ACCREDITATION MANAGEMENT payment identification claims certification johnmacasio@gmail.com
  • 32. CASE: HEALTH INSURANCE INFORMATION SECURITY FINANCIAL MANAGEMENT PERSONNEL MANAGEMENT ASSET MANAGEMENT LEGAL MANAGEMENT johnmacasio@gmail.com
  • 33. CASE: HEALTH INSURANCE INFORMATION SECURITY AUDIT MANAGEMENT STRATEGY MANAGEMENT RISK MANAGEMENT PROJECT MANAGEMENT johnmacasio@gmail.com
  • 34. CASE: HEALTH INSURANCE INFORMATION SECURITY INFRASTRUCTURE MANAGEMENT NETWORK MANAGEMENT APPLICATION MANAGEMENT DATA MANAGEMENT johnmacasio@gmail.com
  • 35. Mitigating Information Security Risk Information Security Risk Mitigation Assessment Policy Governance Technology johnmacasio@gmail.com Why Who What How
  • 36. Security Policy Requirement Governance •Functional Organization •Roles and Responsibilities Competencies •Knowledge, Skills and Attitudes Requirements •Training Program and Certification Process •Business Workflow, Procedures and Rules •Risk Audit and Control Procedures Data Infrastructure •Acceptable Use •Data Management •Risk Audit and Control Procedures •Infrastructure Management •Sourcing & Procurement •Risk Audit and Control Governance Guidance and Implementation Competency Reference and Assessment Functions Process Models and Control Guidance Data and Application Security Models and Acceptable Use Physical Configuration Network Models Service Sourcing Trusted Technology Acceptable Use No Need to Reinvent the Wheel 1. Recognize security needs & question 2. Find the fitted practitioner standards 3. Apply standards to real life condition 4. Assess and improve the practice johnmacasio@gmail.com Governance Competency Process Data Infrastructure
  • 37. Information Security Risk Assessment Information Asset Inventory (Information Systems) Risk Mitigation Treatment Prevention Impact Rating of Vulnerability Identification Vulnerability Threat Source johnmacasio@gmail.com 1. Organization 2. Process 3. Data 4. Application 5. Infrastructure
  • 38. What it means to secure information… 1. Establish the governance and management organization of information security that comply to best practice standards. johnmacasio@gmail.com
  • 39. What it means to secure information… 2. Identify the information assets, and perform the assessment of vulnerabilities and threats that surround the creation, storage, use and sharing of information. johnmacasio@gmail.com
  • 40. What it means to secure information… 3. Develop, document and implement policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability in the person, process, data, application and infrastructure of information. johnmacasio@gmail.com
  • 41. What it means to secure information… 4. Evaluate, acquire and use security management tools to classify data and risk, to audit information system, to assess and analyze risks in the solution development and infrastructure, to monitor and control areas of vulnerabilities. and implement security controls and appropriate reactive responses to threats. johnmacasio@gmail.com
  • 42. Basic Security Steps Authorized Access Device Integrity Data Exchange Protocol Monitoring & Audit Network Hardening Service Agreements Information Systems Security Standards Risk Assessment & Policies Security Services User Training johnmacasio@gmail.com
  • 43. CHANGE… 1. We can only evaluate that which is measurable 2. We can only test that which is agreed. 3. We can only improve that which is actualized. 4. We can only change that which is established. johnmacasio@gmail.com

Editor's Notes

  1. Manual re-keying Manual re-keying might not be the biggest cost companies pay from bad architecture, but it’s certainly the most obvious one. Hiring human beings to serve as the interface engine connecting incompatible applications isn’t just expensive; it’s de-humanizing.
  2. Collection of point solutions Everyone wants their work supported by a “best of breed” solution. Define “their work” too narrowly, though, and everyone has to visit so many applications to get their work done that there isn’t enough time to get their work done. Meanwhile, unless IT spends a lot of time building interfaces to connect all of these point solutions, you’re back to re-keying again.
  3. Redundant applications Every business application solves business problems. Solving business problems is good, so solving them more than once must be even better, right? Of course not, and yet a lot of companies keep lots of redundant applications around, either because they overlap but still have a few unique areas they support, or because they’ve grown through mergers and acquisitions but aren’t very good at integrating everyone into one business after the papers have been signed. Either way, the money spent to support all of this redundancy is pure waste.
  4. Redundant data Very often, different applications need the same information to get their jobs done. You have two choices: Point them all to the same underlying database, which isn’t always possible, or synchronize their separate databases, which is often pretty messy. Or there’s always that manual re-keying option....
  5. Too many interfaces When you have redundant data and you decide to keep it synchronized, you need to build an interface. Even if you don’t, you often have to feed one system with results from a different one. Either way, the more systems and databases you have, the more interfaces you end up building. It’s better than not having them, but as they accumulate, your architecture becomes more and more fragile, and you spend more and more time managing the interfaces instead of building new functionality.
  6. Faux-elegant integration So you decide to solve your interface dilemma with an elegant enterprise application integration system, or a services bus, or some other form of middleware-plus-metadata that keeps everything clean. And then, your developers figure two things out: (1) what your cool new system does is make solving the easy problems even easier; and (2) it doesn’t solve the hard problems at all. So instead of arguing with you, they rebuild the same old spiderweb of interfaces, but hide it inside the EAI system so you don’t know about it.
  7. Kludges and workarounds Maybe you were competing with an outside developer who lowballed a project. Maybe the business sponsor insisted on too short a deadline. Or maybe building a solution well would have ruined the business case for the project. Whatever the reason, you wake up one day to discover a lot of your systems are held together with Band-Aids, chewing gum, and duct tape. If you’re lucky, nobody will notice until after you leave or retire.
  8. Obsolete technology It’s mission-critical! It satisfies the business need perfectly! What do you mean you have to spend money to maintain it? When you’ve built something on a version of Visual Basic that Microsoft hasn’t supported in a decade, that can’t read and write from any version of SQL Server that isn’t at least seven years old, and the only versions of Windows they’ll run on don’t have drivers for any of the printers you have in production -- that’s what you mean. You have to spend money to maintain it.
  9. White papers You see a bunch of warning signs. You organize an enterprise technical architecture management group. You hire an expert or two. And their productivity is enormous. Enormous, that is, if you measure productivity in terms of the number of white papers they publish. Changing how work gets done in IT? Of course they’ll change it. So long, that is, as everyone reads their white papers, admires their business, and follows their instructions.
  10. Confidentiality: This means that information is only being seen or used by people who are authorized to access it. Integrity: This means that any changes to the information by an unauthorized user are impossible (or at least detected), and changes by authorized users are tracked. Availability: This means that the information is accessible when authorized users need it.