SlideShare a Scribd company logo
Information Security
Science
Putting the Business in Enterprise Information Security Architecture
Ravila Helen White | CISSP, CISM, CISA, GCIH
Making it better without making it complex
Disclaimer
This presentation and the concepts herein
are my opinions through private research,
practice and chatting with other
professionals.
It is not the opinion of past, present or future
employers.
Agenda
 AS IS – The current state of affairs…
 Getting There – The return of Systems
Thinking…
 To Be – Becoming agile…
As Is
The current state of affairs….
 Sherwood Applied Business Security
Architecture (SABSA) 1995
 Structure and Content of an Enterprise
Information Security Architecture by Gartner
2006
 Security Architecture and the ADM by
TOGAF
 SOA
Legacy
Where is the security architect?
Conflicting Roles
 CISO/ISO
 Security Engineer/Administrator
 CISO/Analyst/Engineer
 Security Architect
Definition Dichotomy
 Framework
 Guidelines
 Taxonomy
 Policy
 Procedure
 Standard
“Knowing is not understanding. There is a great difference between
knowing and understanding: you can know a lot about something and
not really understand it.” [Charles Kettering]
Artifact Handling
 What are they?
 Where are they?
 How are they used?
Architectural Artifact— “A specific document, report,
analysis, model, or other tangible that contributes to an architectural
description.” [Roger Sessions]
One EA’s Point of View
 "EA provides a filter on siloed thinking; I know the solution
you proposed makes sense to you, but we provide a wider
perspective that can help you make sense for other people as
well."
 "Information Security professionals sometimes forget that the
rest of the organization is there."
 "Security professionals often fail to consider the incremental
cost that accrues to a policy. Over time, a good policy can
incur so much cost that it no longer makes sense from an EA
perspective."
Nick Malik – Inside Architecture Blogger
Disparate States
Revolutionary Evolutionary
 (1) of, pertaining to,
characterized by, or of
the nature of a
revolution, or a sudden,
complete, or marked
change. (2) radically new
or innovative; outside or
beyond established
procedure, principles, etc
 A gradual process in
which something
changes into a different
and usually more
complex or better form
Opportunities of Optimization
 Systemic integration of information security
architecture in to the business.
 Adoption of a meta framework to drive
information security architecture to business
alignment and visibility.
 Development of a modular schema to
support the use of the most widely used
security architecture methodologies.
Getting There
The return to Systems Thinking…
Systems Thinking not Analytics
 What it is
 Why you need it
 How you get it
Does not follow the traditional analysis focuses of
separating individual pieces of what is being studied.
Systems thinking, in contrast, focuses on how the
thing being studied interacts with the other
constituents of the system—a set of elements that
interact to produce behavior—of which it is a part.
Security is a practice within the
business/not the business
Information Security Focus Enterprise Perspective
 CISSP
 CISA
 CISM
 CIPP*
 GIAC (SANS)
 Business Process
Modeling
 Enterprise Architecture
 Information Design
 Software Engineering
How to apply as middleware
 Business Process Modeling –translates
what you have to offer in terms and
techniques used by the business.
 Enterprise Architecture – aligns IT initiatives
to business needs.
 Information Design –takes the complex and
makes it consumable.
 Software Engineering– reverse engineering
and agile development
Benefits of Systems Thinking
 Business Process Modeling –
communicates intent and value to the
organization
 Enterprise Architecture – sets the context of
information security within the business
 Information Design – helps non-infosec
partners quickly orient themselves in a
complex environment
 Software Engineering– provides synthesis
of complex information into a whole
The Controls of Systems Thinking
 Standards
 Regulations
 Guidelines
 Logic Models
 Setting Context
Controls are used in business to prevent taking on too
much risk and reducing risk of an existing or potential
weakness. When too much risk is taken against a
system, it is weakened systemically and typically
results in system-wide failure.
TO Be
Becoming Agile…
Synthesizing business modeling
 A business model describes the rationale of
how an organization creates, delivers and
captures value
 A logic model is a systematic and visual
way to present and share your
understanding of the relationships among
the resources you have to operate your
program, the activities you plan, and the
changes or results you hope to achieve.
Adapted from Alex Osterwalder’s Business Model Canvas
Defining Artifacts
 Authoritative
◦ sets the direction
◦ the business validates its decisions
◦ the business executes against
◦ the business captures resource
requirements
◦ the business verifies the activities
necessary to support a solution
 Historical
◦ Project plans
◦ Proposals, RFPs,
Artifact Handling
 Result in deliverables to the business
 Contain sensitive information
Setting Context
 Communicates to the business and peers
what services are provided
 Sets the scope of activities
Contextualized Infosec
Architecture
Component Architecture
Plan of Action
1. Apply a business model
2. Choose your metadata sources
3. Adopt a common terminology taxonomy
4. Define artifacts and storage location
5. Research current and future
6. Develop component architecture
AGILE Infosec Architecture
Credits & References
General Professional Influencers
 Business Model Generation
 www.dictionary.com
 Google: www.Google.com
 Information Design Handbook
 Logic Model Development Guide:
http://www.wkkf.org/Pubs/Tools/E
valuation/Pub3669.pdf
 Oxford Dictionary
 Thinking Page: www.thinking.net
 TOGAF: www.opengroup.org
 SABSA: www.sabsa-institute.org/
 Wikipedia: www.wikipedia.com
 Alex Osterwalder
Copyright Information
Some works in this presentation have
been licensed under the Creative
Common license (CC). Please respect
the license when using the concepts or
adapting them.
For more information please go here:
 www.creativecommons.org
Thank you…
Questions and Comments
Contact me via LinkedIn

More Related Content

What's hot

Challenges in adapting predictive analytics
Challenges  in  adapting  predictive  analyticsChallenges  in  adapting  predictive  analytics
Challenges in adapting predictive analytics
Prasad Narasimhan
 
Safety As A Competitve Advantage
Safety As A Competitve AdvantageSafety As A Competitve Advantage
Safety As A Competitve Advantage
Phil La Duke
 
Edv2015 business framework for analytics oct 9 2015 ja102815
Edv2015 business framework for analytics oct 9 2015 ja102815Edv2015 business framework for analytics oct 9 2015 ja102815
Edv2015 business framework for analytics oct 9 2015 ja102815
jadams6
 
Regulatory Instability, BPM Technology, and BPM Skill Configurations
Regulatory Instability, BPM Technology, and BPM Skill ConfigurationsRegulatory Instability, BPM Technology, and BPM Skill Configurations
Regulatory Instability, BPM Technology, and BPM Skill Configurations
Michael zur Muehlen
 
Introduction to Business Analytics
Introduction to Business AnalyticsIntroduction to Business Analytics
Introduction to Business Analytics
Amitabh Mishra
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Security Catalyst
 
Excel Datamining Addin Beginner
Excel Datamining Addin BeginnerExcel Datamining Addin Beginner
Excel Datamining Addin Beginner
DataminingTools Inc
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
Mighty Guides, Inc.
 
Implementing a Successful, Scalable, Governed BI Program
Implementing a Successful, Scalable, Governed BI ProgramImplementing a Successful, Scalable, Governed BI Program
Implementing a Successful, Scalable, Governed BI Program
Pyramid Analytics
 
Notes for Mental health business architecture
Notes for Mental health business architectureNotes for Mental health business architecture
Notes for Mental health business architecture
Donna Kelly
 
Research conference Dortmund 2013
Research conference Dortmund 2013Research conference Dortmund 2013
Research conference Dortmund 2013
Dr. Frank Stumpe
 
Difference between business intelligence, business analytics, and business an...
Difference between business intelligence, business analytics, and business an...Difference between business intelligence, business analytics, and business an...
Difference between business intelligence, business analytics, and business an...
Santosh Mishra
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
jiricejka
 
Operational analytics overview
Operational analytics overviewOperational analytics overview
Operational analytics overview
pallavi pentapati
 
Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...
Decision Management Solutions
 
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
Decision Management Solutions
 
Solution Spotlight IT Consulting Services
Solution Spotlight  IT Consulting ServicesSolution Spotlight  IT Consulting Services
Solution Spotlight IT Consulting Services
The TNS Group
 

What's hot (19)

Challenges in adapting predictive analytics
Challenges  in  adapting  predictive  analyticsChallenges  in  adapting  predictive  analytics
Challenges in adapting predictive analytics
 
Safety As A Competitve Advantage
Safety As A Competitve AdvantageSafety As A Competitve Advantage
Safety As A Competitve Advantage
 
Sas business analytics
Sas   business analyticsSas   business analytics
Sas business analytics
 
Edv2015 business framework for analytics oct 9 2015 ja102815
Edv2015 business framework for analytics oct 9 2015 ja102815Edv2015 business framework for analytics oct 9 2015 ja102815
Edv2015 business framework for analytics oct 9 2015 ja102815
 
Regulatory Instability, BPM Technology, and BPM Skill Configurations
Regulatory Instability, BPM Technology, and BPM Skill ConfigurationsRegulatory Instability, BPM Technology, and BPM Skill Configurations
Regulatory Instability, BPM Technology, and BPM Skill Configurations
 
Introduction to Business Analytics
Introduction to Business AnalyticsIntroduction to Business Analytics
Introduction to Business Analytics
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
 
Excel Datamining Addin Beginner
Excel Datamining Addin BeginnerExcel Datamining Addin Beginner
Excel Datamining Addin Beginner
 
Ppt01
Ppt01Ppt01
Ppt01
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Implementing a Successful, Scalable, Governed BI Program
Implementing a Successful, Scalable, Governed BI ProgramImplementing a Successful, Scalable, Governed BI Program
Implementing a Successful, Scalable, Governed BI Program
 
Notes for Mental health business architecture
Notes for Mental health business architectureNotes for Mental health business architecture
Notes for Mental health business architecture
 
Research conference Dortmund 2013
Research conference Dortmund 2013Research conference Dortmund 2013
Research conference Dortmund 2013
 
Difference between business intelligence, business analytics, and business an...
Difference between business intelligence, business analytics, and business an...Difference between business intelligence, business analytics, and business an...
Difference between business intelligence, business analytics, and business an...
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 
Operational analytics overview
Operational analytics overviewOperational analytics overview
Operational analytics overview
 
Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...Extending Business Architecture with Regulatory Architecture using Decisions ...
Extending Business Architecture with Regulatory Architecture using Decisions ...
 
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
Case Study UMUC - Decision Modeling for Predictive Analytic Projects - Predic...
 
Solution Spotlight IT Consulting Services
Solution Spotlight  IT Consulting ServicesSolution Spotlight  IT Consulting Services
Solution Spotlight IT Consulting Services
 

Similar to Putting the Business in Enterprise Information Security Architecture

Toolkit For Security in the Enterprise
Toolkit For Security in the EnterpriseToolkit For Security in the Enterprise
Toolkit For Security in the Enterprise
Ravila White
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
The Open Group SA
 
Stan bio
Stan bioStan bio
Stan bio
Stan Bowman
 
Enterprise Architecture in Strategy Deployment
Enterprise Architecture in Strategy DeploymentEnterprise Architecture in Strategy Deployment
Enterprise Architecture in Strategy Deployment
Jouko Poutanen
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
PECB
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Christina33713
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
IBM Analytics
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3City of Toronto
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
Jerald Burget
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Kris Kimmerle
 
How to sustain analytics capabilities in an organization
How to sustain analytics capabilities in an organizationHow to sustain analytics capabilities in an organization
How to sustain analytics capabilities in an organization
SAS Canada
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
Ravila White
 
iDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons LearnediDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons Learned
Michael King
 
The Strategic Business Analyst: Aligning Projects with Organizational Goals
The Strategic Business Analyst: Aligning Projects with Organizational GoalsThe Strategic Business Analyst: Aligning Projects with Organizational Goals
The Strategic Business Analyst: Aligning Projects with Organizational Goals
Corporate Education Group (CEG)
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
CA Technologies
 

Similar to Putting the Business in Enterprise Information Security Architecture (20)

Toolkit For Security in the Enterprise
Toolkit For Security in the EnterpriseToolkit For Security in the Enterprise
Toolkit For Security in the Enterprise
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Stan bio
Stan bioStan bio
Stan bio
 
BA3
BA3BA3
BA3
 
Enterprise Architecture in Strategy Deployment
Enterprise Architecture in Strategy DeploymentEnterprise Architecture in Strategy Deployment
Enterprise Architecture in Strategy Deployment
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Allgress_Brochure
Allgress_BrochureAllgress_Brochure
Allgress_Brochure
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
How to sustain analytics capabilities in an organization
How to sustain analytics capabilities in an organizationHow to sustain analytics capabilities in an organization
How to sustain analytics capabilities in an organization
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
 
iDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons LearnediDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons Learned
 
The Strategic Business Analyst: Aligning Projects with Organizational Goals
The Strategic Business Analyst: Aligning Projects with Organizational GoalsThe Strategic Business Analyst: Aligning Projects with Organizational Goals
The Strategic Business Analyst: Aligning Projects with Organizational Goals
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
 
Douglas Davies Resume
Douglas Davies ResumeDouglas Davies Resume
Douglas Davies Resume
 

Recently uploaded

Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

Putting the Business in Enterprise Information Security Architecture

  • 1. Information Security Science Putting the Business in Enterprise Information Security Architecture Ravila Helen White | CISSP, CISM, CISA, GCIH Making it better without making it complex
  • 2. Disclaimer This presentation and the concepts herein are my opinions through private research, practice and chatting with other professionals. It is not the opinion of past, present or future employers.
  • 3. Agenda  AS IS – The current state of affairs…  Getting There – The return of Systems Thinking…  To Be – Becoming agile…
  • 4. As Is The current state of affairs….
  • 5.  Sherwood Applied Business Security Architecture (SABSA) 1995  Structure and Content of an Enterprise Information Security Architecture by Gartner 2006  Security Architecture and the ADM by TOGAF  SOA Legacy
  • 6. Where is the security architect?
  • 7. Conflicting Roles  CISO/ISO  Security Engineer/Administrator  CISO/Analyst/Engineer  Security Architect
  • 8. Definition Dichotomy  Framework  Guidelines  Taxonomy  Policy  Procedure  Standard “Knowing is not understanding. There is a great difference between knowing and understanding: you can know a lot about something and not really understand it.” [Charles Kettering]
  • 9. Artifact Handling  What are they?  Where are they?  How are they used? Architectural Artifact— “A specific document, report, analysis, model, or other tangible that contributes to an architectural description.” [Roger Sessions]
  • 10. One EA’s Point of View  "EA provides a filter on siloed thinking; I know the solution you proposed makes sense to you, but we provide a wider perspective that can help you make sense for other people as well."  "Information Security professionals sometimes forget that the rest of the organization is there."  "Security professionals often fail to consider the incremental cost that accrues to a policy. Over time, a good policy can incur so much cost that it no longer makes sense from an EA perspective." Nick Malik – Inside Architecture Blogger
  • 11. Disparate States Revolutionary Evolutionary  (1) of, pertaining to, characterized by, or of the nature of a revolution, or a sudden, complete, or marked change. (2) radically new or innovative; outside or beyond established procedure, principles, etc  A gradual process in which something changes into a different and usually more complex or better form
  • 12. Opportunities of Optimization  Systemic integration of information security architecture in to the business.  Adoption of a meta framework to drive information security architecture to business alignment and visibility.  Development of a modular schema to support the use of the most widely used security architecture methodologies.
  • 13. Getting There The return to Systems Thinking…
  • 14. Systems Thinking not Analytics  What it is  Why you need it  How you get it Does not follow the traditional analysis focuses of separating individual pieces of what is being studied. Systems thinking, in contrast, focuses on how the thing being studied interacts with the other constituents of the system—a set of elements that interact to produce behavior—of which it is a part.
  • 15. Security is a practice within the business/not the business Information Security Focus Enterprise Perspective  CISSP  CISA  CISM  CIPP*  GIAC (SANS)  Business Process Modeling  Enterprise Architecture  Information Design  Software Engineering
  • 16. How to apply as middleware  Business Process Modeling –translates what you have to offer in terms and techniques used by the business.  Enterprise Architecture – aligns IT initiatives to business needs.  Information Design –takes the complex and makes it consumable.  Software Engineering– reverse engineering and agile development
  • 17. Benefits of Systems Thinking  Business Process Modeling – communicates intent and value to the organization  Enterprise Architecture – sets the context of information security within the business  Information Design – helps non-infosec partners quickly orient themselves in a complex environment  Software Engineering– provides synthesis of complex information into a whole
  • 18. The Controls of Systems Thinking  Standards  Regulations  Guidelines  Logic Models  Setting Context Controls are used in business to prevent taking on too much risk and reducing risk of an existing or potential weakness. When too much risk is taken against a system, it is weakened systemically and typically results in system-wide failure.
  • 20. Synthesizing business modeling  A business model describes the rationale of how an organization creates, delivers and captures value  A logic model is a systematic and visual way to present and share your understanding of the relationships among the resources you have to operate your program, the activities you plan, and the changes or results you hope to achieve.
  • 21.
  • 22. Adapted from Alex Osterwalder’s Business Model Canvas
  • 23. Defining Artifacts  Authoritative ◦ sets the direction ◦ the business validates its decisions ◦ the business executes against ◦ the business captures resource requirements ◦ the business verifies the activities necessary to support a solution  Historical ◦ Project plans ◦ Proposals, RFPs,
  • 24. Artifact Handling  Result in deliverables to the business  Contain sensitive information
  • 25. Setting Context  Communicates to the business and peers what services are provided  Sets the scope of activities
  • 28. Plan of Action 1. Apply a business model 2. Choose your metadata sources 3. Adopt a common terminology taxonomy 4. Define artifacts and storage location 5. Research current and future 6. Develop component architecture
  • 30. Credits & References General Professional Influencers  Business Model Generation  www.dictionary.com  Google: www.Google.com  Information Design Handbook  Logic Model Development Guide: http://www.wkkf.org/Pubs/Tools/E valuation/Pub3669.pdf  Oxford Dictionary  Thinking Page: www.thinking.net  TOGAF: www.opengroup.org  SABSA: www.sabsa-institute.org/  Wikipedia: www.wikipedia.com  Alex Osterwalder
  • 31. Copyright Information Some works in this presentation have been licensed under the Creative Common license (CC). Please respect the license when using the concepts or adapting them. For more information please go here:  www.creativecommons.org
  • 32. Thank you… Questions and Comments Contact me via LinkedIn

Editor's Notes

  1. Presented at SecureWorld Expo Seattle
  2. Putting the business into information security architecture begins with shaping your view of how the business determines state. Determination is made based on analyzing the current state “as is” and determined future state concept of “to be”. As this is the modeling behavior that most architects and business analyst use to drive the business it will also drive our agenda. AS IS is a discussion of the current state of affairs of information security architecture. Getting There is a discussion of what is necessary to move past the current state. TO BE is a discussion of how information security architecture looks once it has been integrated into the business.
  3. Let’s discuss the current state of affairs facing information security architects. A point to note is use of the word enterprise has been mostly removed in their presentation. If you are an architect, you are more than likely in an environment that requires and currently utilized enterprise solutions.
  4. SABSA directive based on a taxonomy approach similar to Zachman with integrations from Zachman. Both methods are a great way to start delving into architecture, however they contain the base elements only. You must provide the internals. Gartner’s directive is based on their BIT methodology of Business Information and Technology. BIT morphed to BITS with the inclusion of Security. TOGAF directive based on NIST recommendations which typically are used to design a program. The practioner is not told how to integrate security from a busienss perspective. Furthermore, the audience for TOGAF’s appears to be toward the EA has not had the opportunity to delve inside of information security, rather than a seasoned security professional. SOA and those who practice it have compiled first a set of security standards as it relates to SOA web and application development. In some cases, vulnerabilities exist that are not addressed; adoption of best practices from a myriad of sources exists. Of the methodologies mentioned, SABSA comes in first with understanding how security architecture can be integrated in the business. However, given the shift of organizational structure from siloed to matrixed as well as the adoption of agile development, none of these methodologies can be considered definitive without a support from other fields and disciplines. Additionally, they do not encourage agile response by the security architect in the provisioning of solutions. The litmus test for this assumption is based on the current definition of a security architect.
  5. Remember the Where’s Waldo illustrations the late 80’s? The setting was usually chaotic, depicting a specific location or activity. The goal was to fine Waldo amidst all the chaos. Information security professionals face a similar challenge in operating in the business today. Business initiatives are kicked off and in most cases, information security is engaged toward the end of the project. This results in conflict as little change can be effect at times without impact the schedule of the project.
  6. The security architect role follows a similar vein when you compare job titles against job descriptions and the required activities. In one case someone might be called an architect when in reality they are a CISO/ISO who must design and manage a security program. Others may actually be security engineers who manage the security technology of the organization. Still others may be a blend of an CISO/Analyst and Engineer. If you can’t find define the role, how can the business understand what services the architect will provide and how to engage them. When the business can not determine the need then the value is not assessed or appreciated as well.
  7. One of the biggest issues facing not just information security architecture but many information technology disciplines is a lack of common language and standards. This may seem a minor issue. However, it can cause confusion when a group of subject matter experts must reach a goal but they cannot because each person has their own idea of simple terms. As an exercise, ask people in your organization what a guideline or a framework is. Then ask them what a policy is. If you cannot agree on terminology, don’t expect to agree on what the role of the security architect is or how it should integrate in the business. Developing a common language from which everyone is working will go a long way toward moving architecture initiatives along. To set the floor of your taxonomy, use terms that are industry standard that easily integrated into the culture of your organization. This becomes especially important if your organization is global or international or has out-sourced some activities.
  8. A crucial point of agreement is architecture is what do we define as our artifacts. Google architecture + artifacts and the results will range from vague to explicit. This is not helpful when we consider an artifacts goal is to provide direction to move forward, help us to understand where we’ve been or why a decision was made. Artifacts are the resulting documents that provide a vision of the solution you are planning to provide or your environment. In some cases they are conceptual drawings, functional design or even narrative documentation such as a standard. Next is the question as to where they should live. There is little agreement or direction around where artifacts should live given their particular relevance to a project. This is risky when you consider that some of the resulting artifacts required of information security architecture must provide protection, mitigation and uphold compliance. Artifacts can be very powerful when used appropriately. They loose their power when there is not a clear definition of how they are used. Most organizations have policies. As policies are legal binding, require enforcement and compliance; enterprise architecture in general requires awareness and knowledge of policies when solutions are first conceptualized and finally developed. A lack of understanding of how artifacts are used once developed can undermine the best laid plans and result in a lack of confidence and trust with non-information security partners.
  9. One evening on LinkedIn, I checked the Enterprise Architecture group discussions and found a posting the asked “Why don’t CISOs know about OWASP?” I was surprised as most of the security leaders I know are aware of OWASP. However given the question and responses, I recognized the existence of a perception that information security professionals in general may appear to be myopic to their business partners. To test my assumption I engaged a local well experienced enterprise architect and asked him a set of questions. The most relevant responses are shared here as they were the most meaningful. His responses provided confirmation that to a degree information security architecture really hasn’t been integrated into the business from a systemic perspective. As we’ve already discussed, there are constructs, principles, frameworks etc which exist; however they have not addressed the more important goal of business integration and alignment. Without reaching this goal, information security architecture will languish inside the business.
  10. Information security overall has been fairly revolutionary; its had to deal with the blackhat community and the rise of the internet in most businesses and homes. It is evolutionary as it is never dormant; rather, it ebbs and flows between states of motion and states of rest. States of motion exist when the blackhat community provides threats that are new and for which there is little corresponding technology to manage the threat. States of rest exist, when the Blackhat community and corresponding technology has reached a state of counterbalance. What does this have to do with information security architecture? An analogy: The greatest building revolutions can take place when societies overcome a weakness or make a discovery that proves to be revolutionary. This cause results in the continued affect of systemic evolution. The question of information security architecture is given the revolutionary advances of the past 10 years, how have we evolved and what do we need to ensure evolution occurs that will embed information security architecture as a systemic discipline inside the business? Additionally, what is the current state?
  11. We are at a time for great opportunity. If we look at the landscape of technology to malware development, we’ve reach a point of counterbalance. This has resulted in a state of rest so to speak for information security as a whole as we are not responding to threats in a reactive manner. Advantage is gained by using such periods to further revolutionize areas of information security that have not been systemically developed. In the case of information security architecture, the resting period is currently on of revolution. Security architects should take the initiative and consider the current (AS IS) meta data of methodologies, models, standards and constructs that define information security architecture today. This will result in identification of strengths and weaknesses as well as what suppositions have become obsolete. Such an analysis, leads us to the TO BE or future state that operates inside of the business.
  12. We know we need to change. Lets discuss how can we do that without impacting the organizations we support and take the knowledge we have and channel it to greater success.
  13. This means that instead of isolating smaller and smaller parts of the system being studied, systems thinking works by expanding its view to take into account larger and larger numbers of interactions as an issue is being studied. This results in sometimes strikingly different conclusions than those generated by traditional forms of analysis, especially when what is being studied is dynamically complex or has a great deal of feedback from other sources, internal or external. Enterprise architecture and its sub architectures of which information security is a part must look at the big picture to provide successful solutions. Becoming myopic or blind to any part of the enterprise results in lose of functionality, protection and most importantly, user satisfaction. Information security architects must have systems thinking because information security and EA operate in a dichotomy. EA drives the business forward while information security may seemingly quash innovation as it must protect the business and provide assurance in a transparent manner. Transparency of information security cannot exist if the security architect does not understand the partner disciplines it supports or must integrate with. Additionally, information security must look to the business and EA to determine protections. If a protection is not required, then it should not be suggested. Information security architecture must be truly visionary. When it is visionary, it becomes a compliment of the system is protects. It is not complimentary when over engineered to complexity for those who must support it and those who use the resulting system. We can achieve systems thinking for the information security architect through diversification. Understand how to protect the flow of data is great. However, is applied differently depending on the type of information data and where it is flowing. For instance the solution for protecting the flow of electronic mail is different than the solution that protects the flow of transactional messages into and out of a data warehouse. A lack of understanding around data warehousing and information architecture could greatly impact usability if a one size fits all solution were approached. Diversification of knowledge is what makes a successful information security architect.
  14. If you look at most job descriptions of information security professionals, they ask for at least three of the five certifications listed. There are many more but these are the most prevalent. These are great certifications to obtain as a method for immersing oneself in the discipline of information security. The organizations which promoted these certifications are typically focused on information security and how it should be practiced from a autonomous perspective inside of an IT organization. There has been an effort by some to provide direction on how to gain visibility and oversight through governance. However they do not provide direction on how to align to the business. Nor do they provide you with knowledge of partner disciplines. When they do, then typically information security is the driver of the discipline rather then an integration component. If you are in an enterprise which most of us are, then you must become aware and comfortable with the disciplines you’ll partner with in the enterprise. Take the disciplines of the enterprise and use them as a middleware to integrate information security into the business.
  15. In software development, middleware is used to support interoperability between disparate systems. For information security architecture innovation, non-infosec disciplines and practice can serve as the middleware to achieving success by supporting the business in a manner that is accepted. By learning at least two non-infosec practices in your organization, you are enabled to respond in a fashion that will allow you to easily communication with your business partners. This is how you move past being a analytical thinker to a systems thinker. Remember, analytics is more about focusing on points and is individualist in nature. Systems thinking is the aggregation of analytics around internal and external behaviors and interactions in a system. Of the recommended knowledge to gain, reverse engineering is perhaps the most valuable as it will enable you to gain a systems view of the information and guide your recommendations more accurately. Reverse engineering can tell you much about an environment. First and foremost it is an indicator of organizational maturity. Where standards are present, order is evident; where standards are absent, systemic chaos exists. Reverse engineering documentation is helpful as it can expose the lack of authoritative artifacts, the lack of supporting documentation and processes. Typically, if you lack documentation which means the organization may lack the maturity necessary to recover and continue operations in the aftermath of a disaster. Reverse engineering of a system is a learning tool as it will provide an understanding of how the technology is designed and how it operates. It can also help identify gaps in documentation or implementation. Reverse engineering from an architectural point of view is important as you must understand where you’ve been if you are to more accurately define where you should be.
  16. Information security architecture benefits from systems thinking when the input of non-infosec disciplines results in the output clear communication, definition of scope, mapping of disparate entities to a whole entity that can respond to the complex demands of technology in the enterprise. Systems thinking also enables the security architect to make long-term recommendations and decisions that are sustainable as opposed to short-term fixes. Information Design is a crucial missing piece in the arsenal of many security professionals. It will help you present narratives or designs in a manner that is driven toward audience. The drawing you might provide to a director or above is much different than that drawing you’ll provide to an engineer or admin. Software engineering provides the synthesis around what we’ve discussed in the form of applying the concept of AGILE development to accelerate the top heavy and disparate approach of security architecture today.
  17. As architecture is as much about building as it is about innovation it requires controls to support the design of systems that are extensible and sustainable. The lack of judicious controls results in over-engineering, chaos of component architecture, high cost of ownership to support and maintain a system. The most devastating is the delivery of a solution of end users that does not satisfy business requirements. Standards are the prescriptive control in information security architecture. Use standards to set the floor is to establish your baseline. It means you are working from an expected point that is backed up by the industry. Regulations such as HIPAA, SOX or PCI are explicit controls as they set ceiling of compliance and are not optional. Industry guidelines are the control that allow organizations to approach the development of systems typically based on national or global standards (i.e. NIST or ISO) Logic models illustrate the connection between your planned work and your intended results. YOUR PLANNED WORK describes what resources you think you need to implement your program and what you intend to do. YOUR INTENDED RESULTS include all of the program’s desired results (outputs, outcomes, and impact). Setting context is a method for aligning activities and services to the business and a control for eliminating scope creep.
  18. Thus far we’ve discussed the AS IS or current state of information security architecture. Critical gaps in the current approach and how they undermine the discipline has been examined. Thought share around remedies to the current state has been introduced in the Getting There section of the presentation. Now we are ready to synthesize the AS IS and the Getting there elements to put business in information security architecture and make it agile. Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals.
  19. Business modeling like any process can be come arduous and waste time without its own set of controls. By containing it within a logic model, built-in controls are developed that drives the process to produce meaningful results. I have provided a link at the end of the presentation that can guide you through developing your own logic models. It can be quite useful in communicating complex data.
  20. This is the Business Model Canvas developed by Alex Osterwalder. It’s one of the best logic modeling tools I’ve found to define and communication a business model. It consists of nine basic building blocks to show the logic that is required to drives a business: customers, offer, infrastructure and financial viability. Used correctly, it can serve as a blueprint, strategy or planning artifact for an organization. Take the time to research the SABSA conceptual and functional model. Then look at Gartner's BITS. If you are a business professional what do you want to see? It’s a business model representation as that is the point of reference business leaders are working from. SABSA and Gartner are for the architects use.
  21. This is the business model canvas adapted to fit an information security architecture model. It is a prototyping tool used to build relationships with your partners but also build a business plan that will integrate and align with the business. This is what business leaders want to see. They do not want to see the SABSA model nor do they want to sort through reams of reports and analysis that focus on information security centric data. They want to know what its going to take to protect the business and revenue. Modifying the business canvas to compliment an architectural slant quickly communicates the business that you are aware of their vision and how information security architecture fits in to support it.
  22. One of the most important outputs of architecture are artifacts. According to TOGAF, artifact represents an individual model of a system or solution, which could potentially be re-used in a variety of contexts. An artifact is distinct from a deliverable, which is a contracted output from a project. In general cases, deliverables will contain artifacts and each artifact may exist in many deliverables. Drive the definement of artifacts to streamline solultion delivery. Here we’ve defined two types of artifacts. Authoritative and Historical. They have very different uses and the audiences differ as well.
  23. Considering the importance of artifacts, IT should agree upon the type of artifacts they will develop and their location. This is crucial if the security architect is to use the AS IS/TO BE methodology. If they cannot reference the past fairly accurately, visioning the future can become more time consuming. Artifacts are the ‘guts’ of the business and as such should be stored in a secure manner to only those that require access. Evangelize for your IT department where to store artifacts. Such a decision can make all the difference later on down the road when audits occurs or information management is addressed.
  24. Setting context defines the conceptual layer that will drive the parent-child relationship of taxonomy-based architectural program. Without establishing the parent-child relationship of your program, you will likely offer services that do not align with the business.
  25. The component architecture is based on a reverse engineering the infrastructure to understand boundaries, how they interconnect and support each other. This is why the infrastructure zone is at the top of the drawing. Different zones require varying levels of protection. Protection is accomplished through the application of countermeasures and controls. Select the countermeasures and controls you’ll used in your architecture solutions. Using a taxonomy-based approach, we determine what we are protecting by pulling the architectural concepts architecture context area. This enables the more granular identification of the infrastructure components we will protect. Controls and baselines are pulled from industry guidelines, standards and regulations. The component architecture should also contain any future technologies that have yet to be deployed. This will drive the AS IS and TO BE models without creating unnecessary overhead. In this drawing the future technologies are define by the color red.
  26. The component architecture is based on a reverse engineering the infrastructure to understand boundaries, how they interconnect and support each other. This is why the infrastructure zone is at the top of the drawing. Different zones require varying levels of protection. Protection is accomplished through the application of countermeasures and controls. Select the countermeasures and controls you’ll used in your architecture solutions. Using a taxonomy-based approach, we determine what we are protecting by pulling the architectural concepts architecture context area. This enables the more granular identification of the infrastructure components we will protect. Controls and baselines are pulled from industry guidelines, standards and regulations. The component architecture should also contain any future technologies that have yet to be deployed. This will drive the AS IS and TO BE models without creating unnecessary overhead. In this drawing the future technologies are define by the color red.
  27. At the end the of the day, you are already an expert with information security. Now its time to expand your horizons and add capabilities that will communicate simply what your mission, goals and activities are to non-information security professionals. Diversify your skill set to accomplish more.
  28. I’d like end the discussion with the last bit of diversification. We recognize that technology and the development of technology takes places at a rapid pace. Information security professionals keep pace when they follow the driving disciplines. So I leave you with the AGILE model for information security architecture. The approach is both strategic and tactical. Steps 1 – 4 are purely strategic. Development will require business partner input. Steps 5 and 6 are of a more tactical nature and are owned by the information security architect. Steps 4-6 become iterative once solution architecture begins. Each solution project can use the strategic planning information previously gathered to influence the solution they will build using steps 4-6. This is how you put the business inside of information security architecture and make it AGILE.
  29. Something I’d like to encourage all of you do to…when presenting in the future, list not only your online and book references, but also your people credits. We all meet people who are pivotal in growing or knowledge or professionalism. Don’t forget to mention them.