SlideShare a Scribd company logo
1 of 43
Information Security &
Enterprise Architecture
Is information security
built-in or add-on
in the
plan, design and execution
of information and communication
systems?
Information Security
Requirements
INFORMATION
MANAGEMENT
INFORMATION SECURITY
Confidentiality Integrity Availability
1. Create
2. Store
3. Utilize
4. Share
5. Dispose
ENTERPRISE ARCHITECTURE
INFORMATION SECURITY
ENTERPRISE
ARCHITECTURE
INFORMATION SECURITY
PRINCIPLES LEGAL TECHNICAL GOVERNANCE
PROCESS
DATA
APPLICATION
TECHNOLOGY
ENTERPRISE
• "Enterprise" is an entity defined and organized
to create value
• The value creation is structured to be
composed of product, services, people,
location, performance, function, process,
data, application, technology, infrastructure
and providers.
johnmacasio@gmail.com
ARCHITECTURE
• Speaks of drawn model to describe
the holistic and particular view of the
system in actualizing the “value”
defined for the organization.
• Blueprint which define the baseline of
common and differentiated
information on how the system is
organized and expected to behave to
actualize the mandate, mission,
principles, vision, goals, objectives
and performance.
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
“You are going to do
architecture, because without
architecture, you cannot do
any of these things:
• Alignment
• Integration
• Change
• Reduced Time-to-Market
-John Zachman
Enterprise Architecture Framework
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
ALIGNMENT
• Enterprise architecture provides the
framework to enable better alignment of
business and information technology
objectives. The architecture used can also
serve as a communication tool.
VALUE OF ENTERPRISE ARCHITECTURE
INTEGRATION
• Enterprise architecture establishes the
infrastructure that enables business rules to
be consistently applied across the
organization, documents data flows, uses and
interfaces.
VALUE OF ENTERPRISE ARCHITECTURE
VALUE CREATION
• Enterprise architecture provides better
measurement of information technology
economic value in an environment
where there is a higher potential for
reusable hardware and software assets
VALUE OF ENTERPRISE ARCHITECTURE
CHANGE MANAGEMENT
• Enterprise architecture establishes consistent
infrastructure and formalizing the
management of the infrastructure and
information assets better enables an
organization-wide change management
process to be established to handle
information technology changes
VALUE OF ENTERPRISE ARCHITECTURE
COMPLIANCE
• Enterprise architecture provides the artifacts
necessary to ensure legal and regulatory
compliance for the technical infrastructure
and environment.
- Schekkerman, J. (2005). Trends in Enterprise Architecture,
Institute for Enterprise ArchitectureDevelopment
ENTERPRISE ARCHITECTURE DOMAIN
TECHNOLOGY
INFRASTRUCTURE
INFORMATION
DATA & APPLICATION
BUSINESS
FUNCTIONS
PROCESS &
POLICIES
ORGANIZATION &
STAKEHOLDERS
MANDATE
VISION
GOALS
PROGRAMS
1. Intention
2. Business
3. Information
4. Technology
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
1. BUSINESS ARCHITECTURE
Definition of the business strategy, governance,
organization, and key business processes of the
enterprise
2. APPLICATION ARCHITECTURE
Provision of functional blueprint for the
individual application system to be deployed,
the interaction between application system, and
their relationship to the core business processes
of the enterprise
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
3. DATA ARCHITECTURE
Structural definition of the logical and physical data
assets of the enterprise, and the associate data
management resources.
4. TECHNOLOGY ARCHITECTURE
Definition of the hardware, software and network
infrastructure to support the deployment of core
and mission-critical applications. It includes
description of technology standards and
methodology.
johnmacasio@gmail.com
ENTERPRISE ARCHITECTURE
COMPONENTS IN ICT SERVICES
USE CASE
APPLICATION
SYSTEM
DATA
SERVICES
APPLICATION
SERVICES
CONNECTIVITY
SERVICES
USERS
ACCESS
BUSINESS
PROCESSES
MEMBERSHIP
COLLECTION
BENEFITS
ACCREDITATION
DATA
ELEMENTS
DATABASE
SYSTEM
NETWORK
INFRASTRUCTURE
POINT OF PRESENCE
CUSTOMER
CLIENTS
PROVIDERS
SUPPLIERS
johnmacasio@gmail.com
E
Membership Collection Benefits Accreditation
CUSTOMER RELATIONSHIP MANAGEMENT
ENTERPRISE RESOURCE PLANNING
Planning Audit Risks Legal/Policy
ENTERPRISE PERFORMANCE MANAGEMENT
Finance
Human
Resource
Assets
Facilities
Technology
DATA
APPLICATION
BUSINESS
PROCESS
TECHNOLOGY
INFRASTRUCTURE
CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW
INFORMATION
SECURITY
E
N
T
E
R
P
R
I
S
E
A
R
C
H
I
T
E
C
T
U
R
E
johnmacasio@gmail.com
SUCCESS COMPONENTS OF
INFORMATION SYSTEM
Agency
Citizen
DeLone and McLean Model
johnmacasio@gmail.com
Enterprise Architecture
Information Security
Questions
Information
Security
Principles
Information
Security
Risks
Information
Security
Methodology
BUSINESS
FUNCTION
PROCESS
BUSINESS
DATA &
APPLICATION
BUSINESS
TECHNOLOGY
INFRASTRUCTURE
ENTERPRISE
INFORMATION
SECURITY
johnmacasio@gmail.com
Information
Security
Governance
NETWORKED INFORMATION
SUPPLIER & CUSTOMER
Information Security Means…
Information
Security
Confidentiality
Availability
Integrity
Secrecy, Privacy and Authority
Accurate, Complete and Reliable
Accessible, Immediate and Uptime
johnmacasio@gmail.com
johnmacasio@gmail.com
Information Insecurity Means…
StolenMisrepresented
Breached
Information is
not secure
when
something is
Misused
IncompleteUnauthorized
Compromised Denied
CASE: HEALTH INSURANCE
INFORMATION SECURITY
MEMBERSHIP
MANAGEMENT
COLLECTION
MANAGEMENT
BENEFITS
MANAGEMENT
ACCREDITATION
MANAGEMENT
payment
identification
claims
certification
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
FINANCIAL
MANAGEMENT
PERSONNEL
MANAGEMENT
ASSET
MANAGEMENT
LEGAL
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
AUDIT
MANAGEMENT
STRATEGY
MANAGEMENT
RISK
MANAGEMENT
PROJECT
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
INFRASTRUCTURE
MANAGEMENT
NETWORK
MANAGEMENT
APPLICATION
MANAGEMENT
DATA
MANAGEMENT
johnmacasio@gmail.com
Mitigating Information
Security Risk
Information
Security
Risk
Mitigation
Assessment
Policy Governance
Technology
johnmacasio@gmail.com
Why Who
What How
Security Policy Requirement
Governance
•Functional
Organization
•Roles and
Responsibilities
Competencies
•Knowledge, Skills and
Attitudes Requirements
•Training Program and
Certification
Process
•Business Workflow,
Procedures and Rules
•Risk Audit and Control
Procedures
Data
Infrastructure
•Acceptable Use
•Data Management
•Risk Audit and
Control Procedures
•Infrastructure
Management
•Sourcing &
Procurement
•Risk Audit and
Control
Governance
Guidance and
Implementation
Competency
Reference and
Assessment
Functions
Process
Models and
Control
Guidance
Data and Application
Security Models and
Acceptable Use
Physical Configuration
Network Models
Service Sourcing
Trusted Technology
Acceptable Use
No Need to
Reinvent the Wheel
1. Recognize security needs & question
2. Find the fitted practitioner standards
3. Apply standards to real life condition
4. Assess and improve the practice
johnmacasio@gmail.com
Governance
Competency
Process
Data
Infrastructure
Information Security
Risk Assessment
Information
Asset
Inventory
(Information
Systems)
Risk
Mitigation
Treatment
Prevention
Impact
Rating of
Vulnerability
Identification
Vulnerability
Threat Source
johnmacasio@gmail.com
1. Organization
2. Process
3. Data
4. Application
5. Infrastructure
What it means
to secure information…
1. Establish the governance and
management organization of
information security that
comply to best practice
standards.
johnmacasio@gmail.com
What it means
to secure information…
2. Identify the information
assets, and perform the
assessment of vulnerabilities
and threats that surround
the creation, storage, use
and sharing of information.
johnmacasio@gmail.com
What it means
to secure information…
3. Develop, document and
implement policies, standards,
procedures, and guidelines that
ensure confidentiality, integrity,
and availability in the person,
process, data, application and
infrastructure of information.
johnmacasio@gmail.com
What it means
to secure information…
4. Evaluate, acquire and use
security management tools to
classify data and risk, to audit
information system, to assess
and analyze risks in the solution
development and infrastructure,
to monitor and control areas of
vulnerabilities. and implement
security controls and appropriate
reactive responses to threats.
johnmacasio@gmail.com
Basic Security Steps
Authorized
Access
Device
Integrity
Data
Exchange
Protocol
Monitoring
& Audit
Network
Hardening
Service
Agreements
Information
Systems
Security
Standards
Risk
Assessment
& Policies
Security
Services
User
Training
johnmacasio@gmail.com
CHANGE…
1. We can only evaluate that which
is measurable
2. We can only test that which is
agreed.
3. We can only improve that which
is actualized.
4. We can only change that which
is established.
johnmacasio@gmail.com

More Related Content

What's hot

Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 

What's hot (20)

Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Security policy
Security policySecurity policy
Security policy
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 

Viewers also liked

Making IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyMaking IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyChiara Fox Ogan
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...James Melzer
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTJohn Macasio
 
Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterpriseJesus Rodriguez
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise ArchitectureJohn Macasio
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)GovCloud Network
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for DevelopersBrandon West
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journeyAbinav Munshi
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12OptiRisk India
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureAndrea L. Ames
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonSalmon Limited
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process ReviewJohn Macasio
 

Viewers also liked (20)

Making IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyMaking IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture Strategy
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENT
 
Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise Architecture
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
TDD in Zend Framework 2
TDD in Zend Framework 2TDD in Zend Framework 2
TDD in Zend Framework 2
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for Developers
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journey
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process Review
 

Similar to Enterprise Architecture and Information Security

Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureNathaniel Palmer
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data GovernanceBhavendra Chavan
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...Egyptian Engineers Association
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility PECB
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation William Francis
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group
 
enterprise-architecture part2.pptx
enterprise-architecture part2.pptxenterprise-architecture part2.pptx
enterprise-architecture part2.pptxErsignDLozano
 
enterprise-architecture.pptx
enterprise-architecture.pptxenterprise-architecture.pptx
enterprise-architecture.pptxErsignDLozano
 
Data-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringData-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringDATAVERSITY
 
Info tech membership overview
Info tech membership overviewInfo tech membership overview
Info tech membership overviewDavid Xing
 
Enterprise solution design principles
Enterprise solution design principlesEnterprise solution design principles
Enterprise solution design principlesLeo Barella
 

Similar to Enterprise Architecture and Information Security (20)

april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
MS IT-strategy.pptx
MS IT-strategy.pptxMS IT-strategy.pptx
MS IT-strategy.pptx
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
 
Business Architecture.pptx
Business Architecture.pptxBusiness Architecture.pptx
Business Architecture.pptx
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
SIA LESSON.pptx
SIA LESSON.pptxSIA LESSON.pptx
SIA LESSON.pptx
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
 
enterprise-architecture part2.pptx
enterprise-architecture part2.pptxenterprise-architecture part2.pptx
enterprise-architecture part2.pptx
 
enterprise-architecture.pptx
enterprise-architecture.pptxenterprise-architecture.pptx
enterprise-architecture.pptx
 
Data-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringData-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality Engineering
 
2014 dqe handouts
2014 dqe handouts2014 dqe handouts
2014 dqe handouts
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
Info tech membership overview
Info tech membership overviewInfo tech membership overview
Info tech membership overview
 
Enterprise solution design principles
Enterprise solution design principlesEnterprise solution design principles
Enterprise solution design principles
 
Resume A
Resume AResume A
Resume A
 

More from John Macasio

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationJohn Macasio
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemJohn Macasio
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentJohn Macasio
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerJohn Macasio
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency ModelJohn Macasio
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the WorkplaceJohn Macasio
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the MillenialsJohn Macasio
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation templateJohn Macasio
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at WorkplaceJohn Macasio
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureJohn Macasio
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureJohn Macasio
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status ChecklistJohn Macasio
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerJohn Macasio
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management EssentialsJohn Macasio
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningJohn Macasio
 
E-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersE-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersJohn Macasio
 
Mobile Presence of Governance and Management
Mobile Presence of Governance and ManagementMobile Presence of Governance and Management
Mobile Presence of Governance and ManagementJohn Macasio
 
GCIO Competency and Training
GCIO Competency and TrainingGCIO Competency and Training
GCIO Competency and TrainingJohn Macasio
 

More from John Macasio (20)

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital Transformation
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management System
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness Assessment
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked Learner
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency Model
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the Millenials
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation template
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise Architecture
 
E-School Project
E-School ProjectE-School Project
E-School Project
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise Architecture
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status Checklist
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture Primer
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management Essentials
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services Planning
 
E-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersE-Governance and ICT for Government Managers
E-Governance and ICT for Government Managers
 
Mobile Presence of Governance and Management
Mobile Presence of Governance and ManagementMobile Presence of Governance and Management
Mobile Presence of Governance and Management
 
GCIO Competency and Training
GCIO Competency and TrainingGCIO Competency and Training
GCIO Competency and Training
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Enterprise Architecture and Information Security

  • 2. Is information security built-in or add-on in the plan, design and execution of information and communication systems?
  • 3. Information Security Requirements INFORMATION MANAGEMENT INFORMATION SECURITY Confidentiality Integrity Availability 1. Create 2. Store 3. Utilize 4. Share 5. Dispose
  • 4. ENTERPRISE ARCHITECTURE INFORMATION SECURITY ENTERPRISE ARCHITECTURE INFORMATION SECURITY PRINCIPLES LEGAL TECHNICAL GOVERNANCE PROCESS DATA APPLICATION TECHNOLOGY
  • 5. ENTERPRISE • "Enterprise" is an entity defined and organized to create value • The value creation is structured to be composed of product, services, people, location, performance, function, process, data, application, technology, infrastructure and providers. johnmacasio@gmail.com
  • 6. ARCHITECTURE • Speaks of drawn model to describe the holistic and particular view of the system in actualizing the “value” defined for the organization. • Blueprint which define the baseline of common and differentiated information on how the system is organized and expected to behave to actualize the mandate, mission, principles, vision, goals, objectives and performance. johnmacasio@gmail.com
  • 7. Need for Enterprise Architecture johnmacasio@gmail.com
  • 8. Need for Enterprise Architecture johnmacasio@gmail.com
  • 9. Need for Enterprise Architecture johnmacasio@gmail.com
  • 10. Need for Enterprise Architecture johnmacasio@gmail.com
  • 11. Need for Enterprise Architecture johnmacasio@gmail.com
  • 12. Need for Enterprise Architecture johnmacasio@gmail.com
  • 13. Need for Enterprise Architecture johnmacasio@gmail.com
  • 14. Need for Enterprise Architecture johnmacasio@gmail.com
  • 15. Need for Enterprise Architecture johnmacasio@gmail.com
  • 16. VALUE OF ENTERPRISE ARCHITECTURE “You are going to do architecture, because without architecture, you cannot do any of these things: • Alignment • Integration • Change • Reduced Time-to-Market -John Zachman Enterprise Architecture Framework johnmacasio@gmail.com
  • 17. VALUE OF ENTERPRISE ARCHITECTURE ALIGNMENT • Enterprise architecture provides the framework to enable better alignment of business and information technology objectives. The architecture used can also serve as a communication tool.
  • 18. VALUE OF ENTERPRISE ARCHITECTURE INTEGRATION • Enterprise architecture establishes the infrastructure that enables business rules to be consistently applied across the organization, documents data flows, uses and interfaces.
  • 19. VALUE OF ENTERPRISE ARCHITECTURE VALUE CREATION • Enterprise architecture provides better measurement of information technology economic value in an environment where there is a higher potential for reusable hardware and software assets
  • 20. VALUE OF ENTERPRISE ARCHITECTURE CHANGE MANAGEMENT • Enterprise architecture establishes consistent infrastructure and formalizing the management of the infrastructure and information assets better enables an organization-wide change management process to be established to handle information technology changes
  • 21. VALUE OF ENTERPRISE ARCHITECTURE COMPLIANCE • Enterprise architecture provides the artifacts necessary to ensure legal and regulatory compliance for the technical infrastructure and environment. - Schekkerman, J. (2005). Trends in Enterprise Architecture, Institute for Enterprise ArchitectureDevelopment
  • 22. ENTERPRISE ARCHITECTURE DOMAIN TECHNOLOGY INFRASTRUCTURE INFORMATION DATA & APPLICATION BUSINESS FUNCTIONS PROCESS & POLICIES ORGANIZATION & STAKEHOLDERS MANDATE VISION GOALS PROGRAMS 1. Intention 2. Business 3. Information 4. Technology johnmacasio@gmail.com
  • 23. ARCHITECTURE DOMAINS 1. BUSINESS ARCHITECTURE Definition of the business strategy, governance, organization, and key business processes of the enterprise 2. APPLICATION ARCHITECTURE Provision of functional blueprint for the individual application system to be deployed, the interaction between application system, and their relationship to the core business processes of the enterprise johnmacasio@gmail.com
  • 24. ARCHITECTURE DOMAINS 3. DATA ARCHITECTURE Structural definition of the logical and physical data assets of the enterprise, and the associate data management resources. 4. TECHNOLOGY ARCHITECTURE Definition of the hardware, software and network infrastructure to support the deployment of core and mission-critical applications. It includes description of technology standards and methodology. johnmacasio@gmail.com
  • 25. ENTERPRISE ARCHITECTURE COMPONENTS IN ICT SERVICES USE CASE APPLICATION SYSTEM DATA SERVICES APPLICATION SERVICES CONNECTIVITY SERVICES USERS ACCESS BUSINESS PROCESSES MEMBERSHIP COLLECTION BENEFITS ACCREDITATION DATA ELEMENTS DATABASE SYSTEM NETWORK INFRASTRUCTURE POINT OF PRESENCE CUSTOMER CLIENTS PROVIDERS SUPPLIERS johnmacasio@gmail.com
  • 26. E Membership Collection Benefits Accreditation CUSTOMER RELATIONSHIP MANAGEMENT ENTERPRISE RESOURCE PLANNING Planning Audit Risks Legal/Policy ENTERPRISE PERFORMANCE MANAGEMENT Finance Human Resource Assets Facilities Technology DATA APPLICATION BUSINESS PROCESS TECHNOLOGY INFRASTRUCTURE CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW INFORMATION SECURITY E N T E R P R I S E A R C H I T E C T U R E johnmacasio@gmail.com
  • 27. SUCCESS COMPONENTS OF INFORMATION SYSTEM Agency Citizen DeLone and McLean Model johnmacasio@gmail.com
  • 28. Enterprise Architecture Information Security Questions Information Security Principles Information Security Risks Information Security Methodology BUSINESS FUNCTION PROCESS BUSINESS DATA & APPLICATION BUSINESS TECHNOLOGY INFRASTRUCTURE ENTERPRISE INFORMATION SECURITY johnmacasio@gmail.com Information Security Governance NETWORKED INFORMATION SUPPLIER & CUSTOMER
  • 29. Information Security Means… Information Security Confidentiality Availability Integrity Secrecy, Privacy and Authority Accurate, Complete and Reliable Accessible, Immediate and Uptime johnmacasio@gmail.com
  • 30. johnmacasio@gmail.com Information Insecurity Means… StolenMisrepresented Breached Information is not secure when something is Misused IncompleteUnauthorized Compromised Denied
  • 31. CASE: HEALTH INSURANCE INFORMATION SECURITY MEMBERSHIP MANAGEMENT COLLECTION MANAGEMENT BENEFITS MANAGEMENT ACCREDITATION MANAGEMENT payment identification claims certification johnmacasio@gmail.com
  • 32. CASE: HEALTH INSURANCE INFORMATION SECURITY FINANCIAL MANAGEMENT PERSONNEL MANAGEMENT ASSET MANAGEMENT LEGAL MANAGEMENT johnmacasio@gmail.com
  • 33. CASE: HEALTH INSURANCE INFORMATION SECURITY AUDIT MANAGEMENT STRATEGY MANAGEMENT RISK MANAGEMENT PROJECT MANAGEMENT johnmacasio@gmail.com
  • 34. CASE: HEALTH INSURANCE INFORMATION SECURITY INFRASTRUCTURE MANAGEMENT NETWORK MANAGEMENT APPLICATION MANAGEMENT DATA MANAGEMENT johnmacasio@gmail.com
  • 35. Mitigating Information Security Risk Information Security Risk Mitigation Assessment Policy Governance Technology johnmacasio@gmail.com Why Who What How
  • 36. Security Policy Requirement Governance •Functional Organization •Roles and Responsibilities Competencies •Knowledge, Skills and Attitudes Requirements •Training Program and Certification Process •Business Workflow, Procedures and Rules •Risk Audit and Control Procedures Data Infrastructure •Acceptable Use •Data Management •Risk Audit and Control Procedures •Infrastructure Management •Sourcing & Procurement •Risk Audit and Control Governance Guidance and Implementation Competency Reference and Assessment Functions Process Models and Control Guidance Data and Application Security Models and Acceptable Use Physical Configuration Network Models Service Sourcing Trusted Technology Acceptable Use No Need to Reinvent the Wheel 1. Recognize security needs & question 2. Find the fitted practitioner standards 3. Apply standards to real life condition 4. Assess and improve the practice johnmacasio@gmail.com Governance Competency Process Data Infrastructure
  • 37. Information Security Risk Assessment Information Asset Inventory (Information Systems) Risk Mitigation Treatment Prevention Impact Rating of Vulnerability Identification Vulnerability Threat Source johnmacasio@gmail.com 1. Organization 2. Process 3. Data 4. Application 5. Infrastructure
  • 38. What it means to secure information… 1. Establish the governance and management organization of information security that comply to best practice standards. johnmacasio@gmail.com
  • 39. What it means to secure information… 2. Identify the information assets, and perform the assessment of vulnerabilities and threats that surround the creation, storage, use and sharing of information. johnmacasio@gmail.com
  • 40. What it means to secure information… 3. Develop, document and implement policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability in the person, process, data, application and infrastructure of information. johnmacasio@gmail.com
  • 41. What it means to secure information… 4. Evaluate, acquire and use security management tools to classify data and risk, to audit information system, to assess and analyze risks in the solution development and infrastructure, to monitor and control areas of vulnerabilities. and implement security controls and appropriate reactive responses to threats. johnmacasio@gmail.com
  • 42. Basic Security Steps Authorized Access Device Integrity Data Exchange Protocol Monitoring & Audit Network Hardening Service Agreements Information Systems Security Standards Risk Assessment & Policies Security Services User Training johnmacasio@gmail.com
  • 43. CHANGE… 1. We can only evaluate that which is measurable 2. We can only test that which is agreed. 3. We can only improve that which is actualized. 4. We can only change that which is established. johnmacasio@gmail.com

Editor's Notes

  1. Manual re-keying Manual re-keying might not be the biggest cost companies pay from bad architecture, but it’s certainly the most obvious one. Hiring human beings to serve as the interface engine connecting incompatible applications isn’t just expensive; it’s de-humanizing.
  2. Collection of point solutions Everyone wants their work supported by a “best of breed” solution. Define “their work” too narrowly, though, and everyone has to visit so many applications to get their work done that there isn’t enough time to get their work done. Meanwhile, unless IT spends a lot of time building interfaces to connect all of these point solutions, you’re back to re-keying again.
  3. Redundant applications Every business application solves business problems. Solving business problems is good, so solving them more than once must be even better, right? Of course not, and yet a lot of companies keep lots of redundant applications around, either because they overlap but still have a few unique areas they support, or because they’ve grown through mergers and acquisitions but aren’t very good at integrating everyone into one business after the papers have been signed. Either way, the money spent to support all of this redundancy is pure waste.
  4. Redundant data Very often, different applications need the same information to get their jobs done. You have two choices: Point them all to the same underlying database, which isn’t always possible, or synchronize their separate databases, which is often pretty messy. Or there’s always that manual re-keying option....
  5. Too many interfaces When you have redundant data and you decide to keep it synchronized, you need to build an interface. Even if you don’t, you often have to feed one system with results from a different one. Either way, the more systems and databases you have, the more interfaces you end up building. It’s better than not having them, but as they accumulate, your architecture becomes more and more fragile, and you spend more and more time managing the interfaces instead of building new functionality.
  6. Faux-elegant integration So you decide to solve your interface dilemma with an elegant enterprise application integration system, or a services bus, or some other form of middleware-plus-metadata that keeps everything clean. And then, your developers figure two things out: (1) what your cool new system does is make solving the easy problems even easier; and (2) it doesn’t solve the hard problems at all. So instead of arguing with you, they rebuild the same old spiderweb of interfaces, but hide it inside the EAI system so you don’t know about it.
  7. Kludges and workarounds Maybe you were competing with an outside developer who lowballed a project. Maybe the business sponsor insisted on too short a deadline. Or maybe building a solution well would have ruined the business case for the project. Whatever the reason, you wake up one day to discover a lot of your systems are held together with Band-Aids, chewing gum, and duct tape. If you’re lucky, nobody will notice until after you leave or retire.
  8. Obsolete technology It’s mission-critical! It satisfies the business need perfectly! What do you mean you have to spend money to maintain it? When you’ve built something on a version of Visual Basic that Microsoft hasn’t supported in a decade, that can’t read and write from any version of SQL Server that isn’t at least seven years old, and the only versions of Windows they’ll run on don’t have drivers for any of the printers you have in production -- that’s what you mean. You have to spend money to maintain it.
  9. White papers You see a bunch of warning signs. You organize an enterprise technical architecture management group. You hire an expert or two. And their productivity is enormous. Enormous, that is, if you measure productivity in terms of the number of white papers they publish. Changing how work gets done in IT? Of course they’ll change it. So long, that is, as everyone reads their white papers, admires their business, and follows their instructions.
  10. Confidentiality: This means that information is only being seen or used by people who are authorized to access it. Integrity: This means that any changes to the information by an unauthorized user are impossible (or at least detected), and changes by authorized users are tracked. Availability: This means that the information is accessible when authorized users need it.