Data Governance Requirements in the Era of Compliance and Big Data

Brian Dooley

The avalanche of digital data that has resulted in Big Data storage and analytics is leading to additional issues as data volumes continue to grow in volume, variety, and velocity. A critical issue for the enterprise is how to maintain control of these immense pools of structured and unstructured data.


Data Governance Requirements in the Era of Compliance and Big Data

Brian Dooley

The avalanche of digital data that has resulted in Big Data storage and analytics is leading to additional issues as data volumes continue to grow in volume, variety, and velocity. A critical issue for the enterprise is how to maintain control of these immense pools of structured and unstructured data.


Has Agile "Crossed the Chasm"?

Johanna Rothman, Israel Gat, Esther Derby, Brent Barton, Hillel Glazer, Alexandre Rodrigues, Dave Rooney, John Heintz, Peter Kaminski, Patrick Debois, Freddy Mallet, David Spann

In this issue, we depart from our usual Executive Report format to bring you multiple viewpoints on a contentious topic: whether agile has transitioned from being an upstart methodology adopted in innovative organizations to being the methodology of choice for the “early majority” of Geoffrey Moore’s chasm. Have organizations indeed “crossed the chasm” in viewing agile as mainstream and in adopting it?


Do We Have To Hug? Part III -- Outcomes

Jim Love

In Part I of this Executive Update series, we looked at the barriers to and possible benefits of collaboration. I examined the "four pillars of collaboration," which provide a foundation that supports collaboration and collaborative structures.


Do We Have To Hug? Part III -- Outcomes

Jim Love

In Part I of this Executive Update series, we looked at the barriers to and possible benefits of collaboration. I examined the "four pillars of collaboration," which provide a foundation that supports collaboration and collaborative structures.


Are We Falling Behind? Is ITIL a Help or a Distraction?

Matthew Burrows

Often managers latch on to the methodologies and practices that happen to be in fashion -- the latest management BS! Some make desperate demands for their staff to react, perhaps by creating a service catalog, but without identifying who is going to use it and how it is to be used. Despite containing some really good guidance, ITIL can become a distraction, with organizations using it unsuccessfully as a safety blanket or shield.


Security Architecture

Eric Kreinar, Timothy Virtue

Constantly changing security boundaries that are simultaneously "owned" by everyone and no one demand a new approach at both the technical and policy levels. A properly designed and managed enterprise security architecture (ESA) enables this. The less-defined security boundaries that encompass infrastructure require a new way of defining cyber security architecture for the cloud. Organizations still have the same mission; they just need to change their mindset on how they do business in the cloud.


Fixing ERM: From IT Security to Human Behavior

Robert Charette, tore hagen, Brian Hagen

"So the question remains on the table: is ERM unfixable, or can something be done to make it live up to its promise as an effective and relevant business practice?"

-- Robert N. Charette and Brian Hagen, Guest Editors


IT Security: A Bottom-Up Approach to ERM

John Markott, Ken Farmer, Mike Rowling, Jeremy Hughes, Maxwell Hughes, Paul Hughes, Mike Hughes, Barry Hughes, Richard Hughes, Larry Hughes, Patrick Hughes, Teresa Hughes, Ralph Hughes, Michael Hughes, Jeff Hughes, Jonathan Hughes
GETTING IN ON THE GROUND FLOOR

Enterprise risk management (ERM) can be viewed as a framework that consumes, aggregates, and reports analysis accumulated from diverse business units and factors that affect organizational risk. Historically, ERM deployments have tended to begin at a 40,000-foot corporate level, gaining authorization and executive commitment before trickling down into the enterprise.


Possibility-Based ERM

Jongwoo Kim, Carl Stucke, Richard Baskerville
FLAWED ASSUMPTIONS OF PROBABILITY THEORY

Risk analysis is the core of enterprise risk management (ERM). For example, to conduct a cost-benefit analysis of new security safeguards and controls, organizations first have to perform risk analysis. Risk analysis starts with the identification of risks and assigning values such as probabilities of risk occurrence and the expected amount of damage.


ERM: The Next Generation

Jason Stradley

Over the years, the information security function has morphed from a very technologically based discipline to a function that, by circumstance, has become more aligned with business objectives. This increased synchronicity with the business is based on the true nature of security itself -- which is to provide a set of controls to protect assets from threats.


Enterprise Risk Management: There's a Human Side, Too

Paul Clermont
A MATTER OF TERMS

To the person in the street, the notion of managing risks at the enterprise level would seem like common sense -- ensuring that the enterprise doesn't take too many risks and that the ones it does take are sufficiently uncorrelated with one another that a single unfavorable event will not create a domino effect. Shareholders expect it. Employees want it for their own job security.


Risk Management: Could Risk Facilitation Be the Missing Link?

Penny Pullan, Ruth Murray-Webster
 

Organizations often spend huge amounts of money and time setting up risk processes and methods, along with supporting tools and training, which often fail to deliver the expected value. Why is this so? We believe the problem isn't in the risk processes themselves, which are usually logically correct. Rather, these investments alone do not enable great risk management practice because risk management is difficult -- it relies on getting groups of people to agree on how to manage things in the future that may or may not happen.


The Fallacies of Modern Project Risk Management: A Process Worth Disengaging From?

Elmar Kutsch, John Ward, Lewis Ward, Tommy Ward
IN DESPERATE NEED OF INFALLIBLE RISK MANAGEMENT

Recent years have seen heightened concern about and focus on risk management, and it has become increasingly clear that a need exists for a robust framework to effectively identify, assess, and manage risk.


Stop Giving Advice

Christopher Avery

Which do you want more: to be right or to learn?


Tablets for the Enterprise, Part II

Curt Hall

In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise").


Tablets for the Enterprise, Part II

Curt Hall

In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise


The Future of Speech Recognition in the Enterprise is Mobile

Curt Hall

As the use of mobile devices in the enterprise continues to grow, I see the realization of a dream that has, for the most part, been elusive: the greater use of speech-enabled enterprise applications.


The Future of Speech Recognition in the Enterprise is Mobile

Curt Hall

As the use of mobile devices in the enterprise continues to grow, I see the realization of a dream that has, for the most part, been elusive: the greater use of speech-enabled enterprise applications.


The Conjoined Twins of Leadership and Risk Management: Inseparable and Indispensible

Kerry Gentry

The corporate world is littered with the carcasses of enterprises, large and small, wounded -- some mortally -- by failures of the "conjoined twins" of leadership and risk management. Why are these two concepts referred to as "conjoined twins"? Because neither can function without the other.


The Conjoined Twins of Leadership and Risk Management: Inseparable and Indispensible

Kerry Gentry

The corporate world is littered with the carcasses of enterprises, large and small, wounded -- some mortally -- by failures of the "conjoined twins" of leadership and risk management. Why are these two concepts referred to as "conjoined twins"? Because neither can function without the other.


An Agile PMO Transformation: Top 8 Dos and Don'ts

Sally Elatta, Anthony Mersino
For many organizations, using the words "PMO" and "agile" in the same sentence could be considered an oxymoron. Bringing "agility" into your project management office may be a challenge -- depending on how much your organization has already invested in your current processes and how open you are to consider making "transformative" changes to support the organization's move to agile.

A Tale of Two CIOs: One "Managed Change," While the Other Skyrocketed Productivity

Christopher Avery

CIOs sit between a rock and hard place.


I Am Only as Good as My Social Graph; By the Way, So Are Your Developers

Israel Gat

I used to say to a client that "I am only as good as my data" when the input I received for an engagement was inadequate. I still use this phrase, when appropriate, from time to time.


Organize Business and Enterprise Architecture for Success

Mike Rosen

When an organization effectively combines business and IT architectures together in an initiative or funded program, it stands a much better chance of success.