Enterprise Security Architecture for the New, Connected World

Posted April 18, 2012 | Leadership |

The ubiquitous and ever-changing technologies emerging in today's enterprise environment (cloud, social media, mobile devices, etc.) require a new perspective on enterprise security architecture (ESA). Effective enterprise risk management in this highly complex, heterogeneous, and seemingly "boundary-less" environment rests on the three pillars of information security in practice (see Figure 1):

  1. Identity management

  2. Security policy compliance

  3. Cyber security architecture as defense

About The Author
Eric Kreinar
Timothy Virtue
Tim Virtue is a global cybersecurity, risk management, compliance, technology, and business executive with more than 20 years’ experience. He is founder and Managing Partner of TechView Partners, a strategy-focused cybersecurity and risk management advisory firm. Mr. Virtue is an industry veteran, previously holding several chief information security or chief security officer positions. He has extensive experience in various regulated industries… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.