You are here: The Open Group > Enterprise Architecture Practitioners Conference Munich 2008 > Proceedings
       

The Open Group Conference, Munich
20th Enterprise Architecture Practitioners Conference

Highlights of the Plenary, Day 1
(Monday October 20)

The Open Group’s 20th Enterprise Architecture Practitioners Conference began Monday, October 20 in Munich, Germany at the ArabellaSheraton Grand Hotel München. The conference convened bright and early in the hotel ballroom with a few hundred members gathered to discuss the conference theme, "Secure Architectures". Tracks at the conference this week were focused on delivering safe and secure enterprise architectures and effective information security infrastructures that match the increasing business demand for secure IT operations in an open, globally networked world.

An Enterprise Architecture Survey was conducted by The Open Group following each session. The results are available here.

Allen Brown, President & CEO, The Open Group offered a hearty welcome spoken in German to the members to start off the day’s sessions on Secure Architecture. In his opening remarks, Allen conducted a brief survey that revealed the majority of attendees for this week’s conference have traveled from throughout Europe and the UK to attend. In addition, approximately 77% of attendees came from Open Group member organizations.

Following Allen’s opening remarks, the morning plenary sessions began with a presentation by Gartner Research Director Carsten Casper entitled "The Emergence of an Adaptive Security Infrastructure in a Web 2.0 World". According to Carsten, information security has traditionally been too reactive in nature. Today, security measures must not only be proactive, but also adaptive in order to accommodate the changing threats and needs that businesses are facing. Both vendors and users can be blamed for the problem because both are trapped in antiquated ways of approaching security. Today, IT infrastructures have too many components that are becoming increasingly silo'ed within organizations and are therefore difficult to control. Rather than focusing on an "us" versus "them" mentality that attempts to control "threats" from the outside, organizations should focus on adapting their security infrastructure to include a layered, adaptive approach. The ideal approach is one in which the security levels are "learned", combining both new approaches, such as using contextual behaviors, with legacy systems that learn to work together (much like the human immune system) to fight off threats. Recommendations for improved security include: looking forward to tomorrow’s threats rather than focusing on yesterday’s; being more aggressive with vendors to demand better solutions and products; and changing how risk is dealt with by learning to manage it rather than unrealistically believing that it is possible to completely eliminate risk.

In the next session, Aaldert Hofman, Security Architect at Capgemini presented on the topic of "Building the Trust Framework with Multi-Level Trust Models". Aaldert defined trust as the result of a decision to put at risk a specific asset (i.e., information) with a specific principle, based on specific attributes. Given that trust will always change over time, secure trust levels must be established initially and adapted over time based on behavior. So, how does trust become established in the first place? Building identity trust can be based on specific credentials, the type of relationship between the parties involved, the trustworthiness of the identity store, and, finally, specific registration mechanisms and processes. Although defining trust levels tends to be fairly easy, putting trust levels into practice is a complex issue that requires business knowledge and input in order to decide whether an entity is trusted to perform a specific action. Multi-level trust models are recommended for managing trust levels, as well as only allowing entities to perform actions if a trust level has been established. In order to regulate trust, Aaldert recommended using Trust Domains that contain common trust policies that are defined and enforced by specific trust authorities.

The final morning session was presented by Steve Whitlock, Chief Information Security Architect for Boeing. Creatively entitled "Gemini Dream: Can the Twins Save Our Data?", Whitlock addressed the issue of information risk. As defined by Steve, the "twin" information issues are digital rights management and meta information management. Providing a brief historical perspective on data protection from hieroglyphs through the introduction of print to encryption and computer automation, he asserted that the value of information is now becoming more valuable than physical objects, which in turn lays information open for increased theft and also makes threats and breeches difficult to detect. Because data is most at risk when it changes from being at-rest to in-motion, the perimeters surrounding the information are increasingly vulnerable. In order to address these vulnerabilities, standards for both digital rights management and meta information should be established. Recommendations included: beginning rights management with protected private keys; creating rights management standards; and creating meta-information models that support collaboration and that are stable, scalable, and follow the workflow life cycle.

Afternoon sessions were divided into three separate tracks: Academia & EA, EA Life Cycle, and Security.

In the EA Life Cycle track, Jason Uppal, Chief Architect, QRS hosted discussions and presentations centering on two major themes: (1) how to create enterprise architecture that can be implemented; and (2) how to engage other disciplines such as Portfolio Management, Project Management, ITSM and Organization Effectiveness, and Change Management.

Jason Uppal spoke on how TOGAF creates a common vocabulary for all disciplines to work together. He also addressed how to leverage deep competencies within disciplines, such as Project Management driven by PMI and Prince 2, ITSM with ITIL, and others.

Alex Schoijett from Rogers Communications shared his experience on how Rogers defined enterprise architecture as part of business transformation.

Kell G e Kvist from DONG Energy discussed his organization’s experience in creating an enterprise architecture practice and how they handled organization change management aspects as they worked to mature their enterprise architecture practice.

Klaus Niemann from act! Consulting shared his experience on building an enterprise architecture practice and how to leverage enterprise architecture meta-data to create architectural views to communicate architectural artifacts.

The session discussion closed with a discussion about how important it is for enterprise architecture practitioners to continue to discuss and share what they learn among other disciplines. It was agreed that without engaging other disciplines, enterprise architecture in practice with not be a sustainable activity.

As part of the Academia & EA track, Eric Boulay, President Directeur General & CEO of Arismore moderated two panels that addressed how universities and industry can work together to promote enterprise architecture as a discipline. The discussion centered on questions such as: Is EA a science, a way of doing business, or a discipline? The group also discussed whether there is as much motivation for sharing information and intellectual property within academia as there is within corporations. In the second stream of this track entitled "Round Table on Academic Organizations & The Open Group", Len Fehskens, VP & Global Profession Lead, The Open Group joined Eric Boulay to further discuss how to foster enterprise architecture education and training within university settings. According to Len, there is more need for architects with business skills in the enterprise architecture community than for architects who only have computing skills. A number of questions were posed to the group regarding whether enterprise architecture is something that can be taught in university settings. Although universities may be able to provide education and theoretical knowledge, there was consensus that in order to really become an Enterprise Architect, candidates need both practical knowledge gained in real-world professional situations and an innate proclivity for the profession. Like medicine, training can be provided in university settings, but the path to enterprise architecture takes years of experience, desire, hard work, and an aptitude for the profession.

In the Security track, Sabine Buckl and Christian Schweda, both of the Technische Universität München, Institut für Informatik addressed the issue of how well risk management is understood within different contexts. Their presentation, entitled "Modeling and Visualizing Enterprise-Wide Operational Risks", asked how enterprises can manage regulation from both within and outside the enterprise while still considering business continuity. Today risk management is often isolated within silos in organizations, but what is needed is a more iterative and holistic approach to risk management that includes four steps: plan, do, check, act. One approach to better documentation and communication within enterprises is to use software maps that visualize both current and future landscapes to help in planning for risk management processes. Metrics should also be used to help provide additional decision support for managing application landscapes. Using the example of a case study performed on an IT system at a Swiss Bank, Buckl and Schweda determined that by combining metrics with visual definitions of both the business process and business application levels, simulations can also be used to provide better decision support for better risk management.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page