Event Timetable
Sunday, July 15
PRE-CONFERENCE SESSIONS | ||||
3.30-4.00 | Introduction to TOGAF® 9.1 (.5 CPD)
TOGAF® Version 9.1Enterprise Edition TOGAF®, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world's leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. First developed in 1995, TOGAF was based on the US Department of Defense Technical Architecture Framework for Information Management (TAFIM). From this sound foundation, The Open Group Architecture Forum has developed successive versions of TOGAF at regular intervals and published them on The Open Group public web site. TOGAF Version 9.1 is a maintenance update to TOGAF 9, addressing comments raised since the introduction of TOGAF 9 in 2009. It retains the major features and structure of TOGAF 9, thereby preserving existing investment in TOGAF, and adds further detail and clarification to what is already proven. The standard is divided into seven parts:
| |||
4.00-4.30 | Integrating TOGAF® into the Corporate DNA (.5 CPD) Robert Weisman, CEO, Build the Vision, IncIntegrating TOGAF® into the Corporate DNA
Enterprise Architecture cannot be conceived in isolation and has to become part of an integrated management framework that, through governance, clearly delineates EA’s role in conjunction with business planning, portfolio/project management, operations management, and solutions design. This tutorial addresses how EA, in particular TOGAF, can act as an integrative framework enabling all of these frameworks to collaboratively work together. The tutorial will briefly touch on existing case studies and recommended best practices.”
Bio
Robert Weisman MSc, PMP, PEng, CD is CEO / Chief Enterprise Architect of Build The Vision Inc.
Robert has spent 28 years working in government and 10 years in the private sector specializing in Enterprise Architecture. His background is plans and operations and started in EA as a business and then knowledge architect. He was a major contributor to TOGAF 9 and is a very active member of The Open Group Architecture Forum
| |||
4.30-5.00 | ArchiMate® 2.0
Henry Franken, CEO, BIZZdesign, The Netherlands | |||
5:00 - 5:30 | The Open Group Certification Programs (TOGAF, ArchiMate, Certified Architect, Certified IT Specialist) | |||
5.30 - 5:45 | Association of Enterprise Architects (AEA) The Association of Enterprise Architects (AEA) is the definitive professional organization for Enterprise Architects. Its goals are to increase job opportunities for all of its members and increase their market value by advancing professional excellence, and to raise the status of the profession as a whole. | |||
5.45- 6:15 | LEARNING LAB - consists of short, informal, interactive sessions offered in continuous, simultaneous 15-minute talks. Topics include: ArchiMate®, Real-time & Embedded Systems, Security Forum, Trusted Technology Forum, The Open Group Certification Programs, Association of Enterprise Architects, What's New at The Open Group? |
Monday, July 16, 2012
Conference sessions run from July 16-18, 2012. Meetings for members only are scheduled on July 19-20. For details, click on Member Meetings.
Attendees can earn up to 10 CPD (Continuing Professional Development) credits, at The Open Group Conference in Washington DC, to apply towards the Association of Enterprise Architects (AEA) CPD program requirements.
Plenary & Tracks | ||||
---|---|---|---|---|
PLENARY: Cybersecurity - An Industry / Government Partnership to Counter the Digital Threat | ||||
8:45–8:50 | Welcome - Allen Brown, President & CEO, The Open Group ![]() Allen Brown, President and CEO, The Open Group
Allen Brown is President and CEO, The Open Group – a global consortium that enables the achievement of business objectives through IT standards. For over 10 years Allen has been responsible for driving The Open Group’s strategic plan and day-to-day operations, including extending its reach into new global markets, such as China, the Middle East, South Africa and India. In addition, he was instrumental in the creation of the AEA, which was formed to increase job opportunities for all of its members and elevate their market value by advancing professional excellence.
Prior to joining The Open Group, Allen Brown held a range of senior financial and general management roles both within his own consulting firm, which he founded in 1987, and other multi-national organizations. Allen is TOGAF® 9 certified, an MBA alumnus of the London Business School and a Fellow of the Association of Chartered Certified Accountants. | |||
8:50–9:45 | America The Vulnerable: Inside the New Threat Matrix Joel Brenner, Author and Attorney, Cooley LLPAmerica the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime and Warfare
In the last ten years, we have taken a porous and insecure network called the Internet and turned it into the financial, communications, and operational backbone of nearly everything we do. Porous networks mean information is easy to steal and operations easy to disrupt. As a result, our adversaries are taking us to the cleaners. We are losing advanced technology and other secrets at a rapid pace, and a shocking number of companies, law firms, universities, and other organizations are fundamentally insecure and oblivious to the seriousness of the threat. Industrial espionage has reached epidemic proportions, and it threatens our prosperity and that of our children and grandchildren. Joel Brenner explains how this crisis has come about and what we should do about it.
![]() Joel F. Brenner specializes in data protection and privacy, network security, and the regulation of sensitive cross-border transactions. He has represented companies and individuals in a wide variety of transactions and proceedings including sensitive foreign acquisitions and overseas operations, the liability of foreign governments, export controls, and internal corporate investigations. He has years of experience inside and outside government involving national and homeland security and enjoys working with companies of all sizes.
Before joining Cooley, Mr. Brenner was Senior Counsel at the National Security Agency, advising Agency leadership on the public-private effort to create better security for the Internet. From 2006 until mid-2009, he was the head of U.S. counterintelligence under the Director of National Intelligence and was responsible for integrating the counterintelligence activities of the 17 departments and agencies with intelligence authorities, including the FBI and CIA and elements of the Departments of Defense, Energy, and Homeland Security. From 2002 – 2006, Mr. Brenner was NSA's Inspector General, responsible for that agency's top-secret internal audits and investigations. He has also served as a prosecutor in the Justice Department's Antitrust Division and has extensive trial and arbitration experience in private practice. Mr. Brenner holds a JD from the Harvard Law School, a PhD from the London School of Economics, and a BA from the University of Wisconsin – Madison. He is a member of the American Bar Association's Standing Committee on Law & National Security. He has written about intelligence oversight and Presidential authority to suspend or prohibit foreign takeovers of U.S. firms, and is often quoted in the national media on data security, privacy, and intelligence issues. Mr. Brenner was awarded the Intelligence Community Achievement Medal in July 2009. Mr. Brenner is the author of AMERICA THE VULNERABLE: INSIDE THE NEW THREAT MATRIX OF DIGITAL ESPIONAGE, CRIME AND WARFARE (Penguin Press, 2011). Mr. Brenner is admitted to practice in Washington, DC, Virginia, Maryland, and New York and in a variety of federal trial and appellate courts. Education Harvard Law School JD, 1975 The London School of Economics and Political Science
PhD, 1973 University of Wisconsin-Madison BA, 1969 | |||
9:45-9:50 | Spotlight: SOA | |||
9:50–10:35 | DoD Trusted Defense Systems Strategy Kristen Baldwin, Principal Deputy, DASD, Systems Engineering,DoD Trusted Defense Systems Strategy
Holistic approach to security is critical
- To Focus attention on the threat
- To avoid risk exposure from gaps and seams
DoD's Trusted Defense Systems Strategy provides an overarching framework for trusted systems
- Common implementation processes are beneficial
Stakeholder integration is key to success
- Acquisition, intelligence, engineering, industry, research communities are all stakeholders
Systems engineering brings these stakeholders, risk trades, policy, and design decisions together
- Informaing leadership early; providing programs with risk-based options
Kristen Baldwin is the Principal Deputy in the Office of the Deputy Assistant Secretary of Defense for Systems Engineering (ODASD(SE)). Ms. Baldwin acts on behalf of the DASD and is responsible for engineering and technical workforce, policy, and acquisition program implementation across the Department of Defense (DoD). This includes concept engineering and analysis, design, development and manufacturing, and independent program review and assessment for all DoD major weapon system acquisition programs. She supports ODASD(SE) in its role as the systems engineering workforce leader with responsibility for more than 40,000 DoD acquisition professionals. She is also overseeing the DoD’s Strategies for Engineering Resilient Systems and Trusted Systems Design. A member of the Senior Executive Service, Ms. Baldwin is also the acting Director for Systems Analysis and oversees development planning and modeling and simulation activities across DoD. She leads cyber and system assurance, program protection, systems engineering for systems of systems, and research and development initiatives. She oversees the DoD Systems Engineering Research Center, a University Affiliated Research Center, dedicated to advancing systems engineering methods, processes, and tools. Ms. Baldwin has been with OSD since 1998, where she has led the application of capabilities-based planning in the acquisition process, with a focus on the integration of requirements, acquisition, and programming processes; served as Deputy Director, Software Intensive Systems; and managed the Tri-Service Assessment Initiative. Before working with OSD, Ms. Baldwin served as a Science and Technology Advisor in the Army’s Office of the Deputy Chief of Staff for Operations and Plans, and at the Dismounted Battlespace Battle Lab, Fort Benning, GA. Ms. Baldwin began her career at the U.S. Army’s Armament Research, Development, and Engineering Center, Picatinny Arsenal, where she was responsible for infantry weapons and ammunition design and production. Ms. Baldwin received a bachelor’s degree in mechanical engineering from the Virginia Polytechnic Institute and a master’s degree in systems management from the Florida Institute of Technology.
Systems Analysis | |||
10:35-11:00 | Break | |||
11:00-11:40 | Risk Management: Integrating Cyber Security Requirements into Organizational Mission and Business Processes Dr. Ron Ross, Project Leader, NISTOpening up a Second Front on Risk Management: Integrating Cyber Security Requirements into Organizational Mission and Business Processes For decades, we have been developing comprehensive cyber security standards and guidelines in both the public an private sectors. Yet, despite our best efforts, we have yet to realize the full potential of the standards, guidelines, and associated technologies because of an inability to fully integrate cyber security requirements into main stream organizational mission and business processes. We continue to treat cyber security as if it is distinct from enterprise architecture, the system development life cycle, systems engineering, and acquisition. Cyber security programs, initiatives, and investments must be closely linked to the routine cost, schedule, and performance issues that are the main focus of mission/business owners and program managers. Senior leaders must be able to effectively manage cyber security-related risks within their enterprises so that investment decisions and tradeoffs can address the whole spectrum of risks related to organizational missions and business operations. NIST, in developing its cyber security and risk management publications, is attempting to change the strategic focus on cyber security investments to support risk management decisions at the enterprise level.
![]() Ron's current areas of specialization include information security and risk management. Dr. Ross leads the Federal Information Security Management Act (FISMA) Implementation Project, which includes the development of security standards and guidelines for the federal government, contractors, and the United States critical information infrastructure. His recent publications include Federal Information Processing Standards (FIPS) Publication 199 (security categorization standard), FIPS Publication 200 (security requirements standard), NIST Special Publication (SP) 800-53 (security controls guideline), NIST SP 800-53A (security assessment guideline), NIST SP 800-37 (security authorization guideline), NIST SP 800-39 (risk management guideline), and NIST SP 800-30 (risk assessment guideline). Dr. Ross is the principal architect of the Risk Management Framework and multi-tiered approach that provides a disciplined and structured methodology for integrating the suite of FISMA standards and guidelines into a comprehensive enterprise-wide information security program. Dr. Ross also leads the Joint Task Force Transformation Initiative, a partnership with NIST, the Department of Defense, the Intelligence Community, the Office of the Director National Intelligence, and the Committee on National Security Systems to develop a unified information security framework for the federal government.
In addition to his responsibilities at NIST, Dr. Ross supports the U.S. State Department in the international outreach program for information security and critical infrastructure protection. Dr. Ross previously served as the Director of the National Information Assurance Partnership, a joint activity of NIST and the National Security Agency. A graduate of the United States Military Academy at West Point, Dr. Ross served in a variety of leadership and technical positions during his over twenty-year career in the United States Army. While assigned to the National Security Agency, he received the Scientific Achievement Award for his work on an inter-agency national security project and was awarded the Defense Superior Service Medal upon his departure from the agency. Dr. Ross is a three-time recipient of the Federal 100 award for his leadership and technical contributions to critical information security projects affecting the federal government and is a recipient of the Department of Commerce Gold and Silver Medal Awards.
Dr. Ross has been inducted into the Information Systems Security Association (ISSA) Hall of Fame and given its highest honor of ISSA Distinguished Fellow. Dr. Ross has also received several private sector cyber security awards and recognition including the Vanguard Chairman’s Award, the Symantec Cyber 7 Award, Information Week’s Government CIO 50 Award, Best of GTRA Award, and the ISACA National Capital Area Conyers Award. During his military career, Dr. Ross served as a White House aide and as a senior technical advisor to the Department of the Army. Dr. Ross is a graduate of the Defense Systems Management College and holds Masters and Ph.D. degrees in Computer Science from the U.S. Naval Postgraduate School specializing in artificial intelligence and robotics. | |||
11:40-11:45 | Spotlight: Real-time & Embedded Systems Forum | |||
11:45-12:30 | Supply Chain: Mitigating Tainted & Counterfeit Products Moderator: Dave Lounsbury, CTO, The Open Group Supply Chain: Mitigating Tainted & Counterfeit Products Everyone is talking about Supply Chain Risk Management. This session will address how industry and government are working together to mitigate the threat of tainted and counterfeit products through building a standard or writing guidance around best practices. The topic of how to measure conformance to a standard will be discussed.The audience will appreciate the potential alignment for industry and government efforts in this critical arena. Intended audience: industry technology providers and government agencies and policy makers Key takeaways:
Moderator: Dave Lounsbury, CTO, The Open Group
Panelists:
Edna Conway, Chief Security Strategist, Global Value Chain, Cisco
Daniel Reddy, EMC
Andras Szakal, VP & CTO, IBM Federal Integtrated Market Team (IMT), Distinguished Engineer
Edna Conway, Cisco; Daniel Reddy, EMC; Andras Szakal, IBM Federal | |||
12:30-2:00 | Lunch | |||
High Assurance Systems/Dependability | Supply Chain / Quantum Lifecycle Management | TOGAF® 9 Tutorials (.5 CPD each) | SOA | |
2:00 - 2:45 | Trusted Computing - Back to the Future Robert Bigman, CEO, 2BSecure LLC ![]() Trusted Computing - Back to the Future Once upon a time, there were people who recognized the importance of building trusted computer systems. They are no longer around but their ideas demand a relook. This presentation describes how we arrived at our current state of untrusted computer technology and recommends a strategy for the future that includes rediscovering the past.
Robert Bigman recently retired from Central Intelligence Agency (CIA), after serving a thirty year distinguished career. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation's most sensitive secrets. As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. He then developed creative solutions to allow the CIA to use the Internet to further its mission without exposure. With twenty-five years of experience, Mr. Bigman worked in every area of information and data security, the last fifteen years as the Agency's Chief Information Security Officer (CISO). As the Agency CISO, Mr. Bigman managed a large organization of technical and program officers responsible for the protection of all Agency information. As the CISO, his responsibilities included cryptography, information security policy/processes, standards and requirements, testing and network defense/response. Mr. Bigman also served as the Agency's designated officer for all discussions with the information security industry and its commercial partners. Mr. Bigman has contributed to almost every Intelligence Community information security policy/technical standard and has provided numerous briefings to the National Security Council, Congress and presidential commissions. Mr. Bigman's earlier assignments at the CIA included participation in the technical design of the Intelligence Community's first counterterrorism database and delivery of the Agency's first secure TCP/IP local and wide area network for the Counterintelligence Center. In recognition of his expertise and contributions, Mr. Bigman has received numerous CIA and Director of National Intelligence awards. Robert Bigman and 2BSecure: 2BSecure was founded by Robert Bigman upon retiring from a 30 year career at the Central Intelligence Agency. With over 25 years of information security experience, Robert served the last 15 years as the Agency's Chief Information Security Officer. Receiving numerous awards, Robert built the model information security program in the U.S. Intelligence Community. Robert contributed to almost every Intelligence Community and U.S. Government information security policy and frequently briefed congressional committees and presidential commissions. At the CIA, Robert's experiences included: Security Program Planning/Management System/Network Security Architecture Cryptography Security Policy/Processes/Procedures Application/Data Security Protection Security Risk Assessment/Management Security Training Commercial Partner Engagements. | Enterprise Resilience: Overcoming Vulnerability for Competitive Advantage Dr. Yossi Sheffi, Director of MIT Center for Transportation and Logistics (CTL)![]() The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage The presentation will demonstrate that companies' fortunes in the face of business shocks depend more on choices made before the disruption than they do on actions taken in the midst of it. He shows that investments in resilience and flexibility not only reduce risk but create a competitive advantage in the increasingly volatile marketplace. web.mit.edu/sheffi/www/ Dr. Yossi Sheffi is the Elisha Gray II professor of Engineering Systems at the Massachusetts Institute of Technology, where he serves as Director of the MIT Center for Transportation and Logistics (CTL). He is an expert in systems optimization, risk analysis and supply chain management, which are the subjects he researches and teaches at MIT, both at the MIT School of Engineering and at the Sloan School of Management. He is the author of dozens of scientific publications and two books: a textbook on urban transportation networks optimization (Prentice Hall, 1985) and The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage (MIT Press, 2005). From 2007 to 2011 he served as Head of MIT's Engineering Systems Division. In these years he set up the administrative structure, launched a successful PhD program, hired and promoted several faculty members and set the long term strategy of the division. | Bringing Enterprise Architecture to the Enterprise by Leveraging TOGAF® John Sitarski, Enterprise Architect, Baker Hughes, Inc. Bringing Enterprise Architecture to the Enterprise by Leveraging TOGAF® Legacy systems and architectures are often ill-equipped to provide the levels of diligence and timeliness in reporting, process integration and control, and overall information security, that our growing and evolving business environment requires. Enterprise Architecture can bring order and structure amid this chaos, but bringing an EA into practice is itself, a major initiative. This presentation discusses how a large oil services company launched an effective EA practice in a very compressed timeframe. By leveraging a modified TOGAF® and Architecture Development Method (ADM), and adding experienced Enterprise Architects from the outside the company to mentor highly skilled IT practitioners and subject matter experts from within, the new Enterprise Architecture group sought high value targets and delivered against them in record time. The value created brought confidence to EA’s internal customers, and, with unwavering CIO support and a measure of self-promotion, EA created an ongoing demand for its services and established itself as a value creator for the company. Key takeaways: An understanding of how Enterprise Architecture can be launched within an organization, and can begin to create value almost immediately Bio John Sitarski, Enterprise Architect, Baker Hughes, Inc. John Sitarski has extensive experience outside of IT, and 15 years in business reengineering, ERP application management, and Enterprise Architecture. John is a subject matter expert in software application evaluations and Supply Chain processes, and leads the EA practice in these spaces.
| A Case Study of Adobe's SOA Transformation John Pritchard and Don Valdez, Enterprise Architect, Adobe SystemsA Case Study of Adobe's SOA Transformation - From Systems of Record to "As-A-Service" Systems of Engagement Intended audience: CIOs, Enterprise Architects, IT Leaders
Lessons learned from a real world SOA Adoption:
Bios
John Pritchard, Enterprise Architect, Adobe Systems
John Pritchard is an Enterprise Architect with Adobe Systems playing a key role in redefining Enterprise IT as an "As A Service" provider. He is Adobe IT Chief Services Architect and leads Adobe's internal SOA transformation, a movement from systems of record to mobile | social | cloud systems of engagement. John is an Open Group Distinguished IT Architect with over 15 years of experience in emerging technologies.
Don Valdez, Enterprise Architect, Adobe
Don Valdez is an Enterprise Architect with Adobe Systems who is driving IT's innovation ecosystem as part of the Adobe's overall transformation of a desktop product to a services company. Don is leading the architectural transformation of adobe.com where he designed and "productized" Adobe's commerce services. Don's 15 years of a technology experience come from Amazon, Disney, and General Electric. |
2:45 - 3:30 | Defining High Assurance Requirements Michael Paulitsch, Scientific Director, EADSDefining High Assurance Requirements Dr. Paulitsch will provide a short overview of EADS, the parent company of Airbus, Eurocopter, Astrium and Cassidian, and high assurance requirements for dependable systems..
Bio
Dr. Michael Paulitsch, Scientific Dirtector, European Aeronautic Defense and Space (EADS) Innovation Works
Michael Paulitsch is Scientific Director of the Sensors, Electronics, and Systems Integration Technical Capability Center in EADS Innovation Works (IW), the corporate research center of EADS, in Munich, Germany, since 2008. Before joining EADS, he was a Senior Engineer / Scientist with Honeywell Aerospace, Advanced Technology. He holds a PhD in technical sciences (emphasis on safety-critical systems design) and a PhD in Social and Economic Sciences (emphasis on production management). His research interests and experiences are in safety-critical and secure system design in aerospace, space, and automotive. | Supply Chains Have Lifecycles Too David Potter, CTO, Promise Innovation; Supply Chains Have Lifecycles Too Securing the supply chain demands diamond standard Product Lifecycle Management (PLM) at the product instance level, and, because supply chains have lifecycles too, a high degree of integration between PLM and the supply chain is necessary to assure product integrity throughout all phases - beginning, middle and end - of life. Intended audience: Anyone with an interest in supply chains, security, architecture, or PLM Key takeaways: David Potter, CTO, Promise Innovation International Oy David is currently Chair of the Quantum Lifecycle Management (QLM) Work Group at The Open Group and formerly Chair of the Project Steering Board of the EU PROMISE Project. David has over 40 years experience in information systems. Jacopo Cassina, CEO Holonix
Jacopo Cassina, CEO, Holonix | Using TOGAF 9 to Deliver DoDAF 2 Capabilities Chris Armstrong, President, Armstrong Process Group, Inc., US
![]() Using TOGAF 9 to Deliver DoDAF 2 Capabilities This session will discuss how to use TOGAF Architecture Development Method (ADM) to drive the development and use of DoDAF 2 architectures for delivering new mission/program capabilities. Beginning with the Preliminary Phase, the speaker will introduce the DoDAF architecture viewpoints, discuss using the DoDAF Metamodel (DM2) as an architecture content metamodel, as well as process tailoring and tool implementation issues. The session continues with using AV-1 and CV-1 for capturing key Phase A: Architecture Vision deliverables. Then the speaker describes how to use key DoDAF 2 views in Phases B through D of the ADM: OVs and CVs for representing business architecture, using DIVs for data architecture, SvcVs for application architecture, and SVs for technology architecture. Then the speaker will describe how to use CVs for capability assessment and planning, PVs and StdV-2 for migration planning, and SV-7, SV-8, and SV-9 for architecture roadmapping. The session will also cover how key ADM deliverables and activities augment DoDAF to provide a complete, standards-based approach for establishing and sustaining an enterprise architecture practice for delivering new defense mission capabilities. Key takeaways: Chris Armstrong, President, Armstrong Process Group
Chris Armstrong, President of Armstrong Process Group, Inc., is an internationally recognized thought leader in enterprise architecture, formal modeling, process improvement, systems and software engineering, requirements management, and iterative and agile development. Chris represents APG at The Open Group, the Object Management Group and the Eclipse Foundation. | SOA on the International Stage Heather Kreger, CTO International Standards, IBM![]() SOA on the International Stage
Find the answers to these questions and more at this session:
Bio
Heather Kreger, CTO International Standards, IBM
Heather is IBM's CTO of International Standards, responsible for setting IBM's strategy on contributing to and adoption of de jure standards for Software Group. Her current focus is SOA and Cloud Standards.
With 15 years of standards experience; she has led the development of standards for Web services, Management and Java in numerous standards organizations, including W3C, OASIS, DMTF, and The Open Group. Heather is currently co-chair and liaison for The Open Group's SOA Work Group and led collaboration with OASIS and OMG to develop and jointly publish the: Navigating the SOA Open Standards Landscape Around Architecture paper. She is also liaison for The Open Groups Cloud Work Group, representing SOA and Cloud work groups to ISO/IEC JTC 1 SC38 and ISO/IEC JTC 1 SC7 SOA SG. Heather contributes significantly to The Open Group's SOA Governance, Service Integration Maturity Model, SOA Ontology and SOA Reference Architecture standards. In addition, Heather held leadership roles in: OASIS Web Services Distributed Management Technical Committee, DMTF WSDM Mapping Work Group, DMTF Resource Catalog Work Group, W3C Web Services Architecture, Web services in J2EE (JSR109) Expert Group and Java Management Extensions (JMX) Expert Group. Heather is also the author of numerous articles on SOA, Web services and management in the IBM Systems Journal, Communications of ACM, Web Services Journal and her own book: Java and JMX, Building Manageable Systems. |
3:30 - 4:00 | Break | |||
Dependability Engineering for Open Systems (DEOS) | Cybersecurity and Identity | TOGAF® 9 Tutorials (.5 CPD each) | SOA | |
4:00 - 4:45 | Dependability Engineering for Open Systems (DEOS)
Dependability Engineering for Open Systems (DEOS) The DEOS project has developed an architecture approach to handle system failures using two cycles: a failure response cycle and a design response cycle. The approach allows stakeholders in the architecture to reach an agreement upon the level of dependability needed in the system and the ability to detect and correct failures that arise. This dependability is documented in an Assurance Case using the DEOS D-Case tool. D-Case adds the added capability of being able to make dynamic Assurance Cases through real-time monitoring of a system in the operational phase of an architecture. The presentation will introduce a demo of a D-Case system and discuss plans for standardization as follows: D-Case/Agda available in 2012 as open source, and plans for a Dependability plug-in for TOGAF®, which could be an instantiation of the DEOS Process.
4:00 - 4:45
- Introduction - Jack Fujieda, CEO, Regis
![]() 4:45 - 5:30
DEOS Panel Discussion
- Current status of Assurance Case - Robin Bloomfield, City University (Adelard)
- D-Case - Dr. Yutaka Matsuno, Nagoya University
- Requirement Management Using D-Case - Dr. Shuichiro Yamamoto, Nagoya University
- Toward Dependable TOGAF® - Ed Roberts, Elparazim
| Meeting the Challenge of Identity and Security Dazza (Daniel) J. Greenwood, JD, MIT and CIVICS.com Consultancy Services;Meeting the Challenge of Identity and Security With Business, Legal & Technical (BLT) System Rules and Core ID Infrastructure
In this presentation we’ll show you how to unleash the power of technologies such as SAML2.0, Open-ID Connect and UMA with business, legal & technical (BLT) Trust Framework System Rules. We also discuss an enabling and open architecture for core-identifiers at a global scale, describing the issuance of core-identifiers and how to represent personas digitally. Finally, we will provide an overview of MIT’s emerging project on a “Trustworthy Core Identity Infrastructure” and unveiling MIT’s “Model Trust Framework System Rules” necessary for today’s identity federation and tomorrow’s Core Identities.
Bio
![]() Dazza (Daniel) J. Greenwood, JD | Lecturer, MIT, and CIVICS.com Consultancy Services
Daniel “Dazza” Greenwood leads the CIVICS.com consultancy, focused at the intersection of business, law and technology for the new innovation economy. As a lecturer at the MIT Media Lab, Dazza focuses teaching and research on digital identity and online communities. Dazza has consulted to fortune 100 companies, including the insurance industry and financial services sector, architecting the creation of trust frameworks. Federally, Dazza has testified several times on eCommerce before the US House and US Senate and has consulted to NASA as an Online Identity expert, GSA as a multilateral rules drafting expert, Homeland Security as a multistate Federal governance expert and many other agencies and departments. Dazza also co-founded the eCitizen Foundation, creating Open, Public Integrated Architectures for use on the Internet by government, business, non-profits and the people.
Recently, Mr. Greenwood has focused on digital identity and open architectures for Health Information Technology.
Thomas Hardjono, Executive Director of MIT Kerberos Consortium (MIT-KC) | How to be Agile when Creating your Enterprise Architecture Using TOGAF®
Mats Gejnevall, Capgemini, Sweden![]() How to be Agile when Creating your Enterprise Architecture Using TOGAF® This presentation is part of a series of ‘World Class’ papers and presentations generated by the Value Realization workgroup within The Open Group. The series looks at how architectural techniques and best-practices may be applied to drive practical value for an enterprise. During the last couple of years Enterprise Architecture (EA) and agility have been connected in many conversations. This presnetation is an attempt to look at these two concepts together. Key takeaways:
Bio Mats Gejnevall, Enterprise Archtect, Capgemini Mats Gejnevall is TOGAF & IAF certified specializing in EA within large enterprises. He is working in many industry sectors transforming them to EA work practices or leading and performing EA work. Mats is involved in developing the Capgemini IAF and is the vice-chair of the Open Group SOA WG. | Evolving the Enterprise IT Legacy to SOA Sundar Ramanathan, Capgemini![]() Evolving the Enterprise IT Legacy to SOA Many global enterprises have a range of IT systems that were put in place over past decades using the technologies available at the time. Now, particularly as we move further into the era of Cloud Computing, there is a need to use those systems within a distributed services environment. This presentation will explore the possibilities of evolving legacy systems to Service Oriented Architecture, based on the recently-published The Open Group Guide on Legacy Evolution to SOA, and with particular reference to global enterprises. Key takeaways:
Bio
Sundar Ramanathan, Enterprise Architect and NA Windows Azure Practice Lead, Capgemini
Past Roles/ Experience
- Enterprise Architect and Integration Architect roles at major Automotive OEM's
- Senior Database product development at Informix, Menlo Park, CA
Professional Affiliation
- Project Chair – SOA for Business Technology at The Open Group
- Contributor – Legacy Evolution to SOA at The Open Group
- Contributor – NIST Cloud Computing Forum
Certifications
- TOGAF® 9
- Capgemini IAF
Education
B.E (Indian Institute of Science, Bangalore, India)
M.B.A (Wayne State University, Detroit, Michigan, USA) |
4:45 - 5:30 | Identity Workshop Identity Workshop
Identity issues are at the root of many of the problems that plague the internet today. The Jericho Forum delivered their Identity Commandments in 2011 to help provide clarity around identity issues. To explain identity issues in simple, approachable terms, The Open Group Jericho Forum has created a series of short video cartoons.
This workshop will include the first public viewing of these videos, as well as a facilitated discussion led by Steve Whitlock of Boeing, and Dennis Taylor of NASA, aiming to debate open issues in identity, and to discuss their relevance to initiatives such as the US National Strategy for Trusted Identities in Cyberspace (NSTIC).
Facilitators:
Steve Whitlock, Chief Security Strategist, Boeing
Dennis Taylor, Information Security Architect, NASA
| Will TOGAF® Get My EA to Level 5 Maturity? Yes It Can! Judith Jones, CEO, Architecting the Enterprise![]() Will TOGAF® Get My EA to Level 5 Maturity? Yes We Can! Assessing EA capability is a minefield of performance measures that seem never ending. As soon as I train the stakeholders to understand the EA process, they move jobs and I have to start all over again. TOGAF keeps changing as well, so my process keeps changing. If I have to repeatedly train the stakeholders, they will never progress past Maturity Level 2 or 3. In this session, I will address these questions:
Bio
Judith Jones, CEO, Architecting the Enterprise
Judith Jones, CEO, Architecting the Enterprise, the global market leader in TOGAF Training and Consultancy, is an experienced Business Manager and IT Consultant. Judith's prime experience includes business re-engineering, business architecture, enterprise architecture and governance, architecture practice management, business value engineering, IT strategy and management. Judith has worked with many Fortune 100 and Government agencies to develop architecture competencies and capabilities. Her background experience includes more than 20 years as a business manager with ICL, now Fujitsu Services.
Judith is a champion and practitioner of Enterprise Architecture standards, including TOGAF and TOGAF certification, for over 20 years and was instrumental in the development of ICL’s OpenFramework. Judith is an active member of The Open Group and is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects. Judith is co-author of the TOGAF and DODAF alignment paper.
| SOA in the Government Sector PanelSOA in the Government Sector (Panel)
Service Oriented Architecture is the use of the prinicple of service orientation in enterprise architecture to deliver Boundaryless Information Flow™. This panel session will explore its use in the public sector, discussing the reasons for deploying SOA in government applications, and the lessons that can be learned from experience to date. The panel will be moderated by Jason Bloomberg, President of ZapThink, who is well known as an analyst, speaker, and writer on SOA. He will be joined by experts from the government sector and from IT companies dealing with the government sector who will give their views and answer questions from the audience. Panelists include:
Bio
![]() Jason is a thought leader in the area of EA, SOA, Cloud Computing and helps organizations around the world better leverage their IT resources to meet changing business needs.
Paul C. Jackson, Governance Lead, FAA System-Wide Information Management (SWIM).
Paul is an IT Specialist in Infrastructure & Application Management. FAA's System-Wide Information Management (SWIM) Program Office is charged with establishing and maintaining a Service-Oriented Architecture within the National Airspace System (NAS). This includes providing core enterprise infrastructure for features such as messaging and interface management, and establishing SOA Governance. The focus has been on the Governance aspects, creating policies and processes to help ensure interoperability and maximize opportunities to reuse services. A key accomplishment was the standing up of the NAS Service Registry/Repository (NSRR). This freely available, internet-based tool allows easy discoverability of the NAS portfolio of services, allows automation of governance of the service lifecycle, and allows management of relationships among service providers and consumers. Planned future enhancements to the SWIM infrastructure include enterprise security, and enterprise service management.
| |
5:45 - 7:00 | Networking Reception hosted by The Open Group Sponsored by FACE™ Consortium |
Tuesday, July 17, 2012
Additional Open Sessions:
- The Open Group Standards Process (7:30 - 8:15 am)
Plenary & Tracks | ||||
---|---|---|---|---|
PLENARY: Enterprise Transformation | ||||
8:45-8:50 | Welcome - Allen Brown, President & CEO, The Open Group ![]() Allen Brown, President and CEO, The Open Group
Allen Brown is President and CEO, The Open Group – a global consortium that enables the achievement of business objectives through IT standards. For over 10 years Allen has been responsible for driving The Open Group’s strategic plan and day-to-day operations, including extending its reach into new global markets, such as China, the Middle East, South Africa and India. In addition, he was instrumental in the creation of the AEA, which was formed to increase job opportunities for all of its members and elevate their market value by advancing professional excellence.
Prior to joining The Open Group, Allen Brown held a range of senior financial and general management roles both within his own consulting firm, which he founded in 1987, and other multi-national organizations. Allen is TOGAF® 9 certified, an MBA alumnus of the London Business School and a Fellow of the Association of Chartered Certified Accountants. | |||
8:50-8:55 | ||||
8:55–9:55 | Enterprise Transformation and the Role of Open Standards (1 CPD) Allen Brown, CEO, The Open GroupEnterprise Transformation and the Role of Open Standards(1 CPD)
Enterprise transformation seems to be gathering momentum within the enterprise architecture community. The term, enterprise transformation, suggests the process of fundamentally changing an enterprise. Sometimes the transformation is dramatic but for most of us it is a steady process.
![]() Allen Brown is President and CEO, The Open Group – a global consortium that enables the achievement of business objectives through IT standards. For over 10 years Allen has been responsible for driving The Open Group’s strategic plan and day-to-day operations, including extending its reach into new global markets, such as China, the Middle East, South Africa and India. In addition, he was instrumental in the creation of the AEA, which was formed to increase job opportunities for all of its members and elevate their market value by advancing professional excellence.
Prior to joining The Open Group, Allen Brown held a range of senior financial and general management roles both within his own consulting firm, which he founded in 1987, and other multi-national organizations. Allen is TOGAF® 9 certified, an MBA alumnus of the London Business School and a Fellow of the Association of Chartered Certified Accountants.
************************************************************
Case Study: University Health Network (Toronto)
clinicalMessage™ is a capability is designed to help improve the quality and economics of care in Patient Centered Medical Homes and Hospital Wards. It accomplishes these goals by focusing on:
Capability Performance
Business Outcomes:
Consortium
clinicalMessage is a joint venture between: Centre of Innovation in Complex Care (thecicc.com), Techna (technainstitute.ca) and QRS (qrs3E.com).
Progress to Date
![]()
Case Study: University Health Network (Toronto) Jason Uppal, Chief Enterprise Architect, QRS, Winner of 2012 Edison Award for Innovation | |||
9:55–10:00 | Spotlight: Architecture & Security Forums | |||
10:00 - 10:30 | Break | |||
10:30–10:35 | Spotlight: Cloud Work Group | |||
10:35–11:20 | Future Airborne Capability Environment (FACE™): Transforming the DoD Avionics Software Industry Through the Use of Open Standards Judy Cerenzia, FACE™ Program Director, The Open Group;Future Airborne Capability Environment (FACE™): Transforming the DoD Avionics Software Industry Through the Use of Open Standards Speakers
Kirk Avery, Lockheed Martin;, Philip Minor, Director, Systems Engineering, Asst. Secretary of Army (ALT) | |||
Security Architecture | EA & Enterprise Transformation | TOGAF® Case Studies (.5 CPD each) | ArchiMate® Tutorial (1 CPD) | |
11:30–12:10 | The Hotel Industry and Payment Security John Bell, Enterprise Architect, Marriott International![]() The Hotel Industry and Payment Security The Hotel Industry is a prime target for those that want to steal and abuse payment card and personal information. Based on his standards work with the Hotel Technology Next Generation (HTNG). John will review the best practices that have been identified within the Hotel industry for securing Payment Card Industry (PCI) data and protecting our customers. Intended audience: People with the need to secure personal and payment data Key takeaways:
Bio John Bell, Enterprise Architect, Marriott International John Bell is Marriott’s Enterprise Architect and an Associate Professor for the Center for Applied Information Technology (CAIT) at Towson State University, Maryland. John chairs the Hotel Technology Next Generation (HTNG) Reference Architecture Work-group and he works with several workgroups addressing secure payment and PCI compliance issues. | The Art of Architecture Transformation Alan Levine, Enterprise Architect, Oracle![]() The Art of Architecture Transformation
Enterprise architecture is the key to any successful IT transformation. Oracle has been helping companies evolve their applications, information, and infrastructure architectures with the aid of a proven enterprise architecture development process supported by a repository of proven EA artifacts. This technology agnostic session shares practical EA based strategies Oracle customers have taken to modernize their portfolios, reduce costs, and deliver agility to their business.
Intended audience: Enterprise Architects, IT leaders, LOB leaders
Key takeaways:
Bio
Alan Levine, Enterprise Architect, Oracle
Alan has 25 years of IT experience and currently leads an Enterprise Architecture Practice for Oracle Consulting. Alan is a thought leader in the area of Architecture Transformation. He has helps organizations identify strategies to optimize their IT investments, simplify their portfolios, and more effectively meet strategic business needs. | Enterprise Architecture and TOGAF® at Nationwide Tara Paider, Nationwide; and Chris Armstrong, President, APG![]() ![]() Enterprise Architecture and TOGAF® at Nationwide This session will review how Nationwide Insurance has implemented their Enterprise Architecture (EA) practice based on TOGAF and created and deployed an EA repository using IBM Rational System Architect (SA). This presentation will begin with a description of the context in which the EA practice was founded, including business/IT strategic alignment and IT optimization. The session will describe the EA best practices was adopted and the essential foundation to support institutionalization of the EA capability. We will also review how to tailor the TOGAF Architecture Content Metamodel (ADM) and implemented in it SA, including integration with custom-built application portfolio and technology standards management tools, IBM WebSphere Service Registry and Repository, and a commercial configuration management database. We will share our success stories, challenges, obstacles, and lessons learned. Key takeaways:
Speakers:
Tara Paider, Nationwide (1st photo)
Tara Paider is an AVP, IT Architecture with Nationwide Insurance in Columbus, Ohio. She is responsible for architecture strategy for Data and Analytics, which includes developing and leading multi-year technology adoption roadmaps across business units. She is also responsible for establishing technology standards and reference architectures associated with Data and Analytics, working closely with the established architecture governance bodies at Nationwide to define necessary governance in this space. Tara is lead architect for the Data Community of Practice, which is a social networking forum for professionals who specialize in database management, business intelligence, data modeling, data integration and other data related professions to share ideas, collaborate on common solutions and new approaches, as well as have detailed discussions on specific skills, best practices and technologies. Tara coordinates technical sessions on current topics, and promotes and socializes new and updated architectural and technology standards and reference architectures. Tara is also the current vice-chair for the Architecture Forum for the Open Group.
Prior to Nationwide, Tara was an IT consultant, working in multiple industries including nuclear power, government, banking, retail and manufacturing. She was also an instructor for Oracle.
Chris Armstrong, President, Armstrong Process Group, Inc. (2nd photo)
Chris Armstrong is an internationally recognized thought leader in enterprise architecture, formal modeling, process improvement, systems and software engineering, requirements management, and iterative and agile development. Chris represents APG at The Open Group, the Object Management Group and the Eclipse Foundation.
| Using the TOGAF® Architecture Content Framework with the ArchiMate® Modeling Language Henry Franken, CEO, BIZZdesign;![]() Using the TOGAF® Architecture Content Framework with the ArchiMate® Modeling Language A comparison of the ArchiMate 2.0 metamodel with the Content Metamodel from the TOGAF Architecture Content Framework reveals that these two Open Group Standards are highly compatible. The ArchiMate 2.0 visual modeling language is well-suited for architecture initiatives guided by the TOGAF standard. This tutorial provides both theoretical preparation and practical guidance for users of the ArchiMate language working on such initiatives. It supports The Open Group vision of Boundaryless Information Flow™ by further enabling the combined use of the TOGAF standard and the ArchiMate modeling language for consistent representation of architectural information across diverse organizations, systems, and initiatives. Henry Franken is chair of the ArchiMate Forum at The Open Group. Henry is co-founder of the BPM Forum Netherlands. He has co-authored several international publications and Open Group white papers. At BiZZdesign, Henry is responsible for research and innovation. Alignment with and contribution to open standards are key. BiZZdesign has contributed to and edited the ArchiMate 2 specification. BiZZdesign is involved in the workgroup working towards the next version of TOGAF® and its alignment with ArchiMate®. BiZZdesign offers native tooling, consultancy and training for TOGAF and ArchiMate. BiZZdesign offers complete and integrated solutions (tools, methods, consultancy and training) to design and improve organizations. Enterprise architecture, business requirements management and process business analysis and management are important ingredients in the solutions.
Iver Band, Enterprise Architect, Standard Insurance |
12:10-12:45 | Secure Business Architecture or Just Security Architecture? Dave Hornford, Partner and Enterprise Architect, Conexiam, Canada![]() Secure Business Architecture or Just Security Architecture? Chasing security without clarity in business architecture prevents an understanding of your benefits and operational requirements that drive an exposure to risk. Without this understanding a threat-based approach cannot provide security - operations will work around & circumvent the security to realize benefits without regard for risk, degrading security and increasing risk. Secure business architecture balances the benefits against the risk incurred in the operational model, information flows, regulation and deliberate attack. Intended audience: Enterprise Architects, Security Architects, Business Architects, Change Leaders Key takeaways:
Bio Dave Hornford, Partner and Enterprise Architect, Conexiam
| Modernizing Service to Citizens - Single Window Government Robert Weisman, CEO, Build the Vision, Inc![]() Modernizing Service to Citizens - Single Window Government The dream of integrated service delivery to citizens and clients transparently across jurisdictions and based upon life/business events rather than programs is major business transformation challenge being made possible through the use of Enterprise Architecture. The presentation will highlight experiences from several governments as well as recommended best practices by a practitioner who has spent almost 20 years working in this field at the federal, provincial/state and municipal levels using EA as a way of unambiguously communicating to all stakeholders be they business or technical. Key takeaways:
Bio Robert Weisman, CEO, Build the Vision, Inc Robert Weisman MSc, PEng, PMP, CD has spent more than 30 years in or working for governments in Canada, Australia and the United States. He has used EA, including TOGAF®, to provide structure for business and IM/IT planning. Robert is a business architect specializing in knowledge-based systems. He is very active in the Open Group and received an outstanding contribution award for his work on TOGAF 9. | Marriott Case Study: That Was Then, This Is Now Fernando Davila, Director for Architecture Services, Marriott InternationalMarriott Case Study: That Was Then, This Is Now 5 Years ago Marriott presented to the Open Group conference how it was proposing to move forward with its Enterprise Architecture initiatives and adopt TOGAF. This presentation will reflect where we thought we were going 5 years ago and where we are today. Intended audience: Enterprise Architects Key takeaways:
| |
12:45-2:00 | LUNCH | |||
Security Architecture | EA & Enterprise Transformation (.5 CPD each) | TOGAF® Case Studies (.5 CPD each) | ArchiMate® (.5 CPD each) | |
2:00-2:45 | Business Driven Security Architecture: Bridging the Executive Chasm Geoff Besko, CEO, Seccuris, Inc![]() Business Driven Security Architecture: Bridging the Executive Chasm Security is often a dirty word in many organizations because it is seen as an inhibitor to "getting the job done". This view has begun changing as Enterprise Security Architects and Security Practitioners have begun adopting the language of risk management, but still they rely on the motivations based on fear or compliance to define their architectures and programs -- an unsustainable approach. There is still a chasm between the perspectives and language of the Security Architect / Practitioner and our executives that needs to be crossed. This presentation will discuss how to bridge this chasm and provide practical ways of demonstrating value and creating alignment in motivations and outcomes between the Architect / Practitioner and the executive. Intended audience: enterprise architects, enterprise security architects, business leadership Key takeaways:
Bio Geoff Besko, CEO Seccuris As President and CEO, Geoff Besko has responsibility for the strategic leadership and general management of Seccuris Inc., a Canadian information assurance integrator.
| Case Study: State of Oregon HHS - CIO Used EA to Transform Agency in 12 Months Maharshi Desai, Director, Enterprise Architecture, OracleCase Study: State of Oregon HHS - CIO Used EA to Transform Agency in 12 Months The key topics to be covered using this presentation are: Intended audience: CIO's, Enterprise/Business Architects and Program Managers Key takeaways: Bio Maharshi Desai, Director of IT Strategy and Enterprise Archtiect, Oracle Maharshi Desai is a Director of IT Strategy and Enterprise Architecture at Oracle Corporation. He has 20+ years of experience in leading and delivering large-scale Oracle implementations projects. He successfully managed number of comprehensive IT solutions including IT strategies, Enterprise level architecture, IT Audits, ERP/CRM implementations, Infrastructure development for diverse national and international companies. Recently, he was involved with Oregon State’s toward designing solution for their Health Insurance Exchange implementations. Maharshi published number of papers and also have number of patents on his name. | Global Moderization Powered by EA, Powered by TOGAF® Vish Viswanathan, CC&C Solutions;Global Modernization Powered by EA, Powered by TOGAF®
This is a case study of a major global modernization program at Costco spread over several years and how EA, powered by byTOGAF®, is planned to lay a strong architectural foundation for its success. The early planning phase is being carefully constructed by anticipating the challenges ahead.
In a very successful enterprise, as compared to a problem ridden enterprise, the challenges could take a different form.
This case study brings out the early challenges after the birth of TOGAF in a successful global enterprise.
Speakers:
Vish Viswanathan, CC&C Solutions
Shrikant Palkar, Costco Shrikant Palkar, Costco | Modeling the Backstory with ArchiMate 2.0 Motivation Extension Iver Band, Enterprise Architect, Standard Insurance Company![]() Modeling the Backstory with ArchiMate 2.0 Motivation Extension Every architecture has a backstory that begins with people and organizations and their often conflicting challenges, principles, goals and concerns. From these motivations, enterprise architects must develop coherent requirements. The ArchiMate 2.0 Motivation extension helps enterprise architects characterize and justify investments, orient implementation teams, and unravel the political morasses that can stymie transformation. This tutorial introduces the Motivation extension and demonstrates how an enterprise architect at a diversified financial services company uses it for both strategic architectures and tactical resolution of complex situations. Intended audience: Enterprise architects, managers responsible for enterprise transformation, enterprise architecture consultants and tool vendors Key takeaways:
Bio Iver Band, Enterprise Architect, Standard Insurance Iver Band is the vice chair of The Open Group ArchiMate Forum and an enterprise architect at Standard Insurance Company in Portland, Oregon. Iver chose the TOGAF® and ArchiMate® standards for his IT organization, and applies them enthusiastically to his daily responsibilities. He co-developed the initial examination content for the ArchiMate 2 Certification for People, and made other contributions to the ArchiMate 2 standard. Iver is TOGAF 9 Certified, ArchiMate 2 Certified and a Certified Information Systems Security Professional. |
2:45-3:30 | FedRAMP - Initial Operating Capability Katie Lewin, Director, Federal Cloud Computing Program, General Services Administration (GSA)FedRAMP - Initial Operating Capability
FedRAMP was launched on June 6, 2012. This presentation will cover:
- brief history - who decided on the controls, templates and procedures? - how is this related to FISMA - what has happened in the first month? - what is the role of agencies, cloud service providers, and third party assessors - how are agencies approaching Cloud Computing? Bio
Katie Lewin, Director, Federal Cloud Computing Program, Office of Citizens Services and Innovative Technologies, General Services Administration
Katie Lewin is the Program Manager for the Cloud Computing at GSA. The program was established to drive the government-wide adoption of cost effective, green, and sustainable Federal cloud computing solutions.The Program concentrates on: cloud security, data center consolidation and email in the Cloud. In her role as Program Manager, Ms. Lewin is responsible for identifying, developing and delivering methods for agencies to use cloud computing capabilities. Currently, she is concentrating on implementing the Federal Risk and Authorization Management Program (FedRAMP). She has also served as the Chief of Staff to the Chief Information Officer (CIO), U.S. General Services Administration. Previous to her work at GSA, Ms. Lewin was an information technology consultant at SRA International and Lockheed Martin working with clients at the Internal Revenue Service, other financial management agencies, and the Federal Aviation Administration. Ms. Lewin began her career in the Federal government at the Library of Congress and has worked at the Office of Management and Budget and the Internal Revenue Service. She has a Masters Degree in Library and Information Science from Dominican University and an undergraduate degree in American History from Trinity University. | Managing Change through Transitional Architecture Samira Askarova, We Solutions GroupManaging Change through Transitional Architecture
The way transitional architecture can help make large IT efforts that include transition from the legacy systems more manageable, cost-effective, and secure is in allowing the organization to implement discrete plateaus for the transition effort.The initial plateaus synch and organize only the data that is in high demand and critical to the users. The system learns from user preferences and brings together similar data elements for easy access and analytics. It then consolidates and standardizes frequently requested data in chunks, getting rid of the elements that no longer serve the needs of the organization. Overtime, the data that is never requested or used in any way gets archived and stored away, according to regulations or internal policies. In other words, transitional architecture helps create a network of “smart” systems that is continuously learning from user preferences and habits to be most responsive to their specific needs, as the needs evolve, as opposed to a traditional model of planning to move all data from the legacy systems to the new platforms under one big program or contract. There is no limit to how smart the network of systems can become. If we take an example of all the procurement data at a given government agency that may be stored in disparate ERP systems that don't interface with each other, a lightweight transitional platform could be created to track preferences by individual users, displaying personalized dashboards by specific job title or position requirements within an agency’s procurement domain. It would be organized based on the procurement-related data categories accessed most frequently, while analyzing this information to best standardize the content and train personnel on one component of the new process at a time. This model aligns both technology and business-process changes for the users. The discrete plateaus provide certain stability and ownership of the transition process for the personnel and allow the integrated program team to manage change while moving gradually toward their end-goal.
Intended audience: IT strategy and security professionals, enterprise architects, change managers
Key takeaways:
1. How transitional architecture can be used to effectively manage both process and technology related changes in alignment with each other and at the same time 2. How transitional architecture can save cost both short and long-term, removing the need for the storage of data no longer needed by the organization 3. How transitional architecture can improve business outcomes, helping create smart systems that learn from the users and evolve as the needs of organizations evolve over time Bio
Samira Askarova, We Solutions Group
Samira Askarova is a public sector strategy, management, and technology consultant based in the Washington, DC area. Her current customer portfolio includes consulting support of the U.S. Army PEO-EIS and the USDA Forest Service Office of the CIO. Previously, Samira was a senior principal with the Project Performance Corporation (PPC), where she directed the company’s $120M Environmental Protection Agency account in addition to managing IT strategy and implementation programs at the Department of Veteran Affairs, Federal Student Aid, Overseas Private Investment Corporation, and other federal agencies. Before PPC, Samira worked in financial, budgetary and IT management roles with Booz Allen Hamilton, and the District of Columbia Government. At Goodwill Industries International, Samira served as the director of business innovation and development, helping establish social ventures that brought over $140M in new revenue into the organization to further promote Goodwill’s mission around the world.
Samira has an MPA from Syracuse University, an MBA from the University of Maryland, and an undergraduate degree in Accounting and Economics from Moscow State University. | Leveraging TOGAF within a Maturing EA Organization Vincent P. Armato, BMC Software, Inc.Leveraging TOGAF within a Maturing EA Organization This presentation focuses on early adoption strategies for the TOGAF framework within a maturing EA organization. Integration of TOGAF within current SDLC and ITIL processes is discussed. Role relationships, anagement of EA artifacts and strategy for Design Patterns are also considered. Intended audience: Enteprise and Solution Architects Key takeaways:
Bio Vincent Armato, IS&T Enterprise Architect, BMC Software Vincent Armato is an Enterprise Architect within the IS&T organization at BMC Software. Vincent has held this position for the last 6 years after holding previous management positions over content and collaboration service areas. His expertise includes architecture strategy for content/collaboration, ERP, MDM and BI solutions.
| Using the ArchiMate® Standard as Tools for Modeling the Business Neil Levette, The Business Forge, Canada![]() Case Study: Using the ArchiMate® Standard as Tools for Modeling the Business
This case study will provide insight and lessons learned on how to use the Archimate standards and Archi to model the integrating business tools such as Program Management, Portfolio Management, Strategic Planning and Business Planning, and Issues Management and their alignment and linkages to the business objectives, outcomes, programs, services, functions, processes and managing business transformations in order to achieve meaningful results.
The problems facing organizations are:
Intended audience: Business and Strategic Planners, Enterprise Architects, Business Designers, Program, Project, and Portfolio Managers
Key takeaways:
Bio
Neil Levette, Principal, The Business Forge Inc., Canada
Neil Levette has 30+ years of work experience in the public and private sectors including 27 years with the Canadian Federal Government. He has worked in various domains including Defence, Energy Regulation, Foreign Affairs, Compensation, and Enterprise Architecture. Most recently Mr. Levette was the Director of Business Design a position from which he is now retiring.
|
3:30-4:00 | Break | |||
Cloud Security | Business Innovation & Technological Disruption (.5 CPD each) | TOGAF & ArchiMate: Ask the Experts (1 CPD) | The Profession and Practice of EA | |
4:00-4:45 | Cloud Security – A Business Transformation Nirvana or Security Nightmare? Ryan Berg, Cloud Security Strategy Lead, IBMCloud Security – A Business Transformation Nirvana or Security Nightmare? As businesses look to transform traditional IT infrastructure and services to the cloud, security needs to be a very important factor in this decision. As businesses look to cloud as a service, operations, and IT accelerator, security remains the number one inhibitor to broad scale adoption. This presentation will outline the different types of cloud based services and how traditional IT security needs to change to address the differences in a cloud computing environment. Intended audience: CTO, Technical Director, CISO, CSO, CIO, EA Bio Ryan Berg, Cloud Security Strategy Lead, IBM Ryan was a Co-Founder and Chief Scientist for Ounce Labs prior to its acquisition by IBM in 2009. He holds patents and has patents pending in multi-language security assessment, kernel-level security, intermediary security assessment language, and secure remote communication protocols. Prior to Ounce, Ryan co-founded Qiave Technologies, a pioneer in kernel-level security, which later sold to WatchGuard Technologies in October of 2000.
| Innovation and Enterprise Architecture Jude Umeh, Enterprise Architect, Capgemini;![]() Innovation and Enterprise Architecture Innovation and Enterprise Architecture are not often used in close proximity Key takeaways: Bio Jude Umeh, Enterpise Architect, Capgemini Jude Umeh is a Senior Consultant / Enterprise Architect with Capgemini UK, Corey Glickman, Innovation Management, Capgemini | Ask the Experts: TOGAF® and ArchiMate® Experts PanelAsk the Experts: TOGAF® and ArchiMate®
Get your questions answered by those involved in developing TOGAF® and ArchiMate®, Open Group standards.
TOGAF®, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world's leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. ArchiMate®, an Open Group standard, is an open and independent modeling language for Enterprise Architecture. ArchiMate provides instruments to support enterprise architects in describing, analyzing and visualizing the relationships among business domains in an unambiguous way.
Developed by the ArchiMate Forum of The Open Group, the latest technical standard is now more aligned with TOGAF®, the world’s most popular Enterprise Architecture framework. As a result, enterprise architects using the language can improve the way key business and IT stakeholders collaborate and adapt to change. ArchiMate 2.0 improves collaboration through clearer understanding across multiple functions, including business executives, enterprise architects, systems analysts, software engineers, business process consultants and infrastructure engineers. The new standard enables the creation of fully integrated models of an organization’s Enterprise Architecture, the motivation behind it, and the programs, projects and migration paths to implement it. ArchiMate already follows terms defined in the TOGAF framework, and version 2.0 of the specification enables modeling through the TOGAF Architecture Development Method (ADM). Panelists: Chris Forde, The Open Group
Iver Band, Standard Insurance
Henry Franken, BIZZdesign
Geoff Besko, CEO, Seccuris, Inc
| Strategic Aspects of Leadership Victor Ramos, Executive IT Architect, IBM Global Business Services Strategic Aspects of Leadership This presentation will cover the following topics:
Bio Victor Ramos, Executive IT Architect, IBM Victor Ramos is a Executive IT Architect with IBM Global Business Services. In the course of his 32-year career with IBM, Victor has worked on many large and complex engagements for many large, global companies.
|
4:45-5:30 | Cloud Security - An Evolutionary Revolution Glenn Brunette, CTO, Enterprise Solutions Group, OracleCloud Security - An Evolutionary Revolution This session will reinforce the duality of Cloud Computing security. On one hand, Cloud Computing security is simply an evolution of existing architecture, technology and practice. At the same time, Cloud security can bring about revolutionary changes in how we think about, implement, and operate Cloud architectures. This session will discuss architectural and operational strategies to help organizations achieve equilibrium across these sometimes conflicting areas. Further, this session will illustrate specific risks and threats that are unique or highly amplified in Cloud architectures along with recommendations to remediate or lessen those risks. Cloud Computing has the potential to enable sustained improvements to IT security - we just need to embrace the duality that is Cloud Computing security. Intended audience: Enterprise Architects, IT Security Professionals, Technologists Key Takeaways: 1. Cloud Computing builds upon a rich history of IT security practice that we should leverage and continue to evolve with new architectures, use cases, and technologies. Bio Glenn Brunette, CTO, Enterprise Solutions Group, Oracle For over 20 years, Glenn has developed secure IT architectures and best practices for global customers and industries. Glenn is the CTO for the Enterprise Solutions Group at Oracle where he focuses on enterprise architecture, IT governance, information security, and holistic IT systems design. Previously, Glenn was a Distinguished Engineer and Chief Security Architect at Sun Microsystems and a founding member of the Cloud Security Alliance. | Professionalizing the Discipline of EA
Shakir Badami, Director, Architecture Governance, Baker Hughes, Inc.![]() Professionalizing the Discipline of EA During IT landscape transformations, a common mistake is to discount the business value and impact that Enterprise Architecture can bring. IT delivery teams often perceive Enterprise Architecture as an organization that slows down delivery rather than being the enabler or accelerator.
Intended audience: CIOs; CXOs; Enterprise Architects; IT Project, Service, and Portfolio Managers Key Takeaways: 1) Understanding of an effective EA engagement methodology 2) How a professional approach to EA can help deliver high-quality reusable solutions to meet the needs of the business Bio Shakir Badami, Director of Architecture Governance at Baker Hughes. Shakir has extensive experience defining, evangelizing and enforcing enterprise architecture strategy, technology governance and processes. Shakir has led EA initiatives for organizations such as BP, American Express, State Farm, Cable & Wireless, and Schlumberger. | ||
6:15-9:15 | Dinner Event |
Wednesday, July 18, 2012
Additional Open Sessions:
TRACKS | Security Automation | Cloud Computing for Business | Architecture Methods and Techniques (1 CPD) |
9:00 – 9:45 | Security Automation Workshop Security Automation Workshop Automating security in large, heterogeneous environments is seen by security practitioners as an essential step forward to managing consistent configuration of their information systems and key to maintaining compliance to their security policy and assuring compliance with industry standards and government regulations. Cloud computing and virtualization heighten the importance of making security automation a reality. A number of organizations are working on protocols and approaches that hold the promise of enabling automation of security functions in IT environments. This workshop with industry leaders will describe the security automation big picture, challenges to be overcome, solution approaches, and the current state of standards impacting security automation. Speakers inlcude:
9:00 The Big Picture
Steve Whitlock, Chief Strategist for IT Security, Boeing
9:15 Managed Incident Lightweight Exchange (MILE)
Kathleen M. Moriarty, CISSP, GRC Strategy, Office of CTO, EMC Corporation
The increased intensity and effectiveness of targeted attacks has created the need to share and exchange incident and indicator information for preparedness as well as for incident handling. This talk will describe a standardized format and protocol for sharing and exchanging incident information using a secure method that meets privacy and policy requirements via the Incident Object Description Exchange Format (IODEF) [RFC5070] and Real-time Inter-network Defense (RID) [RFC6545, RFC6546]. The MILE working group is actively reviewing the base standards and extending them to meet the use cases for incident response and security teams. The working group is interested in representing additional data types such as forensics and malware in addition to setting standards for marking incidents and indicators appropriately. The current work to meet new use cases will be reviewed in this talk. Open work includes remediation capabilities that may be handed off to change control processes to enable automation of the recommended actions or ability to automatically apply appropriate countermeasures. Bio: Kathleen Moriarty is with the EMC Office of the CTO working on technology strategy and standards for Governance, Risk, and Compliance with a focus on incident response and related areas. Kathleen has been the primary author of multiple published standards and actively contributes to security standards activity in both the ITU-T and the IETF. Previously, as the practice manager for security consulting at EMC, Kathleen was responsible for oversight of key projects, and development of security programs, in addition to serving as the acting CISO of a global investment banking firm. Kathleen has also been the head of IT Security at MIT Lincoln Laboratory and the Director of Information Security at FactSet Research Systems. Kathleen holds a Masters of Science degree in Computer Science from Rensselaer Polytechnic Institute and a Bachelor of Science in Mathematics and Computer Science from Siena College. 9:45 Security Automation with TNC Standards
Steve Hanna, Distinguished Engineer, Juniper Networks
Bio
Steve Hanna is co-chair of the Trusted Network Connect Work Group in the Trusted Computing Group and co-chair of the Network Endpoint Assessment Working Group in the Internet Engineering Task Force. Hanna is the author of several IETF RFCs and published papers, an inventor or co-inventor on 34 issued U.S. patents, and a regular speaker at industry events such as Interop and the RSA Conference. He is employed as a Distinguished Engineer at Juniper Networks and holds a Bachelor’s degree in Computer Science from Harvard University.
10:15 Event Management (DASv2)
Dave Corlette, NetIQ
10:35 Break
10:50
Kent Landfield, Director Content Strategy Architecture & Standards, McAfee
11:20 Automated Configuration & Compliance - SCAP and ACEML
Dave Waltermire, NIST
12:00 AVOS for Virtualization Management, including Identity Mananagement; and Authorization Framework from CC-SWG Cloud Identity-Security
Shawn Mullen, Security Architect, IBM
Stuart Boardman, KPN Consulting
12:30 Panel Q&A | Should I Be in the Cloud? What If It Rains? Bhavish Kumar Madurai, Director & Partner, CSC Global Business Solutions ![]() Should I Be in the Cloud? What If It Rains?
The adoption curve for cloud computing is on the rise for enterprises. However, a majority of organizations still consider it to be more hype than reality, thereby failing to realize the benefits of disruptive innovation. There is a growing realization however that on-premise computing has its own limitations, much like how personal transportation, while quite feasible, is not necessarily the best answer for inter-continental travel. For many next generation applications the elastic and affordable power of the Cloud actually becomes a necessity.
Is it about time we started to govern the cloud? If so should this be limited to the technology or should it focus on the operating model (private/public) in order to make it more secure? These are the some of the important questions that organizations are asking today when adopting disruptive innovation in order to maximize “as a service” transformation enabling better reach and integration with customers, partners and suppliers. This presentation is a game of jeopardy on high performance computing vs the risk brought by such technology, and it seeks to find some of the very pressing enterprise needs for which Cloud is the best answer. Key takeaways: - Details of qualifying enterprise ‘use cases’ or workloads - Corresponding business cases and technical demands for Cloud - Details of how we can apply Cloud control to drive better benefits - Reference architecture (How to tap into the benefits? How to manage the risks?) - Lessons from early adopters Bio
Bhavish Kumar Madurai, Director & Partner, CSC
Bhavish Kumar Madurai is the Director & Partner in CSC Global Business Solutions North America. Bhavish has over 20 years of proven experience as a specialist and expert in leading and directing high profile, complex and risk driven transformation solutions demonstrating strategic thinking, troubleshooting and solution leadership often in demanding and hard environments driving critical senior business relationships. Bhavish has extensive solutions expertise as a customer and risk advisory experience in global markets including Enterprise solutions (ERP, Cloud Computing, BPOS, Information Management, Virtualization, BPM, EAI and SOA) across various industry sectors like Retail, Energy, Utilities, Services, Manufacturing, Banking and Insurance. Bhavish is also a key contributing member of The Open Group including Cloud Governance, SOA Reference Archiectures, etc.
| Simplify IT for Best Business Agility Leo Shuster, Director, IT Architecture, Nationwide Insurance![]() Simplify IT for Best Business Agility
In today’s age of cloud computing, virtualization, mobile proliferation, social media, and consumerization of IT, companies are struggling to keep up with competitive pressures, reduced budgets, and ever growing demand for IT resources.
The answer is simple, literally.
This session will discuss how simplifying IT, reducing its overall complexity, and maximizing business enablement will address all these issues. You will learn how through a thoughtful and pragmatic approach based on latest technologies and trends, companies can achieve a great collaborative partnership between their business and IT organizations that will result in increased profitability, productivity, and performance.
Intended audience: Architects, IT leaders, business leaders
Key takeaways:
Bio
Leo Shuster, IT Architecture, Nationwide Insurance
Throughout his nearly 20 years of experience in IT, Leo Shuster has directed Enterprise Architecture and SOA strategy and execution for a number of organizations including Nationwide Insurance, National City Corporation, Ohio Savings Bank and Progressive Insurance. He currently holds a position of Director, IT Architecture at Nationwide Insurance.
|
9.45-10.30 | Cloud Computing Metrics for Successful Business Architecture and Strategy Mark Skilton, Global Director, Strategy Office, Capgemini, and Co-chair - The Open Group Cloud Work Group ![]() Cloud Computing Metrics for Successful Business Architecture and Strategy This session will introduce current work on Cloud Computing services and adoption strategies and how architecture development is evolving to transition customers and providers towards on-demand IT and Business Architecture models. The work uses current insights and methods from Capgemini and The Open Group Cloud Computing Work Group.
The session introduces a framework of how Big Data, Mobility Social networks and ubiquitous computing is changing the landscape of business and IT solutions. It positions how Cloud Computing may fit into these trends and how business and IT need to consider their value case and architecture choices from customer and provider view points.
The session concludes with examples of technology and business architecture roadmaps, metrics and design criteria for Cloud or not Cloud adoption.
Intended audience: Enterprise and Business Architects and Solutions Consultants
Key takeaways:
Bio
Mark Skilton, Global Director, Strategy Office, Capgemini and Co-chair of The Open Group Cloud Work Group
Mark’s current responsibilities at Capgemini include strategy development and service offer portfolio design and center of excellence development and leader of the global Government-Cloud
interdisciplinary Offer Development. He is also the author of the Capgemini University Cloud Computing Global Education Course.
Mark is a recognized expert on Cloud Computing. His recent publications include editor of the The Open Group Guide on Cloud Computing for Business; contributing case study author on Cloud Computing for Industry in the 2nd Edition Handbook of Outsourcing and Off-shoring; Building Cloud Computing ROI in British Computer Society Annual Journal 2011 and syndicated in CIO.com, ZDnet, Computerweekly, Cloud Computing Journal, Reuters, Forbes and others.
| Enterprise Architecture vs. Collection of Architectures in Enterprise Dr. Yan Zhao, Chief Architect, ArchiTech Consulting LLC ![]() Enterprise Architecture vs. Collection of Architectures in Enterprise
Enterprise Architecture (EA) is becoming popular in most private enterprises these days due to the practical needs in this era of IT, after its noticeable fading in public sectors. At this stage, the lessons learned from public sectors could be very helpful to the EA adoption in both public and private sectors in moving forward.
We noticed that there is still no unified answer regarding to what is EA and what should be in it. It is not rare to see that so called “EA” is to use an EA tool and/or an EA repository to collect all type of “architecture” artifacts inside enterprise. These “architecture” artifacts are developed in different timeframes, cover different level of content details, and are created from different perspectives for different purpose. While a real EA should consist of “architecture” artifacts in concert by planning ahead with a designated purpose for each view. The level of details is good enough to convey intent and to serve the purpose, no more and no less. This presentation will discuss the differences between enterprise architecture and a collection of architectures in enterprise. This presentation will discuss the differences between enterprise architecture and a collection of architectures in enterprise. It will help to clarify the focus in each phase and stage of EA development (e.g. TOGAF®) to ensure successful EA adoptions in solutions, initiatives, programs, and projects. Intended audience: enterprise architects, solution and system architecture, CIO/CTO, business segment leaders, program/project managers, etc. Key takeaways:
1. The purposes of doing EA 2. The differences between EA and a collection of architectures in enterprise 3. The focus in each phase and stage of EA development (e.g. TOGAF) to ensure successful EA adoptions in solutions, initiatives, programs, and projects. Bio
Dr.Yan Zhao, Chief Architect, ArchiTech Consulting LLC
Dr. Zhao is a well-recognized thought leader and senior expert in architecture, strategy, solutions and technologies for IT enabled business. She has over 20 years work experience across academia, corporate research, software industry, and consulting service. With strength in innovation, insight, and vision is experienced in architectural leadership for enterprise, solutions, business, systems, software, information/data, and IT infrastructure. | |
10.30-11.00 | Break | ||
TRACKS | Security Automation | Cloud Computing for Business | Architecture Methods and Techniques (.5 CPD each) |
11.00-11.45 | Security Automation Workshop Security Automation Workshop Automating security in large, heterogeneous environments is seen by security practitioners as an essential step forward to managing consistent configuration of their information systems and key to maintaining compliance to their security policy and assuring compliance with industry standards and government regulations. Cloud computing and virtualization heighten the importance of making security automation a reality. A number of organizations are working on protocols and approaches that hold the promise of enabling automation of security functions in IT environments. This workshop with industry leaders will describe the security automation big picture, challenges to be overcome, solution approaches, and the current state of standards impacting security automation. Speakers inlcude:
9:00 The Big Picture
Steve Whitlock, Chief Strategist for IT Security, Boeing
9:15 Managed Incident Lightweight Exchange (MILE)
Kathleen M. Moriarty, CISSP, GRC Strategy, Office of CTO, EMC Corporation
The increased intensity and effectiveness of targeted attacks has created the need to share and exchange incident and indicator information for preparedness as well as for incident handling. This talk will describe a standardized format and protocol for sharing and exchanging incident information using a secure method that meets privacy and policy requirements via the Incident Object Description Exchange Format (IODEF) [RFC5070] and Real-time Inter-network Defense (RID) [RFC6545, RFC6546]. The MILE working group is actively reviewing the base standards and extending them to meet the use cases for incident response and security teams. The working group is interested in representing additional data types such as forensics and malware in addition to setting standards for marking incidents and indicators appropriately. The current work to meet new use cases will be reviewed in this talk. Open work includes remediation capabilities that may be handed off to change control processes to enable automation of the recommended actions or ability to automatically apply appropriate countermeasures. Bio: Kathleen Moriarty is with the EMC Office of the CTO working on technology strategy and standards for Governance, Risk, and Compliance with a focus on incident response and related areas. Kathleen has been the primary author of multiple published standards and actively contributes to security standards activity in both the ITU-T and the IETF. Previously, as the practice manager for security consulting at EMC, Kathleen was responsible for oversight of key projects, and development of security programs, in addition to serving as the acting CISO of a global investment banking firm. Kathleen has also been the head of IT Security at MIT Lincoln Laboratory and the Director of Information Security at FactSet Research Systems. Kathleen holds a Masters of Science degree in Computer Science from Rensselaer Polytechnic Institute and a Bachelor of Science in Mathematics and Computer Science from Siena College. 9:45 Security Automation with TNC Standards
Steve Hanna, Distinguished Engineer, Juniper Networks
Bio
Steve Hanna is co-chair of the Trusted Network Connect Work Group in the Trusted Computing Group and co-chair of the Network Endpoint Assessment Working Group in the Internet Engineering Task Force. Hanna is the author of several IETF RFCs and published papers, an inventor or co-inventor on 34 issued U.S. patents, and a regular speaker at industry events such as Interop and the RSA Conference. He is employed as a Distinguished Engineer at Juniper Networks and holds a Bachelor’s degree in Computer Science from Harvard University.
10:15 Event Management (DASv2)
Dave Corlette, NetIQ
10:35 Break
10:50
Kent Landfield, Director Content Strategy Architecture & Standards, McAfee
11:20 Automated Configuration & Compliance - SCAP and ACEML
Dave Waltermire, NIST
12:00 AVOS for Virtualization Management, including Identity Mananagement; and Authorization Framework from CC-SWG Cloud Identity-Security
Shawn Mullen, Security Architect, IBM
Stuart Boardman, KPN Consulting
12:30 Panel Q&A | Cloud Computing's Impact on Modern IT Organizational Structures Majed Saadi, Cloud Computing Practice Lead, SRA InternationalCloud Computing's Impact on Modern IT Organizational Structures
Cloud Computing is promising a lot of efficiencies and cost savings but it's also presenting a huge paradigm shift to many IT organizations. Cloud Computing does not only affect the way organizations consume resources but also calls for many changes in their supporting structures. The most common answer to this problem is the implementation of Enterprise Architecture and Service Management frameworks such as TOGAF and ITIL. But these frameworks add to the complexity of the situation because they call for the alignment of organizational roles with their derived principles. This lecture discusses the opportunities and challenges of Cloud Computing then focuses on providing some suggested guidelines for using industry proven frameworks to streamlining its impact on IT organizational structures
Key takeaways:
1. Importance of defining short and long term strategies for Cloud Computing
2. An approach for avoiding conflicts of interest 3. Creative ways for coping with change Bio
Majed Saadi, Cloud Computing Practice Lead, SRA International
Majed is the Cloud Computing Practice Lead at SRA International. His practice encompasses service areas from Cloud Strategy Development to Cloud Security Management and all areas in between Cloud Readiness, Cloud Engineering, and Cloud Modernization. He has served as a thought leader at many Federal Systems integrators in the areas of IT Strategy Development, Enterprise Architecture, and Enterprise Systems Management. Majed holds several industry certifications including TOGAF 9, ITIL Expert, ISO 20000 Certified Consultant, and Management of Risk (M_o_R ) Certified. | Using Infographics to Communicate Architecture Matthew T.Daniels, SVP and Head of Americas Strategy and Architecture, RBS CitizensUsing Infographics to Communicate Architecture
Successful communication to non-technical CxO level decision makers is a critical aspect of any enterprise transformation. A multi-pronged approach consisting of metrics, supporting facts, and "eye candy" targets both the rational and emotional sides of your audience. This presentation shares a case study of a large, global enterprise and its recent experience with infographics as a powerful vehicle for successfully selling change.
Key takeaways:
1. The importance of selling architecture 2. Lessons learned from a large organizations' architecture communication approach 3. Tips and guidelines for creating architecture infographics 4. Sample before and after slides Bio
Matthew Daniels, SVP and Head of Americas Strategy and Architecture, RBS Citizens
Matt Daniels leads the Strategy and Architecture department at RBS Citizens. In his 12 years at RBS, he also managed both Business Continuity and Incident Management. Prior to RBS, Matt held senior technology positions with Alltel Information Systems, Gartner, and Eunetcom (Dunn & Bradstreet) and has 15 years in technology management, specifically in network and data security, large-scale heterogeneous networking, technology integration, and application architecture.
|
11.45-12.30 | Cloud Strategy Adoption Based on the Cloud Lifecycle Penelope Gordon, Cloud Strategist, 1Plug Corporation Cloud Strategy Adoption Based on the Cloud Lifecycle
Though business strategies for generating revenue or internally recovering costs from cloud computing offer higher rewards than strategies based on offering less resource-intensive solutions and/or custom services, the risks are also higher - especially when missteps are not identified and corrected early. In this session I will describe a process for adopting a cloud business strategy which mitigates those risks, keeps investors committed until breakeven, and avoids costly false starts. This process is based on the Producer's and Internal Supplier's views of the four-phase Cloud Lifecycle. (The corresponding buyer's view of the Cloud Lifecycle was described in The Open Group Guide Book: "Cloud Computing for Business: The Open Group Guide".
Intended audience: Individuals who create, recommend, or influence cloud business strategies
Key takeaways:
Bio
Penelope Gordon, Cloud Strategist, 1Plug Corporation
Penelope specializes in adoption strategies for cloud and other emerging technologies, and portfolio management of early stage innovation. While with IBM, she led innovation, strategy, and product development efforts for all of IBM's product and service divisions; and helped to design, implement, and manage one of the world's first public clouds. | Best Practices in Communicating to Enterprise Management Using the IT Portfolio TJ Parro, Enterprise Architect, and Jim May, Instructor, Metaplexity AssociatesBest Practices in Communicating to Enterprise Management Using the IT Portfolio
What if you could pull together the many oblique, fragmented views of your systems into a multidimensional view to communicate with technology staff? IT and agency staff know about half the existing systems very well. Most of the business stakeholders are vaguely uncomfortable about what they actually pay for IT and whether IT is operating efficiently. Chances are it is a bargain. Chances are its pretty efficient. Chances are you can’t prove it. The systems have evolved over anywhere from 5 to 25 years. The actual size, shape, and mission of these assets is blurred and lost over time. IT knows these systems from different perspectives such as application architecture, networking topologies, PMO status, contracts, org charts, and financials. A true 3-D orthogonal view “composite picture” of systems from the enterprise perspective is long lost. What does the enterprise portfolio really look like? Observation tells us that enterprise management will know about half of the actual applications being used in the organization. Will it be possible to consolidate IT and transform enterprise IT with a view this limited?
Intended audience: Enterprise Architects; Enterprise Leadership
Key takeaways:
1) Demonstrated best practice in Enterprise Portfolio Management (EPM) focused on applications and services 2) How EPM aids in managing resources 3) Illustrated "common" view of enterprise baseline architecture Bio
TJ Parro, Enterprise Architect, Metaplexity Associates
Enterprise Architect, Project Manager, Software Developer who created ITIL aligned and TOGAF® guided enterprise architecture methods for defining the enterprise and taking a systemic approach to defining the true enterprise baseline.
| |
12.30-2.00 | Lunch | ||
TRACKS | Architecture Governance | Cloud Deployment | Architecture Methods and Techniques (.5 CPD each) |
2:00–2:45 | Implementing Architecture Governance – A Practical Case Study Krish Ayyar, Managing Principal, Martin-McDougall Technologies, Australia![]() Implementing Architecture Governance – A Practical Case Study
TOGAF® provides high level definitions and generic models for Architecture Governance. In practice, the challenge is to come up with an Architecture Governance model which takes into account company culture, existing governance structures, lessons from past failures and successes, the various stakeholder groups etc, etc. This presentation discusses a real life case of Architecture Governance implementation at a large multi- billion dollar company with a complex business and technology environment.
Intended audience: Consultants, EA’s in user organizations, CIO’s, Business Managers
Key takeaways:
1. Clearer understanding of the building blocks of Architecture Governance 2. Critical successfFactors of Architecture Governance 3. A practical implementable solution which may be customized and adopted for different organizations Bios
Krish Ayyar, Managing Prinicpal, Martin-McDougall Technologies
Krish Ayyar is a practising Enterprise Architect with over 30 years experience in IT. Krish evangelizes on the usage of EA for Enterprise Business Transformation. Krish is an international consultant on Enterprise Architecture and TOGAF® apart from having mentored and trained many architects towards their TOGAF certification globally.
Sukumar Rajagopalan, Senior Enterprise Architect, Martin-McDougall Technologies
Sukumar Rajagopalan is an Enterprise Architect with over 30 years experience in IT in the financial services Industry in the Sukumar Rajagoplan, Enterprise Architect, Martin-McDougall Technologies | Building and Deploying Cloud-based Enterprise Applications Tejpal Virdi, Senior Enterprise IT Architect, Boeing;Building and Deploying Cloud-based Enterprise Applications Everyone talks about putting applications into the cloud but what do you really have to do, in order to be successful. This session will look at issues in architecting, developing and deploying for Cloud, including:
The presenters, from Boeing and IBM, will bring real experience to provide guidance in building and deploying cloud-based applications. Attendees will have the opportunity to hear lessons learned and ask technical questions of people who've been there and done it.
Speakers
Tejpal Virdi, Senior Enterprise Architect IT Architect, Boeing
Tejpal (TJ) Virdi works for The Boeing Company as Senior Enterprise IT Architect in Commercial Aviation Services and Global Services & Support IT Architecture group. TJ is primarily responsible for architectural leadership, aligning vision and strategy with enterprise information systems. Prior to joining The Boeing Company, TJ had worked in Healthcare IT for 15+ years in creating and managing innovative solutions. TJ has an MBA, a Bachelor of Science in Technology degree, and a Bachelor of
Tony Carrato, Solution Architect, IBM
Tony Carrato is a Solution Architect for Smarter Cities products in IBM Software Group. He is responsible for supporting customers and internal IBM teams, including IBM Research teams, who work with a portfolio of products including the IBM Intelligent Operations Center, IBM Intelligent
Tony is member of the steering committees for the SOA Work Group and the Security Forum at The Open Group. He is also a member of the IBM Academy Technology and the Steering Committee of the IBM Software Group Architecture Board. He has over 30 years of IT experience, working in North America, Asia and Australia. He is an Open Group certified Distinguished IT Architect. Tony has an MBA and a bachelor's degree in Electrical Engineering. Tony also spent seven years as an officer in
Tony Carrato, Solution Architect, IBM Software Group | Selling the Business Value of Enterprise Architecture Initiatives Brenda Cowie, VP Client Services, BiZZdesign, North America ![]() Selling the Business Value of Enterprise Architecture Initiatives
Enterprise Architecture is not a goal in itself. It supports organizations in achieving business goals and effective business change. Systematic methods, a consistent language, and an effective tool will help you reach these goals but how do you convince others in your organization to get on board with your program?
In this session Brenda will discuss how various clients approach selling an EA initiative in their organizations and the factors that influence the process. The second half of the session will consist of a panel discussion where members of our EA community can exchange best practices/ideas etc….
This session will cover:
Intended audience: Enterprise Architects, CIO's anyone trying to influence their peers to get an EA initiative underway and provide value
Key takeaways:
How do we sell the idea of an EA Initiative? Communication Strategies - how do you get your message across? Building an Enterprise Architecture Capability. How firms are using ArchiMate® to convey their message Bio
Brenda Cowie, VP Client Services, BIZZdesign North America
As VP Client Services & Director of BiZZdesign North America, Brenda is responsible for new business development, creating strategic alliances and overseeing all account business. With over 15 years in IT, Brenda has had various roles in IT Consulting and Resourcing and has been involved in Enterprise Architecture for the last 5 years. |
2:45-3.30 | Architecture for a Changing World Kevin Sevigny, Conexiam Solutions Inc., Canada![]() Architecture for a Changing World
In our fast changing and complex business environments, how many times have you seen a transformation initiative fail to deliver the intended business value? This interactive presentation will discuss how governance identifies when a transformation initiative needs to make a mid-course correction.
We will discuss: 1) How to determine when an initiative is off course and won't provide the expected value. 2) When the business drivers change, how to manage and measure delivery to meet the new drivers. 3) How to determine when to shutdown an initiative if the cost of correction exceeds the expected value. Key takeaways:
1) What governance needs to be in place to ensure the transformation initiative is tracking to your strategy and will deliver the intended business value. 2) What governance needs to be in place to determine when a mid-course correction is required. Bio
Kevin Sevigny, Enterprise Architect, Conexiam Solutions
Kevin Sevigny is a practicing enterprise architect - he focuses on enterprise architecture delivery. Kevin is a partner in Conexiam. Conexiam develops EA roadmaps, leads strategy-driven transformation projects and enhances clients' in-house EA capability. Kevin developed his expertise working in a number of industries, including telecommunications, cable, transportation, oil and gas, retail and energy marketing.
| Cloud Services Governance Rajesh Radhakrishnan, Senior IT Architect, IBM![]() Cloud Services Governance
Cloud Services Adoption in large scale by enterprises has increased the need for cloud governance. This paper and presentation discussed a structured approach to cloud governance and briefly discusses:
This presentation elaborates further on Cloud Governance discussing some of the key challenges and issues associated with cloud architecture governance:
Bio
Rajesh Radhakrishnan, IBM Global Technology Services
Mr. Radhakrishnan is a senior managing consultant and senior IT architect for IBM Global Technology Services (GTS). His current client engagements involve global ITIL program management, service management, and cloud service management. Prior to joining IBM, he was an independent IT architect at Zygous, LLC, for two years and a senior technical consultant at Sun Microsystems, Professional Services, for nearly five years. He was also a senior technical staff member at Metamor Worldwide for five years and consulted for numerous Fortune 500 companies. He specializes in enterprise architecture and service management consulting, business continuance, high-end systems, high availability, storage technologies, and technical project management.
Mr. Radhakrishnan has an M.B.A. degree from Old Dominion University and an M.S. degree from the University of Virginia, McIntire School of Commerce.
Mr. Radhakrishnan is certified as a TOGAF® practitioner, ITIL-ITSM (v3) consultant (Expert Level), Six Sigma Black Belt, IBM Senior IT Architect, and as an Open Group Master Architect, Solaris Systems Administrator and Storage Architect.
Mr. Radhakrishnan was awarded a certificate of merit for being among the top 1% in All India Secondary School Certificate Examination in Economics and was awarded the VITS (Virginia IT Scholar) for 2003. Mr. Radhakrishnan has received multiple awards from Sun Microsystems (Service Excellence and 400/500 hour club awards) and from IBM (Service Excellence Awards, Restricted Stock Options, Invention Awards & Invention Plateau awards and Spotlight Awards). Mr. Radhakrishnan has one granted patent and nine pending patents. | Business Architecture: Integrating Business Design and IT architecture for Target Operating Models Proteus Duxbury, Managing Consultant, PA Consulting GroupBusiness Architecture: Integrating Business Design and IT architecture to Build Scalable Target Operating Models
Increased emphasis is being placed on the importance and necessity of Business Architecture as the foundation of successful enterprise wide process and IT realignment initiatives. However Business and Enterprise Architecture programs too frequently fail to bridge the divide between business and IT because they are focused on either business design or IT architecture, but rarely both. While frameworks such as TOGAF® have gone some way to address this there is still some way to go and few current approaches truly integrate the realms of business design and IT architecture. So what is missing from current approaches and how can TOGAF architects ensure greater robustness in their modelling of their business?
During this talk we will present a comprehensive approach to complementing TOGAF and enabling the design of a Target Operating Model (TOM) by integrating business design and IT architecture. There are three phases that we will describe: Phase 1: Confirms the strategic intent and current business challenge to agree specific design principles that will guide the design activity Phase 2: Develops target operating model options and assess them against the original design principles Phase 3: Develops the detailed design to implement an agreed TOM, which will be delivered with client engagement at the heart of the approach. During this talk we will provide clear guidance on how to succeed at each phase and show clearly how the approach can be used within the TOGAF lifecycle and Architecture Development Method (ADM). We will share insight from real life programs where we have seen these principles applied. Intended audience: Business and Enterprise Architects, TOGAF pracitioners, Program Managers, Business and IT Leadership, CxO Key takeaways:
The audience will learn a new approach to complimenting TOGAF with a number of business design principles and techniques that can be applied immediately. They will also learn how these have been applied successfully elsewhere and how it relates to the TOGAF lifecycle and ADM. Principles inlude: 1. Design around the needs of the customer and organization’s future strategy (e.g. their scenario). Ensure you can articulate who an organisation’s key customer groups are, how they perceive ‘value’ is delivered and the future goals where the organisation needs to be. 2. Design the organization bottom-up ensuring processes, capabilities and structures support the delivery of ‘what the organization needs to do well’ to deliver value to core customers in the most efficient way possible. 3. Be conscious that there are several ways to design an organization, therefore designing several target operating model options before proceeding to detailed design ensures there are clear decision making points in the process. Bio
Proteus Duxbury, Managing Consultant, PA Consulting Group
Business and Enterprise Architect with TOGAF® certification and a solid technical background spanning all architecture domains. 13+ years experience in consulting leading the development of architectures in support of major IT and business transformations for fortune 500 companies. |
3:30–4:00 | Break | ||
TRACKS | Cloud Architecture (.5 CPD each) | Architecture Methods and Techniques (.5 CPD each) | |
4:00–4:45 | Using TOGAF® in Architecting for the Cloud: A Step by Step Approach
Pradipa Karbhari, Principal Architect, Digital & Supply Chain Services, Microsoft![]() Using TOGAF® in Architecting for the Cloud: A Step by Step Approach
This presentation discusses a case study in developing and establishing the architecture for a cloud based solution built on a roadmap using the various phases of the TOGAF Architecture Development Method (ADM). It discusses the problem domain including various business processes, systems and data components involved in the solution, and shows the mapping to the corresponding phase of the ADM where each is addressed.
Intended audience: Architects, Business Analysts, Developers and Project Managers interested in the TOGAF approach to architect for the Cloud Key takeaways: Attendees will gain practical knowledge on the adaptability of the TOGAF ADM in architecting cloud solutions. Bio
Pradipa Karbhari, Principal Architect, Digital & Supply Chain Information & Services, Microsoft
Pradipa Karbhari previously served as the Director of SOA and Business Integration at Sogeti USA, LLC. Prior to this, she was the National Director of Web Services and SOA for SilverTrain. Considered a renowned expert in her field, her experience spans over 17 years in Information Technology leadership, design and development, with an emphasis on Service Oriented Architectures, Web Applications, Web Services and Solutions Delivery. | Leveraging EA to Build Target State Architecture Tolla Soto, Solution Architect and Systems Engineer, IBM Leveraging Enterprise Architecture, Model Driven Development, Collaborative Application Lifecycle and Automation to Build Target State Architecture
In collaboration with a large banking institution, IBM’s software group and services created end to end architectural, development and runtime documentation and a meta data repository that supports IT across multiple business units. In this session, we will illustrate how business architectures, development and operations linked business capabilities to the underlying technology and infrastructure that enables them. The business and System Development Life Cycle (SDLC) team access the repository through an interactive user interface that displays information about: functional capabilities supported, business transactions required to provide those functions, systems that enable the business transactions, services invoked through end-to-end execution of systems, and dependent infrastructure including network components. Additionally, we will discuss how we are designing a solution that provides the mechanism for automated retrieval, population and refresh of deployed environment information.
Intended audience: CIO, CTO, Business and Development Managers and Architects Key takeaways: * Documenting your current IT environment using an integrated, model driven tool based approach. * Documenting your core business processes and mapping application portfolio to those processes * Assessing resilience by running a variety of impact analysis reports to identify weak areas or critical systems in your environment * Optimizing and align IT investment by assessing spend versus criticality * Combining the tooling analysis features with workspace support to compare architecture alternatives and determine optimal target state * Maintaining model and documentation accuracy by using automated application dependency and discovery tool Bio
Tolla Soto, Solution Architect and Systems Engineer, IBM
Tolla leverages her executive background in banking, eCommerce, Department of Defense and more, to provide her customers with proven best practices and methodologies enabled by IBM Software Group tooling solutions. She has a history of implementing IT and systems faster, cheaper and more efficiently for a wide range of industries.
During her engagements, she develops strategic and technology roadmaps specific to corporate goals, vision and business priorities. Tolla’s success of building actionable enterprise architectures is directly attributed to the development of long-term strategies and helping business units articulate their true business priorities within them. Much of her architecture work has been accomplished under the Zachman, TOGAF®, DoDAF and customized frameworks. To maintain an architecture, Tolla designs solutions to connect key enterprise domains - business, data, service oriented, and infrastructure architecture - to “one source of truth” repositories to ensure business and IT alignment refreshed by automation. | |
4:45–5:30 | Architecting the Cloud: Enterprise Architecture Patterns for Cloud Computing Beryl Bellman and Prakash Rao, FEAC InstituteArchitecting the Cloud: Enterprise Architecture Patterns for Cloud Computing
The Cloud Computing community has evolved through a combination of innovation, technology savvy and opportunistic embrace of a new promising technology. Cloud computing is impacting consumer computing as much as in academia, federal government, defense and in commercial companies. There are as many opinions and best practices out there as there are consultants out to make hay while the sun shines. TOGAF® and enterprise architecture frameworks such as the DoDAF/MODAF/Zachman represent a well-orchestrated, deliberate architecting method to plan complex and major IT investments and to get a handle on the various factors that can make or break a technology based initiative. In this presentation we show how we can systematically apply the concepts of architecting using Viewpoints, Views/Models, concerns and the use of common, standard architecture elements building reusable architectural patterns to the cloud initiative to reduce risks, improve planning and grab the technology advantage that cloud computing promises - for the cloud consumer, vendor, carrier, broker, auditor and other stakeholders.
Intended audience: Enteprise Architects, Chief Information Officers, Chief Technology Officers, Business Unit Officers, Chief Financial Officers, Cl Key takeaways:
1. Understand a clear framework for cloud planning that separates concerns and allows me to identify exactly what my concerns and needs are and how to plan for these.
2. Understand that attacking technology opportunities requires a planned strategy that must cover multiple viewpoints such as cost, revenues, risk, engineering, operations, technology standards and many others but there is a structured way to think about all of these and factor them into the planning. 3. Understand architectural patterns relevant to the various viewpoints to use for enterprise transformation using the cloud
Bio Beryl Bellman, PhD is co-founder and Academic Director of the FEAC™ Institute and is also a tenured full Professor of Communication at California State University at Los Angeles. He has been involved in teaching, research; publishing, consulting and project management in the fields of Enterprise Architecture and related work for over 40 years, and has an excellent reputation in both academe and professional consulting. He is TOGAF 8.1 and TOGAF 9 Certified Prakash Rao, VP & Chief Architect, Metadata Management
| ||
5:30 | Close |