SlideShare a Scribd company logo
4
Most read
Enterprise Architecture - Information Security
Insures & protects enterprises, their customers and facilitate Digital Transformation
Ajay Kumar Uppal
April 2020
1
Scope & Benefits Some of the Business Benefits of EA
IT Cost and Complexity Reduction as EA rationalizes processes,
& systems based on benchmarks, standards, experience and
reference security architecture..
Drive further Standardization and Risk Mitigation to maintain
consistent approach as opposed diverse/different/varied solutions
for the same problem.Idea is to stop having exotic solutions to a
common problem as these will increase security costs. Keeping
the cybersecurity spend/costs optimal by ensuring re-use of
existing tools, processes & chosen technologies all across units
/countries with mindset of consistent quality & accruing savings
from economies of scale.
Ensure ‘Fit-for -Future’ architecture as opposed to fault-prone
quick-fix (fit- for- purpose) & helps in earning trust of
consumers/partners when it comes to introducing new channels.
Work collaboratively with business heads and users to ensure all
systems are compliant with regulations ( PCI:DSS,
GDPR,ISO:27001, DPA etc) and there are no penalties, no fines,
no bad/negative publicity that can result in reputational losses
Produce ‘What if’ analysis, provide better & 360 deg visibility when
it comes to impact analysis of change(s). Accurate impact analysis
will help in managing showstoppers (like lack of security) during
projects.
Promotes innovation, creativity and transform Enterprise in
secure manner by creating common insights and overviews of
relationships and interdependencies to reduce miscommunication
and misunderstandings. And take/make decisions with
confidence.
EA-InfoSec (Enterprise Architecture- Information
Security) will ensure that Enterprise’s Cybersecurity is
always business risk-based and compliance driven..
2
Trends/Challenges & Approaches
Cyber insurance will continue to grow as a valid alternative to mitigate loss
3
Trends/Challenges Approaches
Business Continuity Planning & DR in wake of Covid-19 as social-
distancing and work-from-home will become a new norm.
Enterprise Security Architect in consultation with business to keep the
runbook for BCP and DR ready for such(Covid-19) global events.
As a fallout of Covid-19, Identity Thefts, Phishing attacks, Malspams
and ransomware attacks are increasing and will definitely result in
infected end-user / personal devices.
Promote Analytics & AI to automate security processes and harness
threat intelligence from multiple sources and Identify threats before they
impact our users, networks, devices or/andr business
Use of Agile / DevOps; to quickly deal with real-time changes in buying
pattern of consumers/businesses as consumers are changing from 'in-
branch'/ 'on-phone'/ ''agent' to online purchase through comparison
portals; is making architecture complex & difficult to secure.
Move from DevOps to DevSecOps mindset and incorporate threat
policies /models, threat intelligence, code reviews, continuous
monitoring, detection, protection, response and recovery mechanisms/
processes/ tools.
Management overhead associated with incoming internet traffic, Cloud
Security, Identity Access Management (IAM) and Data Loss Prevention
(DLP) especially in hybrid landscapes comprising on-premise & cloud
hosted systems .
Leverage cloud automation solutions that address many common cloud
security concerns, enable more stringent quality checks to identify
vulnerabilities, automate deployment to unburden staff,
Deception Technologies: Cybercriminals attempting to access legitimate
user identities by introducing fake credentials into an organization's
network.
Behavioural Analytics/ AI: Using machine learning (M/L) to analyze
user activities in order to predict whether or not an access attempt is
indeed from the user.
Risk management and privacy concerns in digital transformation are
expected to drive additional security service spending through 2020 for
more than 40% of organizations.
Investment in CyberSecurity & fraud protection have become paramount
and special focus should be on NIST, ITVA, Penetration Testing, Vaults,
Security & Risk assessments to plug gaps.
Security Architecture Operating Model
EAs will launch an enterprise-wide Architecture Review Board and also
introduce a simple to follow Architecture Review / Exception Certificate.for
all projects/programmes and initiative on the go and those being planned.
Will participate/ engage with procurement teams to influence IT
budgets/spends for cybersecurity products/services..
4
Enterprise
Architect -InfoSec
Enterprise
Architect - InfoSec
Domain,
Solution &
Security
Architects
CEO, CTO, CISO,
COO, EAs,
Business, Users,
Consumers &
Partners
COO
Security
DevSecOps
In consultation with CISO, EA colleagues, EA-InfoSec
will formally embrace one or mix of the cybersecurity
frameworks like COBIT5, SABSA, ECF etc and utilise
findings from NIST & other assessments. EA-InfoSec
Will produce, own and maintain enterprise security
roadmap for Enterprise.
Will socialise, publish and enforce security
architectural principles & guidelines and overcome
friction from distributed ICT / Program Teams across
various countries/units
Will lead the Security SMEs job-family across
Enterprise
Thanks…. and steps / thoughts going forward
Cloud
Computing: SaaS,
PaaS, IaaS
Mobility is
increasing
Convenience and
Integration (User
Configured)
Business Analytics
is Growing
Social Media is
Growing
A key challenge for insurance sector is to adopt an appropriate sourcing and service delivery model able
to adopt/adapt digital innovations while maintaining the security, integrity and efficiency of the estate
5
Engage/ Meet/ Analyse Stakeholders - EAs, CISO, COO, Service Delivery, PMs, Procurement
Draw up organisation map, RACI and understand internal dynamics
Study/research information to understand company’s business & ICT Strategy
Determine time that I am expected to spend on strategic versus tactical subjects
Connect plans explicitly to the organization’s strategic investment objectives,
Create team by leveraging existing heads i.e. from job family of security architects/SMEs
Finalise governance, frameworks and processes to provide structure to the EA practice .
Develop understanding of AS-IS enterprise architecture with focus on Security.
Leverage existing /conduct Maturity Assessment to determine areas of improvements
Work on TO-BE architecture & 12-18 month Roadmap for aligning with company’s goals.
Communicate/socialise the business value of EA to stakeholders to establish credibility
Seek feedback on Roadmap and TO-BE architecture from peers i.e. EAs and select architects.
Finalise and present Roadmap to COO, CISO and other senior stakeholders to seek buy-in.
Define execution process, showing how we move from business strategy through the individual
initiatives and projects that support it.
Finalise portfolio of projects in consultation with business, other EAs, COO and CISO
Evangelise the plan for deploying portfolio of projects to PMs, Solution/Domain Architects
Act as point of escalation and also guide/coach project teams to ensure adherence to standards.
Monitor progress of key/mission critical initiatives/projects
Establish SMART metrics, KPIs, ARBs, CABs, to track the progress & performance of the EA
practice
This is what I want to do and achieve in first 100 days of joining

More Related Content

PDF
Enterprise Security Architecture
PDF
Enterprise Security Architecture for Cyber Security
PDF
Enterprise Security Architecture
PPTX
Adaptive Enterprise Security Architecture
PPTX
SABSA Implementation(Part VI)_ver1-0
PPTX
ISO 27001 Awareness/TRansition.pptx
PPTX
Modelling Security Architecture
PPTX
Enterprise Security Architecture Design
Enterprise Security Architecture
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture
Adaptive Enterprise Security Architecture
SABSA Implementation(Part VI)_ver1-0
ISO 27001 Awareness/TRansition.pptx
Modelling Security Architecture
Enterprise Security Architecture Design

What's hot (20)

PDF
Practical Enterprise Security Architecture
PPTX
SABSA Implementation(Part V)_ver1-0
PPTX
SABSA Implementation(Part III)_ver1-0
PDF
SABSA: Key features, advantages & benefits summary
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PDF
Cyber Security Governance
PPTX
Security models for security architecture
PPTX
Enterprise Security Architecture
PDF
Why ISO27001 For My Organisation
PDF
Building an effective Information Security Roadmap
PPTX
Project plan for ISO 27001
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Steps to iso 27001 implementation
PPTX
SABSA overview
PPTX
SABSA Implementation(Part IV)_ver1-0
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PDF
Security review using SABSA
PPSX
Next-Gen security operation center
PPTX
Conceptual security architecture
PDF
Security-by-Design in Enterprise Architecture
Practical Enterprise Security Architecture
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part III)_ver1-0
SABSA: Key features, advantages & benefits summary
SABSA vs. TOGAF in a RMF NIST 800-30 context
Cyber Security Governance
Security models for security architecture
Enterprise Security Architecture
Why ISO27001 For My Organisation
Building an effective Information Security Roadmap
Project plan for ISO 27001
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Steps to iso 27001 implementation
SABSA overview
SABSA Implementation(Part IV)_ver1-0
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Security review using SABSA
Next-Gen security operation center
Conceptual security architecture
Security-by-Design in Enterprise Architecture
Ad

Similar to Business value of Enterprise Security Architecture (20)

PDF
Ciso organizational priorities to build a resilient bimodal it
PDF
New technologies - Amer Haza'a
DOCX
Michael Bowers Resume
DOCX
general_resume_12 1 linked in
PDF
Security of the future - Adapting Approaches to What We Need
DOCX
CV of Mohan M
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
Responding to the Pandemic: Information Security and Technology Trends
PDF
Applying Lean for information security operations centre
PDF
IT Guide for Mobility: Making the case for Security leaders
PDF
Business Intelligence Productionization
PDF
2024-gartner-top-strategic-technology-trends-ebook.pdf
PDF
Enterprise Information Security Architecture_Paper_1206
PDF
The path to self disruption: Nine steps of a digital transformation journey
DOC
MullaneyChrisER
PPT
How Do You Create A Successful Information Security Program Hire A Great Iso!!
PPTX
Adaptable Architecture – the Backbone of Digital Business Models
PDF
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
PPTX
What are the key cybersecurity KPIs that businesses.pptx
PDF
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Ciso organizational priorities to build a resilient bimodal it
New technologies - Amer Haza'a
Michael Bowers Resume
general_resume_12 1 linked in
Security of the future - Adapting Approaches to What We Need
CV of Mohan M
Does Anyone Remember Enterprise Security Architecture?
Responding to the Pandemic: Information Security and Technology Trends
Applying Lean for information security operations centre
IT Guide for Mobility: Making the case for Security leaders
Business Intelligence Productionization
2024-gartner-top-strategic-technology-trends-ebook.pdf
Enterprise Information Security Architecture_Paper_1206
The path to self disruption: Nine steps of a digital transformation journey
MullaneyChrisER
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Adaptable Architecture – the Backbone of Digital Business Models
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
What are the key cybersecurity KPIs that businesses.pptx
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Ad

More from Ajay Kumar Uppal (20)

PDF
Microservices for Application Modernisation
PDF
Sap on aws cloud technology proposition
PDF
Sap sap hana s4 on cloud
PPTX
Sap sap hana s4 on cloud
PDF
Enterprise Architecture - Information Security
PPTX
Cloud proposition for banking
PDF
Cloud dev ops costs prices sap hana ms
PDF
S 4 HANA 4 CEOs and CFOs
PDF
SAP Configuration Data
PPTX
BW on HANA optimisation answers
PPTX
Cio forum s4hana
PPTX
Business case for SAP HANA
PPTX
Cloud, big data, sap, hana, iot, ms azure & way forward
PDF
ICT strategy and architecture principles by ajay kumar uppal
PDF
Architecture review certificate generation of client files
PDF
Cutover strategy - Legacy to new billing, invoicing engine
PDF
Data migration blueprint legacy to sap
PPTX
End to end business transformation
PPT
Consolidating the Application Landscape
PPTX
Cloud centric consumption based services for SAP, HANA, Concur, Ariba, C4C
Microservices for Application Modernisation
Sap on aws cloud technology proposition
Sap sap hana s4 on cloud
Sap sap hana s4 on cloud
Enterprise Architecture - Information Security
Cloud proposition for banking
Cloud dev ops costs prices sap hana ms
S 4 HANA 4 CEOs and CFOs
SAP Configuration Data
BW on HANA optimisation answers
Cio forum s4hana
Business case for SAP HANA
Cloud, big data, sap, hana, iot, ms azure & way forward
ICT strategy and architecture principles by ajay kumar uppal
Architecture review certificate generation of client files
Cutover strategy - Legacy to new billing, invoicing engine
Data migration blueprint legacy to sap
End to end business transformation
Consolidating the Application Landscape
Cloud centric consumption based services for SAP, HANA, Concur, Ariba, C4C

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Hybrid model detection and classification of lung cancer
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
A Presentation on Touch Screen Technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
Hybrid model detection and classification of lung cancer
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A comparative study of natural language inference in Swahili using monolingua...
Group 1 Presentation -Planning and Decision Making .pptx
A novel scalable deep ensemble learning framework for big data classification...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Presentation on Touch Screen Technology
OMC Textile Division Presentation 2021.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 5: Probability Theory and Statistics
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Tartificialntelligence_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence

Business value of Enterprise Security Architecture

  • 1. Enterprise Architecture - Information Security Insures & protects enterprises, their customers and facilitate Digital Transformation Ajay Kumar Uppal April 2020 1
  • 2. Scope & Benefits Some of the Business Benefits of EA IT Cost and Complexity Reduction as EA rationalizes processes, & systems based on benchmarks, standards, experience and reference security architecture.. Drive further Standardization and Risk Mitigation to maintain consistent approach as opposed diverse/different/varied solutions for the same problem.Idea is to stop having exotic solutions to a common problem as these will increase security costs. Keeping the cybersecurity spend/costs optimal by ensuring re-use of existing tools, processes & chosen technologies all across units /countries with mindset of consistent quality & accruing savings from economies of scale. Ensure ‘Fit-for -Future’ architecture as opposed to fault-prone quick-fix (fit- for- purpose) & helps in earning trust of consumers/partners when it comes to introducing new channels. Work collaboratively with business heads and users to ensure all systems are compliant with regulations ( PCI:DSS, GDPR,ISO:27001, DPA etc) and there are no penalties, no fines, no bad/negative publicity that can result in reputational losses Produce ‘What if’ analysis, provide better & 360 deg visibility when it comes to impact analysis of change(s). Accurate impact analysis will help in managing showstoppers (like lack of security) during projects. Promotes innovation, creativity and transform Enterprise in secure manner by creating common insights and overviews of relationships and interdependencies to reduce miscommunication and misunderstandings. And take/make decisions with confidence. EA-InfoSec (Enterprise Architecture- Information Security) will ensure that Enterprise’s Cybersecurity is always business risk-based and compliance driven.. 2
  • 3. Trends/Challenges & Approaches Cyber insurance will continue to grow as a valid alternative to mitigate loss 3 Trends/Challenges Approaches Business Continuity Planning & DR in wake of Covid-19 as social- distancing and work-from-home will become a new norm. Enterprise Security Architect in consultation with business to keep the runbook for BCP and DR ready for such(Covid-19) global events. As a fallout of Covid-19, Identity Thefts, Phishing attacks, Malspams and ransomware attacks are increasing and will definitely result in infected end-user / personal devices. Promote Analytics & AI to automate security processes and harness threat intelligence from multiple sources and Identify threats before they impact our users, networks, devices or/andr business Use of Agile / DevOps; to quickly deal with real-time changes in buying pattern of consumers/businesses as consumers are changing from 'in- branch'/ 'on-phone'/ ''agent' to online purchase through comparison portals; is making architecture complex & difficult to secure. Move from DevOps to DevSecOps mindset and incorporate threat policies /models, threat intelligence, code reviews, continuous monitoring, detection, protection, response and recovery mechanisms/ processes/ tools. Management overhead associated with incoming internet traffic, Cloud Security, Identity Access Management (IAM) and Data Loss Prevention (DLP) especially in hybrid landscapes comprising on-premise & cloud hosted systems . Leverage cloud automation solutions that address many common cloud security concerns, enable more stringent quality checks to identify vulnerabilities, automate deployment to unburden staff, Deception Technologies: Cybercriminals attempting to access legitimate user identities by introducing fake credentials into an organization's network. Behavioural Analytics/ AI: Using machine learning (M/L) to analyze user activities in order to predict whether or not an access attempt is indeed from the user. Risk management and privacy concerns in digital transformation are expected to drive additional security service spending through 2020 for more than 40% of organizations. Investment in CyberSecurity & fraud protection have become paramount and special focus should be on NIST, ITVA, Penetration Testing, Vaults, Security & Risk assessments to plug gaps.
  • 4. Security Architecture Operating Model EAs will launch an enterprise-wide Architecture Review Board and also introduce a simple to follow Architecture Review / Exception Certificate.for all projects/programmes and initiative on the go and those being planned. Will participate/ engage with procurement teams to influence IT budgets/spends for cybersecurity products/services.. 4 Enterprise Architect -InfoSec Enterprise Architect - InfoSec Domain, Solution & Security Architects CEO, CTO, CISO, COO, EAs, Business, Users, Consumers & Partners COO Security DevSecOps In consultation with CISO, EA colleagues, EA-InfoSec will formally embrace one or mix of the cybersecurity frameworks like COBIT5, SABSA, ECF etc and utilise findings from NIST & other assessments. EA-InfoSec Will produce, own and maintain enterprise security roadmap for Enterprise. Will socialise, publish and enforce security architectural principles & guidelines and overcome friction from distributed ICT / Program Teams across various countries/units Will lead the Security SMEs job-family across Enterprise
  • 5. Thanks…. and steps / thoughts going forward Cloud Computing: SaaS, PaaS, IaaS Mobility is increasing Convenience and Integration (User Configured) Business Analytics is Growing Social Media is Growing A key challenge for insurance sector is to adopt an appropriate sourcing and service delivery model able to adopt/adapt digital innovations while maintaining the security, integrity and efficiency of the estate 5 Engage/ Meet/ Analyse Stakeholders - EAs, CISO, COO, Service Delivery, PMs, Procurement Draw up organisation map, RACI and understand internal dynamics Study/research information to understand company’s business & ICT Strategy Determine time that I am expected to spend on strategic versus tactical subjects Connect plans explicitly to the organization’s strategic investment objectives, Create team by leveraging existing heads i.e. from job family of security architects/SMEs Finalise governance, frameworks and processes to provide structure to the EA practice . Develop understanding of AS-IS enterprise architecture with focus on Security. Leverage existing /conduct Maturity Assessment to determine areas of improvements Work on TO-BE architecture & 12-18 month Roadmap for aligning with company’s goals. Communicate/socialise the business value of EA to stakeholders to establish credibility Seek feedback on Roadmap and TO-BE architecture from peers i.e. EAs and select architects. Finalise and present Roadmap to COO, CISO and other senior stakeholders to seek buy-in. Define execution process, showing how we move from business strategy through the individual initiatives and projects that support it. Finalise portfolio of projects in consultation with business, other EAs, COO and CISO Evangelise the plan for deploying portfolio of projects to PMs, Solution/Domain Architects Act as point of escalation and also guide/coach project teams to ensure adherence to standards. Monitor progress of key/mission critical initiatives/projects Establish SMART metrics, KPIs, ARBs, CABs, to track the progress & performance of the EA practice This is what I want to do and achieve in first 100 days of joining

Editor's Notes

  • #2: And how Enterprise Security Architecture that encompasses set of tools (products) and policies, principles and technology guidelines ( portfolio of services ) protects enterprises, you, me, colleagues, customers and their assets (i.e. devices, data, networks, DCs etc) but also how enterprise security architecture can accelerate your digital transformation initiatives—and implement them with confidence.
  • #3: EA is all about ‘facilitating right things’ and making not-so-right-things’ difficult and avoiding ‘wrong things’. Every new process, new service, new systems or new channel that is not adding value to the business model or strategy, will be stopped. This reduces complexity significantly and with that increases stability and overall quality. Having more overviews and insights in dependencies and interrelationships will reduce costs. The less diverse an IT landscape is, and the fewer relationships or interfaces there, the less complex the IT landscape is. Lower complexity leads to higher availability, an improved way of working of the IT landscape and much fewer risks it will fail. EA creates common insights and overviews of relationships and interdependencies. This leads to reducing miscommunication and misunderstandings. And also more confidence in making a decision. Customer data confidentiality, integrity, systems availability, secure access control, encryption, data tokenisation / masking,, fraud detection/protection , identity theft protection etc. are all features that consumers, partners and eco-system appreciate and look into before doing business e.g buying insurance policy online or through agent or other channel. The fundamental lean redesign of chains of activities, complex services and products requires global and detailed insights and overviews. Architecture visualization can quickly provide information on the impact of change a redesign of a process, service or product has. When processes are improved, fewer mistakes are made, resources are used more efficient and effective and customers and clients immediately will experience the improvement.
  • #4: Protecting enterprises from cyber-attacks has become insanely complex. New threats, new attackers, new regulations, new risks, and an ever-growing number of endpoint devices, networks, systems, clouds, end users and supply chain partners to protect—not to mention the upward spiral in cybersecurity products, solutions, services and vendors, coupled with an ever-decreasing supply of skilled security talent—just keeping pace is a daunting task.