This article examines the convergence of enterprise architecture and cybersecurity, highlighting the growing importance of cybersecurity, the interplay between EA and cybersecurity, best practices for creating a secure architecture, and key takeaways.
March 1, 2024 in Cybersecurity, Enterprise architecture, Digital Transformation7 minutes
This article explores the risks posed by shadow IT - the use of unauthorized software and systems within an organization. It provides CIO strategies to identify, assess, mitigate, monitor and respond to shadow IT risks across the risk lifecycle to boost data security, compliance and efficiency.
February 14, 2024 in CIO, Information Security5 minutes