Empower and support your organisation to deliver not just the ASD ACSC's Modern Defensible Architecture (MDA) itself but the critical artefacts and principles recommended to achieve the MDA in reality by leveraging Enterprise Security Architecture Principles.
Insights
TACO – Integrating Control Objectives for AI
The emergence of AI as a disruptive technology has spurred the development of standards and guidelines for the AI safety, security and responsible management but these do not align readily and an architectural model is required. Integrating these requirements in a Trusted AI Control Objectives (TACO) model supports an integrated compliance approach.
AI and the Role of the Enterprise Security Architect
Adopting an Architecture-first approach to Generative AI will go a long way to addressing its alignment with business requirements. Learn how using the SABSA methodology can enable secure, safe and responsible architectures to be modelled and applied in the businesses’ AI solutions.
Enterprise Security Architecture (ESA): What Is It and Why Is It (Really) Important?
What is “Architecture”? What is “An Architect” and what does an “Architect” do? And how does that relate to the “Enterprise” way of thinking to deliver business value particularly in the field of information/cyber security?
Competence is Value – Why Knowledge-based Training Falls Short
The roles of information security, risk management and assurance are vital to providing confidence and trust over our use of technology and information, and thus business ability to leverage them for opportunity and gain.
Leveraging Security Standards-based Knowledge
Security standards, in all their various shapes and forms, are often viewed as a deep well of compliance nit-noid details associated with ever-rising demands on resources and periodic compliance and audit agonies. But let’s step beyond the agony to recognize and make effective use of security standards as the rich source of security knowledge they represent.
The SABSA Modeller
Was it the SABSA Foundation Course that first drummed into me, a then transitioning security professional, the importance of “Context, context, context”?