Cyber Security, Enterprise Architecture and Evidence Based Practice

Strategic design approach using semantics and best practice

Menu Skip to content
  • Home
  • About me
  • Useful Links
  • Video clips

Category: Cyber Defence

June 10, 2017June 10, 2017 Tolosa

Business and Threat Assessments

April 17, 2014June 10, 2017 Tolosa

Applying evidence of risk to support architectural design and change

April 16, 2014June 9, 2017 Tolosa

Cyber Security Ontology and Cyber Defence Ontology

April 13, 2014June 9, 2017 Tolosa

SecONT 2014 Workshop on Security Ontologies and Taxonomies

April 13, 2014April 16, 2014 Tolosa

How Ontologies Can Help Build a Science of Cyber Security

April 10, 2014June 9, 2017 Tolosa

Applying evidence of vulnerabilities to support architectural design and change

March 26, 2014April 13, 2014 Tolosa

Building an Evidence Ontology

Recent Posts

  • Business and Threat Assessments
  • Drivers, Goals, Objectives, Constraints and Concerns
  • Preparation for a cyber security strategy
  • A cyber security strategy, use case by use case.
  • The naked business…

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Categories

  • CERT (2)
  • Cyber Defence (7)
    • Cyber Defence Ontology (4)
    • Vulnerability Management (1)
  • Cyber Security (3)
  • Cyber Security Ontology (1)
  • Cyber Security Strategy (3)
  • Enterprise Architecture (41)
    • Architectural Statement of Work (1)
    • Business Strategy (10)
    • Enterprise Architecture Ontology (4)
    • Enterprise Architecture Repository (4)
    • Evidence Based Enterprise Architecture (30)
      • EBEA (6)
    • IEEE1471 (1)
    • TOGAF (3)
  • Enterprise Ontology (3)
  • Evidence (19)
    • Evidence Ontology (9)
  • Frameworks (6)
  • Information Management (7)
    • Content Authoring (1)
    • Controlled Vocabulary (2)
    • DITA (1)
    • Docbook (1)
    • Glossary (1)
  • Metadata (1)
  • Ontology (4)
    • OWL (2)
  • Principles (3)
  • Research (4)
  • RISK (1)
  • SABSA (1)
  • Semantic (5)
    • RDF (2)
  • Service Management (3)
    • ITIL (1)
    • ITIL Ontology (2)
  • strategy (1)
  • Threat (3)
    • Threat Actor (2)
  • Uncategorized (2)
  • Value (3)
    • Value Assurance (2)
  • XML (1)
    • XML Authoring (1)

Blogroll

  • Enterprise Irregulars
  • evidence soup
  • Mike the Architect
  • Simplicable blog
  • WordPress.org

Meta

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.com
Powered by WordPress.com.