Cyber Security, Enterprise Architecture and Evidence Based Practice

Strategic design approach using semantics and best practice

Menu Skip to content
  • Home
  • About me
  • Useful Links
  • Video clips

Category: Frameworks

April 21, 2011February 21, 2016 Tolosa

Using controlled vocabularies and semantics to improve Enterprise Architecture repositories – principle 5

April 18, 2011April 22, 2011 Tolosa

Enterprise architecture development method – principle 2

April 17, 2011April 19, 2011 Tolosa

The role of an enterprise architecture repository – principle 1

April 7, 2011April 13, 2011 Tolosa

Supporting alternative decisions

March 8, 2011February 21, 2016 Tolosa

Enterprise Architecture value assurance

March 7, 2011February 21, 2016 Tolosa

Knowledge, Evidence and Architecture

Recent Posts

  • Business and Threat Assessments
  • Drivers, Goals, Objectives, Constraints and Concerns
  • Preparation for a cyber security strategy
  • A cyber security strategy, use case by use case.
  • The naked business…

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Categories

  • CERT (2)
  • Cyber Defence (7)
    • Cyber Defence Ontology (4)
    • Vulnerability Management (1)
  • Cyber Security (3)
  • Cyber Security Ontology (1)
  • Cyber Security Strategy (3)
  • Enterprise Architecture (41)
    • Architectural Statement of Work (1)
    • Business Strategy (10)
    • Enterprise Architecture Ontology (4)
    • Enterprise Architecture Repository (4)
    • Evidence Based Enterprise Architecture (30)
      • EBEA (6)
    • IEEE1471 (1)
    • TOGAF (3)
  • Enterprise Ontology (3)
  • Evidence (19)
    • Evidence Ontology (9)
  • Frameworks (6)
  • Information Management (7)
    • Content Authoring (1)
    • Controlled Vocabulary (2)
    • DITA (1)
    • Docbook (1)
    • Glossary (1)
  • Metadata (1)
  • Ontology (4)
    • OWL (2)
  • Principles (3)
  • Research (4)
  • RISK (1)
  • SABSA (1)
  • Semantic (5)
    • RDF (2)
  • Service Management (3)
    • ITIL (1)
    • ITIL Ontology (2)
  • strategy (1)
  • Threat (3)
    • Threat Actor (2)
  • Uncategorized (2)
  • Value (3)
    • Value Assurance (2)
  • XML (1)
    • XML Authoring (1)

Blogroll

  • Enterprise Irregulars
  • evidence soup
  • Mike the Architect
  • Simplicable blog
  • WordPress.org

Meta

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.com
Powered by WordPress.com.