Gain an essential insight into the power of SABSA, the world’s most prevalent Enterprise Security Architecture framework and method.
This innovative and condensed one-day course delivers a jump-start to your Enterprise Security Architecture journey. Understand what SABSA is, the essentials of how it works, and why it is important. Evaluate first-hand the value that it can deliver to you, your career, and your wider organisation.
Learn how to change the security conversation and reframe the way we approach our work by transforming information / cyber security, architecture, and risk into Business-enabling, value-driven functions. Understand how to define requirements and articulate solutions value in clear business terms.
Critically and realistically evaluate the limitations of current checklist-based security practices and tactical solutions thinking. Take the first step in elevating your security to a new level and discover a better way to serve your customers in the age of ever-changing, hyper-connected, multi-dimensional complexity. Uncover how to be the difference that contributes to stakeholder success through this short introduction to a new approach of realising the business benefit, innovation, and adaptability demanded by stakeholders.
Course Outline
- Security and Enterprise Security Architecture
- Introduction to SABSA
- Principles, advantages, and benefits
- The framework for solving complex problems
- Traceability to enable business and inform solutions
- Security and Enterprise Security Architecture in Business Context
- Business-driven requirements
- SABSA Attributes: a normalised, measureable, common language for what’s important
- SABSA Domains: a normalised structure for accountability, authority, and ownership of what’s important
- Business-driven Governance, Risk, Compliance & Policy frameworks
- Calibrating and scaling the framework in a solutions context
- Practical traceability to demonstrate solutions value
- The role of dependency models
- Integrating and aligning security
- The integrated lifecycle
- Strategic, transformation & operation risk
- Where to start
- The security roadmap