BiZZdesign Blog

Education and inspiration for business transformation

 
 
Enterprise Risk Management Approach

posted by Rob Kroese on Jul 29, 2014

In a previous blog post, Marc Lankhorst discussed the value of EA in managing risk, compliance and security in the enterprise. He suggested a number of steps to take next; two of these steps are discussed in more detail in this blog:




Best Practices in low-tech Information Security measures

posted by Remco Blom on Jun 26, 2014

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

Sharing knowledge and good practices is one of the core values of BiZZdesign. We regularly organize and contribute to online and offline seminars, conferences and round tables sessions. Recently there was a very successful seminar on Enterprise Risk and Security Architecture for Dutch financial institutions.




Digital enterprise and change capability

posted by Mathilde Tempert on Jan 8, 2014

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

New technological developments emerge at an increasing pace.  Recent examples include Google Glass, Big Data, e-Coaching, wearables, 3D printing, Internet of Things etc. The potential is considered enormous, and expectations to derive value from these innovations are sky high.




Why settle for anything less than the truth?

posted by Stef Joosten on Dec 5, 2013

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

Many of you may be familiar with the problem. Especially if you use database applications in your everyday jobs. Sometimes the system stores things that are not entirely correct, or even blatantly untrue. Data pollution; that is what we call it. Sometimes you have to look really hard to find the real truth. If at all you can… Occasionally, you will find your entire department in total distress, if something big is at stake.




Influence vs. Force - Incenting Others to Get on Board with Your Architecture Initiatives

posted by Daniel Jumelet on Aug 31, 2013

Almost every architect has met the following frustrating experience during his career: A proper and well defined business case, architectural advice or Project Start Architecture is not being used by the organization the architect wanted to serve with it. Time and again we see decisions made based on:




BYOD – The Good, The Bad & The Ugly

posted by Ton Baas on May 26, 2013

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

Bring your own device, bring your own technology, bring your own phone or IT consumerisation (respectively BYOD, BYOT, BYOP). Whatever you want to call it, anno 2015 everybody knows the concept of bringing your privately owned device to access company information and applications.




Designing Secure Organizations: Risk Management, Enterprise Security Management and ArchiMate

posted by Henk Jonkers on Jan 23, 2013

No one is allowed to enter the building without proper authorization; all incoming e-mail messages are filtered; personal computers that are used to store sensitive data do not have a direct connection to the internet, and therefore cannot be accessed remotely. With these enterprise security rules, we have ensured that our private information is safe, right? Wrong! 




5 tips for better interview results

posted by Regina Wassink & Claudia Beemster on Oct 30, 2012

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts. 

Do you recognize the feeling that you did not fully receive or obtain the complete set of information in the meeting you just left? Then you know that asking the right questions is not always sufficient in order to get the desired answers. 




Are Direct Messages really private, or not?

posted by Wil Janssen on Jun 11, 2012

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

Social media have penetrated our lives. We share ideas, experiences, thought, complaints, and compliments with everybody. At the same time we see quite some controversy concerning the privacy policies of companies such as Facebook and Twitter. Some people even think that European privacy regulation does not apply to them, as they are US-based companies. 




Implementing a Data Governance Capability

posted by Bas van Gils on Mar 6, 2012

Welcome to our blog. This is an archived post, most of our knowledge and advice remain valid but some material or links may be outdated. Click here to see our most recent posts.

For many organizations, the big question is not if data is important, but how to manage it in order to be successful. Success, of course, is a big word and can mean different things to different people: from surviving in a highly competitive / regulated arena, to ceasing new market opportunities.