cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog EN - Business & IT Transformation

Read expert views on the newest business and IT transformation trends.

Edison - How to Assess and Manage Cybersecurity Risks

Edison - How to Assess and Manage Cybersecurity Risks.jpg
Enterprise Architecture

How can companies both manage cybersecurity risks and keep the business organized? Edison, a leading Italian company in the energy market has chosen MEGA as the main provider to manage risks and controls. Based in Milan, Edison employs 3,100 employees in more than 10 countries across Europe, Africa, and the Middle East,  

MEGA and Edison have behind them a long story of collaboration, which began in 2007 with the implementation of the HOPEX solution for Enterprise Architecture.

Alberto Diari MEGA
1 April 2021
2
0
183

Protect your IT assets: How IT compliance strengthens IT security

Protect your IT assets How IT compliance strengthens IT security.jpg
Risk Management

These are challenging times for IT departments today. On the one hand, they must deal with increasing threats of cyberattacks on their IT assets, while at the same time having to comply with a myriad of IT regulations and industry standards: PCI DSS, HIPAA, SOX, NIST, ISO 27001, COBIT, GDPR, just to name a few.

Cyril Amblard MEGA
12 March 2021
3
0
538

A tale of two CDOs: The converging roles of Chief Data Officers and Chief Digital Officers

A tale of two CDOs The converging roles of Chief Data Officers and Chief Digital Officers.jpg
Data Governance

Do you know what data you have to unlock within your organisation to get to the information you need? This is the question many Chief Data Officers find themselves asking their Chief Digital Officers on their first encounter. Yes, believe it or not, there is more than one CDO in your organisation, albeit with different but related data challenges.

Gerry Rankin
5 March 2021
1
0
156

Cybersecurity requires seeing the attacker’s point of view – and how IT Architecture achieves this

Cybersecurity requires seeing the attacker’s point of view – and how IT Architecture achieves this-min.jpg
Risk Management

If your data could be valuable to someone else, it’s likely that someone will try to find the vulnerabilities in your architecture. Before that happens, one of your best lines of defence will be to understand your own IT architecture better than they do.

Eugene McSheffrey MEGA
26 February 2021
2
0
292

The 3 Lines Model: a revised approach to the IIA classic framework

The 3 Lines Model a revised approach to the IIA classic framework.jpg
Risk Management

In July 2020, the IIA - Institute of Internal auditors - published a revised version of its “3 Lines of Defense Model”, dropping the name “Defense” to reflect its now more inclusive nature under a new banner titled The 3 Lines Model. The update to this industry-standard is representative of a common trend in the market that requires a more encompassing and collaborative view of managing risks across an organization.

Cyril Amblard MEGA
17 February 2021 - updated on 16 March 2021
5
2
645

Move Enterprise Architecture into an Internal Management Consultancy Practice

Move Enterprise Architecture into an Internal Management Consultancy Practice.jpg
Enterprise Architecture

In the highly disruptive, agile environments that are at the core of most businesses today, enterprise architects should become business partners who facilitate digital business transformation.

Gabriel Gomane MEGA
3 February 2021
2
1
1425