cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog EN - Business & IT Transformation

Read expert views on the newest business and IT transformation trends.

How Nordea uses application management to achieve rationalisation

How Nordea uses application management to achieve rationalisation (1).jpg
Enterprise Architecture

Nordea is a leading European bank based in Finland. The uses an approach of inventory-to-application-to-management to move Application Management (AM) from unstructured to structured. This approach enables the institution's IT team to establish a way of working that achieves application rationalisation in order to assist the bank in its journey to reduce complexity and achieve overall IT cost reduction. 

Ben Beeching MEGA
6 May 2021
1
0
65

The Contribution of Sustainable Enterprise Architecture

The Contribution of  Sustainable Enterprise Architecture.jpg
Enterprise Architecture

The enterprises thriving tomorrow are practicing sustainable Enterprise Architecture (EA) today. How do the various layers of Enterprise Architecture contribute to sustainability?

Leslie ROBINET MEGA
22 April 2021
14
0
532

Edison - How to Assess and Manage Cybersecurity Risks

Edison - How to Assess and Manage Cybersecurity Risks.jpg
Enterprise Architecture

How can companies both manage cybersecurity risks and keep the business organized? Edison, a leading Italian company in the energy market has chosen MEGA as the main provider to manage risks and controls. Based in Milan, Edison employs 3,100 employees in more than 10 countries across Europe, Africa, and the Middle East,  

MEGA and Edison have behind them a long story of collaboration, which began in 2007 with the implementation of the HOPEX solution for Enterprise Architecture.

Alberto Diari MEGA
1 April 2021
2
0
243

Protect your IT assets: How IT compliance strengthens IT security

Protect your IT assets How IT compliance strengthens IT security.jpg
Risk Management

These are challenging times for IT departments today. On the one hand, they must deal with increasing threats of cyberattacks on their IT assets, while at the same time having to comply with a myriad of IT regulations and industry standards: PCI DSS, HIPAA, SOX, NIST, ISO 27001, COBIT, GDPR, just to name a few.

Cyril Amblard MEGA
12 March 2021
3
0
735

A tale of two CDOs: The converging roles of Chief Data Officers and Chief Digital Officers

A tale of two CDOs The converging roles of Chief Data Officers and Chief Digital Officers.jpg
Data Governance

Do you know what data you have to unlock within your organisation to get to the information you need? This is the question many Chief Data Officers find themselves asking their Chief Digital Officers on their first encounter. Yes, believe it or not, there is more than one CDO in your organisation, albeit with different but related data challenges.

Gerry Rankin
5 March 2021
1
0
185

Cybersecurity requires seeing the attacker’s point of view – and how IT Architecture achieves this

Cybersecurity requires seeing the attacker’s point of view – and how IT Architecture achieves this-min.jpg
Risk Management

If your data could be valuable to someone else, it’s likely that someone will try to find the vulnerabilities in your architecture. Before that happens, one of your best lines of defence will be to understand your own IT architecture better than they do.

Eugene McSheffrey MEGA
26 February 2021
2
0
323