Agile Techniques, Cyber Attacks, and the Four C’s
In this episode of Real Talk, we explore the correlation, causation, coincidence, and/or contribution to the increase in cyber attacks of all kinds and the increase in the use of agile techniques in technology. We begin by stating a scientific hypothesis and then exploring the four C’s. This is a status report on this research.
Category
- Agility
- Architecture Models
- Architecture Views
- Artificial Intelligence
- Assemble to Order
- BTP
- Benefits
- Big Data
- Bill of Materials
- Book
- Business Architect
- Business Architecture
- Business Architecture Framework
- Business Architecture Participants
- Business Architecture Tools
- Business Capability
- Capabilities
- Capability Ability
- Certification
- Certification Levels
- Certification Mistakes
- Change Management
- Checklist
- Cloud
- Cloud Decommission
- Coding
- Communication
- Competition
- Complexity
- Confirmation Bias
- Consulting
- Cybersecurity
- Data
- Data Architecture
- Data Lake
- Data Modeling
- Data Sludge
- Data Swamp
- Differentiators
- Digital Transformation
- Distance Learning
- Enterprise Architect
- Enterprise Architecture
- Enterprise Architecture Framework
- Enterprise Architecture Participants
- Enterprise Architecture Tools
- Evaluation Checklist
- Evaluation Criteria
- Event Model
- Experiences needed