1 / 9

NERCOMP Security Architectures SIG

NERCOMP Security Architectures SIG. 24 September 2007 Worcester, MA. NERCOMP Security SIG Series. This SIG is part of the program of related Security SIGs being presented this year by NERCOMP. Agenda. 8:00am – 9:15 Registration and Coffee 9:15am – 9:30 Introductions, background

Download Presentation

NERCOMP Security Architectures SIG

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA

  2. NERCOMP Security SIG Series • This SIG is part of the program of related Security SIGs being presented this year by NERCOMP.

  3. Agenda 8:00am – 9:15 Registration and Coffee 9:15am – 9:30 Introductions, background 9:30 – 10:30 Meeting Needs of Higher Education 10:30 – 10:45 Break 10:45 – 12:00 Security Architecture: Art and Discipline 12:00 – 1:00 Lunch 1:00 – 2:15 Revisiting Authentication in the 21st Century 2:15 – 3:00 Panel: Questions and Answers 3:00 End

  4. Meeting Needs of Higher Education Mark Poepping; Head IT Architect; Computing Services, Carnegie Mellon University “While security is essential to planning and managing effective information and network systems, IT infrastructure requires mapping the needs of business and the needs of user to facilitate and automate process and controls.”

  5. Security Architecture: Art and Discipline Chris Misra, Network Analyst,University of Massachusetts – Amherst “Architecture is Sometimes Defined as 'The Art and Discipline of Creating or Inferring an Implied or Apparent Plan of Any Complex Object or System’. Given the complexity of modern IT infrastructures and the security challenges raised by the deployment of these, there is an ever growing need to consider not only the individual IT components, but how they relate and interoperate.”

  6. Revisiting Authentication in the 21st Century Jeff Schiller, Network Manager/Security Architect, Massachusetts Institute of Technology

  7. Upcoming Security SIGs • Security Technology • Monday, October 29, 2007 • UNH - Durham, NH • Security and Policy • Tuesday, February 5, 2008 • Holy Cross - Worcester, MA • Securing Communications • Tuesday, May 13 2008 • UMass - Amherst, MA (*)

  8. Related Conferences • CAMP: Bridging Security and Identity Management • Tempe, AZ - Feb 2008 • http://www.educause.edu/camp081 • Security Professionals Conference • Washington, DC - May 2008 • http://www.educause.edu/securityconference

  9. References • EDUCAUSE/Internet2 Security Task Force • http://www.educause.edu/security • Internet2 Security • http://security.internet2.edu/ • Effective Practices Guide • https://wiki.internet2.edu/confluence/display/secguide/Effective+IT+Security+Practices+and+Solutions+Guide

More Related