90 likes | 198 Views
NERCOMP Security Architectures SIG. 24 September 2007 Worcester, MA. NERCOMP Security SIG Series. This SIG is part of the program of related Security SIGs being presented this year by NERCOMP. Agenda. 8:00am – 9:15 Registration and Coffee 9:15am – 9:30 Introductions, background
E N D
NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA
NERCOMP Security SIG Series • This SIG is part of the program of related Security SIGs being presented this year by NERCOMP.
Agenda 8:00am – 9:15 Registration and Coffee 9:15am – 9:30 Introductions, background 9:30 – 10:30 Meeting Needs of Higher Education 10:30 – 10:45 Break 10:45 – 12:00 Security Architecture: Art and Discipline 12:00 – 1:00 Lunch 1:00 – 2:15 Revisiting Authentication in the 21st Century 2:15 – 3:00 Panel: Questions and Answers 3:00 End
Meeting Needs of Higher Education Mark Poepping; Head IT Architect; Computing Services, Carnegie Mellon University “While security is essential to planning and managing effective information and network systems, IT infrastructure requires mapping the needs of business and the needs of user to facilitate and automate process and controls.”
Security Architecture: Art and Discipline Chris Misra, Network Analyst,University of Massachusetts – Amherst “Architecture is Sometimes Defined as 'The Art and Discipline of Creating or Inferring an Implied or Apparent Plan of Any Complex Object or System’. Given the complexity of modern IT infrastructures and the security challenges raised by the deployment of these, there is an ever growing need to consider not only the individual IT components, but how they relate and interoperate.”
Revisiting Authentication in the 21st Century Jeff Schiller, Network Manager/Security Architect, Massachusetts Institute of Technology
Upcoming Security SIGs • Security Technology • Monday, October 29, 2007 • UNH - Durham, NH • Security and Policy • Tuesday, February 5, 2008 • Holy Cross - Worcester, MA • Securing Communications • Tuesday, May 13 2008 • UMass - Amherst, MA (*)
Related Conferences • CAMP: Bridging Security and Identity Management • Tempe, AZ - Feb 2008 • http://www.educause.edu/camp081 • Security Professionals Conference • Washington, DC - May 2008 • http://www.educause.edu/securityconference
References • EDUCAUSE/Internet2 Security Task Force • http://www.educause.edu/security • Internet2 Security • http://security.internet2.edu/ • Effective Practices Guide • https://wiki.internet2.edu/confluence/display/secguide/Effective+IT+Security+Practices+and+Solutions+Guide