nercomp security architectures sig

9
NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA

Upload: montana-irwin

Post on 30-Dec-2015

21 views

Category:

Documents


0 download

DESCRIPTION

NERCOMP Security Architectures SIG. 24 September 2007 Worcester, MA. NERCOMP Security SIG Series. This SIG is part of the program of related Security SIGs being presented this year by NERCOMP. Agenda. 8:00am – 9:15Registration and Coffee 9:15am – 9:30 Introductions, background - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: NERCOMP  Security Architectures SIG

NERCOMP Security Architectures SIG

24 September 2007

Worcester, MA

Page 2: NERCOMP  Security Architectures SIG

NERCOMP Security SIG Series

• This SIG is part of the program of related Security SIGs being presented this year by NERCOMP.

Page 3: NERCOMP  Security Architectures SIG

Agenda8:00am – 9:15 Registration and Coffee9:15am – 9:30 Introductions, background9:30 – 10:30 Meeting Needs of Higher Education10:30 – 10:45 Break10:45 – 12:00 Security Architecture: Art and

Discipline

12:00 – 1:00 Lunch1:00 – 2:15 Revisiting Authentication in the 21st

Century2:15 – 3:00 Panel: Questions and Answers3:00 End

Page 4: NERCOMP  Security Architectures SIG

Meeting Needs of Higher Education

Mark Poepping; Head IT Architect; Computing Services, Carnegie Mellon University

“While security is essential to planning and managing effective information and network systems, IT infrastructure requires mapping the needs of business and the needs of user to facilitate and automate process and controls.”

Page 5: NERCOMP  Security Architectures SIG

Security Architecture: Art and Discipline

Chris Misra, Network Analyst,University of Massachusetts – Amherst“Architecture is Sometimes Defined as 'The Art and Discipline of Creating or Inferring an Implied or Apparent Plan of Any Complex Object or System’. Given the complexity of modern IT infrastructures and the security challenges raised by the deployment of these, there is an ever growing need to consider not only the individual IT components, but how they relate and interoperate.”

Page 6: NERCOMP  Security Architectures SIG

Revisiting Authentication in the 21st Century

Jeff Schiller, Network Manager/Security Architect, Massachusetts Institute of Technology

Page 7: NERCOMP  Security Architectures SIG

Upcoming Security SIGs

• Security Technology– Monday, October 29, 2007– UNH - Durham, NH

• Security and Policy– Tuesday, February 5, 2008– Holy Cross - Worcester, MA

• Securing Communications– Tuesday, May 13 2008– UMass - Amherst, MA (*)

Page 8: NERCOMP  Security Architectures SIG

Related Conferences

• CAMP: Bridging Security and Identity Management– Tempe, AZ - Feb 2008– http://www.educause.edu/camp081

• Security Professionals Conference– Washington, DC - May 2008– http://www.educause.edu/securityconference

Page 9: NERCOMP  Security Architectures SIG

References

• EDUCAUSE/Internet2 Security Task Force– http://www.educause.edu/security

• Internet2 Security– http://security.internet2.edu/

• Effective Practices Guide– https://wiki.internet2.edu/confluence/display/

secguide/Effective+IT+Security+Practices+and+Solutions+Guide