NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA.

Slides:



Advertisements
Similar presentations
Welcome to the ALO Breakfast Agenda Breakfast Introductions Substantive Change Update Potential ALO Screen on MSCHE System.
Advertisements

|epcc| NeSC Workshop Open Issues in Grid Scheduling Ali Anjomshoaa EPCC, University of Edinburgh Tuesday, 21 October 2003 Overview of a Grid Scheduling.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Nigel Titley. RIPE 54, 9 May 2007, Tallinn, Estonia. 1 RIPE NCC Certification Task Force Update Presented by Nigel Titley RIPE NCC.
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
Collecting and Managing Network Traffic Data February 8, 2005
My School-Tech Roadmap Principal’s Name Name of School School Location.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
Global Service Institute Center for Social Development Washington University in St. Louis Toward a Global Research Agenda on Civic Service: An International.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
1 SOA Essentials: What Department Heads Need to Know Featuring expert panel discussion and collaboration demonstration. Dr. Brand Niemann, US EPA Senior.
Security Extensions to the DOD Architecture Framework Kevin Richardson Information Assurance Lab Auburn University Computer Science and Software Engineering.
OKI Focus Groups at Educause, October 2002 Page 1 Open Knowledge Initiative Educause Focus Group Geoff Collier and Robby Robson, Eduworks Educause 2002,
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets.
Welcome to CAMP Leveraging Campus Authentication Across Boundaries Workshop Ann West NMI-EDIT Outreach Michigan Tech/EDUCAUSE/Internet2.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Identity and Access Management Business Ready Security Solutions.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Wayne RESA Instructional Technology Leaders
Welcome to CAMP: Charting Your Authentication Roadmap Mike Grady Senior Technology Architect and Strategist Campus Information Technologies and Educational.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
 Web 2.0 Technologies: MCH New Media John Richards Georgetown University.
SCSC 311 Information Systems: hardware and software.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Current challenges for health systems Increasing elderly population –Relative decrease in resources (fewer taxpayers), chronic patients Financial sustainability.
Primary ICT Technicians Meeting 12 th June 2008 Introduction Andy Macfarlane ICT Network Manager Supporting Clanfield Junior, Meadowlands Infant, Meadowlands.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Rich Kogut October, 2002 IT Vision/Strategy Working Presentation.
June 2005 Registration Management Committee (RMC) Meeting June Savannah, GA.
Summer 2012: Welcome Eric Boyd, Internet2 & Phil DeMar, Fermilab.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Adolescents and Literacy: Reading in the 21st Century Michael L. Kamil Stanford University.
Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.
Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.
Self-Organizing Architectures SOAR 2010 International Conference on Autonomic Computing and Communication, ICAC Washington DC, USA June 7, 2010.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Welcome to the Minnesota SharePoint User Group August 13 th, 2008 Open Panel Discussion Wes Preston, Todd Klindt, Neil Iversen,
A Word from the Sponsors NMI-EDIT comprises Internet2 and EDUCAUSE –NSF Middleware Initiative (NMI)-Enterprise and Desktop Integration Technologies Consortium.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council.
How to: Make the business case for your project How the guide came to be Working partners Funding partners.
® IBM Software Group © 2009 IBM Corporation Essentials of Modeling with IBM Rational Software Architect V7.5 Module 0: About This Course.
CAMP Wrap-up: Identity Management Resources from NMI-EDIT.
Network Architecture and Security Ten Years Out Internet2 Member Meeting; Fall 2005 Deke Kassabian – University of Pennsylvania Mark Poepping – Carnegie.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
1 UMOL Users Group February 19, Agenda New Faces at UMOL Campus Updates Courses, enrollments, outstanding issues UMOL Updates Next steps Library.
Service Catalog Best Practices for Higher Ed
EDUCAUSE/Internet2 Computer & Network Security Task Force
Cross-sector and user-centric AAI
TNC17 TNE SIG Meeting #1 Technical Barriers William Wan CERNET.
Grid Computing Course Development team: Barry Wilkinson and Clayton Ferner (Instructors), and Mark Holliday Student assistants: Jeff House and Sam Daoud.
If you think you can analyze JUST ONE of these data sets
Mark Poepping, SALSA Chair
Protecting Network Assets
Inter-American Network for Cooperation on Family Law
Workshop Day 1, 7/24 Technical Essential: Introduction of AWS Product, Service, and Business Decision Making Using Amazon Web Service Time Topic 09:00-09:30.
Environmental Public Health Leadership Institute
APEC Conference on Innovation and Trade
Presentation transcript:

NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA

NERCOMP Security SIG Series This SIG is part of the program of related Security SIGs being presented this year by NERCOMP.

Agenda 8:00am – 9:15Registration and Coffee 9:15am – 9:30 Introductions, background 9:30 – 10:30 Meeting Needs of Higher Education 10:30 – 10:45Break 10:45 – 12:00Security Architecture: Art and Discipline 12:00 – 1:00Lunch 1:00 – 2:15 Revisiting Authentication in the 21st Century 2:15 – 3:00 Panel: Questions and Answers 3:00End

Meeting Needs of Higher Education Mark Poepping; Head IT Architect; Computing Services, Carnegie Mellon University “While security is essential to planning and managing effective information and network systems, IT infrastructure requires mapping the needs of business and the needs of user to facilitate and automate process and controls.”

Security Architecture: Art and Discipline Chris Misra, Network Analyst,University of Massachusetts – Amherst “Architecture is Sometimes Defined as 'The Art and Discipline of Creating or Inferring an Implied or Apparent Plan of Any Complex Object or System’. Given the complexity of modern IT infrastructures and the security challenges raised by the deployment of these, there is an ever growing need to consider not only the individual IT components, but how they relate and interoperate.”

Revisiting Authentication in the 21st Century Jeff Schiller, Network Manager/Security Architect, Massachusetts Institute of Technology

Upcoming Security SIGs Security Technology –Monday, October 29, 2007 –UNH - Durham, NH Security and Policy –Tuesday, February 5, 2008 –Holy Cross - Worcester, MA Securing Communications –Tuesday, May –UMass - Amherst, MA (*)

Related Conferences CAMP: Bridging Security and Identity Management –Tempe, AZ - Feb 2008 – Security Professionals Conference –Washington, DC - May 2008 –

References EDUCAUSE/Internet2 Security Task Force – Internet2 Security – Effective Practices Guide – ide/Effective+IT+Security+Practices+and+Solution s+Guide