Security Architecture in the Enterprise ‚ Applying SABSA based Concepts to your Day Job
- Don Murdoch
- Monday, August 26th, 7:15pm - 8:15pm
There are few formalized best practice general purpose security architecture programs for delivering cohesive information security solutions to the enterprise available today. One is the ‚Sherwood Applied Business Security Architecture‚ (SABSA). SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering security infrastructure solutions that support critical business initiatives. (Wikipedia). The presentation will provide an overview of the framework, the six-layer model, highlights of key points, and specific application of the framework for the modern enterprise.
About Don Murdoch:
Don has 18 years of IT/IS experience, ranging from system administration, network management, and application development to database administration and information security/incident response. He currently works as the lead security engineer for a Fortune 1000 healthcare corporation. Don is the former information systems security officer for Old Dominion University where he spent most of his days in the Wild, Wild West of academic computing, putting SANS education to the test. Don participates with SANS/GIAC as a local mentor and instructor, was a former GCIH grader, and served as the GCUX Board Chair. Don's credentials include a BS in Computer Science, an MBA, and GCFA, GCNA, GCFW, GSEC, GCWN, GCUX, GCIA, GCIH, MCSD, and MCSE NT/2000 certifications.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
||Tuesday, August 20th, 10:30am - 10:50am
||Tuesday, August 20th, 3:00pm - 3:20pm
|Evolving VoIP Threats
||Tuesday, August 20th, 7:15pm - 8:15pm
||Tuesday, August 20th, 8:15pm - 9:15pm