The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategies.

A Secure Architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible.

Agenda for “A way to Secure Architecture Review” as follows:
1) Introduction.
2) Understanding & Requirements.
2) Key attributes of Secure Architecture Review.
3) General methodology for conducting Secure Architecture Review.
4) Overview of policies and procedures involved in performing Secure Architecture Review.


Viral Shah


Starts at Saturday June 09 2018, 12:20 PM. The sessions runs for about 1 hour.