230b91e8cd02eb1d8e9837e428632b94

Abstract

About:
The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategies.

A Secure Architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible.

Agenda for “A way to Secure Architecture Review” as follows:
1) Introduction.
2) Understanding & Requirements.
2) Key attributes of Secure Architecture Review.
3) General methodology for conducting Secure Architecture Review.
4) Overview of policies and procedures involved in performing Secure Architecture Review.

Speaker

Viral Shah

Timing

Starts at Saturday June 09 2018, 12:20 PM. The sessions runs for about 1 hour.

Resources