The Security Assurance Ecosystem

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Tuesday November 6, 2012
      2:05 pm - 3:25 pm
  • Location: Van Leer C457
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact

Will Foster
Senior Research Associate
Center for International Strategy, Technology, and Policy (CISTP)
Sam Nunn School of International Affairs
Georgia Institute of Technology
William.Foster@inta.gatech.edu

Summaries

Summary Sentence: No summary sentence submitted.

Full Summary: Tony Rutkowski, Distiguished Senior Research Fellow in the Center for International Strategy, Technology, and Policy (CISTP), the Sam Nunn School of International Affairs, will provide an overview of the various fora/communities and methodologies that comprise the security assurance ecosystem – often also referred to as the Information Assurance.  

Media
  • Tony Rutkowski Tony Rutkowski
    (image/jpeg)

Tony Rutkowski, Distiguished Senior Research Fellow in the Center for International Strategy, Technology, and Policy (CISTP), the Sam Nunn School of International Affairs, will provide an overview of the various fora/communities and methodologies that comprise the security assurance ecosystem – often also referred to as the Information Assurance.  This ensemble has over the past ten years produced an expanding array of standardized platforms that are being used today to enhance the trust and lower the risks inherent in all computer based networked systems – also referred to as “hardening.”  Mantras among these entities include “making security measureable” and “know your weaknesses; know their attacks.”  Unrealistic notions of absolute security are becoming transformed into more pragmatic approaches that place the emphasis on risk assessment and automated security systems.

This ecosystem has grown dramatically in scale, activity and globalization over the past several years.  The expansions include not only important new platforms such for Continuous Monitoring (CM) and Threat Intelligence Exchange (STIX), but also public mobile infrastructures and services, as these systems and their users become exposed to a rapidly expanding array of exploits.

Additional Information

In Campus Calendar
Yes
Groups

Ivan Allen College of Liberal Arts, Sam Nunn School of International Affairs, Center for International Strategy, Technology, and Policy (CISTP)

Invited Audience
No audiences were selected.
Categories
Seminar/Lecture/Colloquium
Keywords
Information Assurance, security assurance ecosystem, Tony Rutkowski
Status
  • Created By: Debbie Mobley
  • Workflow Status: Published
  • Created On: Nov 1, 2012 - 6:23pm
  • Last Updated: Oct 7, 2016 - 10:01pm