Enterprise Architecture Practitioners Conference The Open Group
  Mike Borkin - Technical Leader, EDS Security Practice  


Mike BorkinMichael (Mike) Borkin is currently the Lead Security Architect for Information Management within the Technical Office of EDS' Security and Privacy Architecture and Engineering team.  This Information Management security space includes Encryption of data-at-rest and data-in-flight across all platforms; Content Inspection and Interception at the corporate perimeter (including devices connected to workstations); Information Rights Management; and consulting on client data classification and necessary controls.

Previously Mike was Security Architect and Security Engineer for some of EDS' largest clients and a Security Lead Architect in related areas.  Mike's experience in EDS includes developing security infrastructures, especially for Windows platform security, and innovative solutions to enterprise level issues in non-security areas including business processes, documentation development, software licensing, IP address conversions, and the automation of technical tasks.

Prior to joining EDS in 2000, Mike worked at a small ISP as a network administrator and did independent development, sales and support of network and Windows NT based servers/clients for small businesses (up to 100 connections) including network and phone system designs for both internal and external connectivity.

Mike holds a B.S. in Political Science with minors in History and Economics, University of Tennessee; Microsoft MCSE on Windows NT and Windows 2000 MCP+I on Windows NT; SANS Institute GSEC; and Novell CNA - Novell 4.11.

   
 

Presentation
How understanding your data utilization helps to protect you against data leakage
Many within IT security organizations get excited by each new security widget to come to the market. This inclination is enhanced by the outside pressures induced by vendors knocking on non-IT leaders' doors and the ever-increasing media focus on organizations that have data leakage incidents. However, for as much time as IT organizations spend looking at solutions, very few take the time to understand the basics of how their organization actually stores, transmits and uses the data they are supposed to be protecting on a day-to-day basis. This presentation will discuss how understanding the basic interaction between your user community and your organization's data will help you close the gaps in your security and lead to the right architectural decisions to prevent data leakage.

return to program

   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page