The Open Group Hong Kong 2009 [an error occurred while processing this directive]

Presenter

Steve Whitlock, Chief Information Security Architect, Boeing, US

Stephen Whitlock, Chief Security Architect for The Boeing Company, is an internationally recognized specialist in the field of information security. His background includes the development of tools for testing system and network security. He has also written numerous papers and presented information on cryptography, UNIX systems, and network security to a wide variety of audiences.

Whitlock developed an encryption strategy for large, multi-platform enterprise environments, which was presented to the U.S. Office of Science and Technology Policy, the National Security Council, and the FBI.

He has authored numerous articles on information security and has been instrumental in the development of technical standards relating to computing security technologies.

Whitlock has been an active participant in the security activities of the Internet Engineering Task Force, Key Recovery Alliance, Jericho Forum, and The Open Group. As the chair of the Open Group's Security and Electronic Commerce Program Group, he led the development of several standards, including the Common Data Security Architecture, and Advanced Authorization API. He is currently the Vice-Chair of the Open Group Security Forum and a member of the Board of Management of the Jericho Forum.

Presentation

New Approach to Architecting Security

In this talk Steve presents his thoughts on the future challenges and necessary new approaches to developing secure IT architectures to meet future business needs. He prefaces his presentation with a list of predictions for future directions in information security that he made 10 years ago, and compares these predictions with how they have turned out. He then lists the main IT security challenges he considers should be prioritised in developing IT security solutions for the future, breaks them down into 3 areas

  • Information challenges
  • Communications challenges
  • Technology Environment challenges

and then examines each in turn, drawing out the key issues, new challenges, and new approaches, required to provide effective IT security solutions to meet current and future business needs.

Return to agenda


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page