The Open Group Conference - Rome 2010

Security Forum and Security Practitioners Conference

Public Sessions - all delegates welcome to register to attend
Security & Jericho Forums Members meeting - guest attendance arranged on request
Mon April 26th - Roundtable on alignment of TOGAF & SABSA

Roundtable on alignment of TOGAF and SABSA:
Joint session with ad-hoc working group addressing alignment of The Open Group's Architecture Framework (TOGAF) with the Sherwood Applied Business Security Architecture (SABSA) framework.

15.30-16.00 Break
16.00-17.00 Continuation of roundtable on alignment of TOG+AF and SABSA 
Tues April 27th - Security & Jericho Forums Meeting
09.00-10.30 09.00: Welcome & Introductions
09.15: Review of current Security projects:
    For each project:
    - attendees interests & related security pain points
    - feedback on optimizing value-add of project deliverables
10.30-11.00 Break

11.00: Ecosystem for Security, to progress development of our practical guide for Small & Medium & Government businesses on how to establish and maintain good security for their systems.
11.45: ISM3: Measuring the Right things Right - Vicente Aceituno
Security practitioners often focus on technical issues and old concepts that no longer work, devoting resources to measure things that don't help continuous improvement, and failing to communicate their value to management. ISM3 can help, by helping practitioners to ask the right questions.

12.30-14.00 Lunch

Enterprise Security Architectures (ESA) - workshop on developing current WG recommendations to update specific areas of the 2004 ESA Guide.

15.30-16.00 Break
16.00-17.30 Secure Mobile Architecture (SMA) - joint with RTES Forum, on  development of our Secure Mobile Architecture standard
Weds April 28th - Security Practitioners Conference 
09.00-10.30 Architecting Secure Business Collaboration
See Conference Program - 
11.00-12.30 Cost-Effectively Managing Information Security
See Conference Program
14.00-15.30 Security the Cloud - Information Access & Control
See Conference Program 
16.00-17.30 Cloud Security Reference Architecture
See Conference Program 
Thurs April 29th - Security Forum meeting
09.00-10.30 ACEML - workshop on implementing the near-completed Automated Compliance Expert standard.
10.30-11.00 Break

Identity and Access Management:  presentation and review of progress in the Jericho Forum and elsewhere on business/enterprise level Identity Management and Access Control Management in the Cloud and in other de-perimeterised environments.

12.30-14.00 Lunch
14.00-15.30 Workshop: Security Services for SOA and the Cloud
Joint workshop session involving members of the SOA & Security WG, Cloud Computing Security WG, and Security Forum, to establish common understanding on areas of shared objectives in these projects and resulting opportunities for collaboration to achieve best deliverables. 

Go to Return to previous page

   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page