Internet2

close
Use Internet2 SiteID

Already have an Internet2 SiteID?
Sign in here.

Internet2 SiteID

Your organization not listed? Create a local account to use Internet2 services.

Create SiteID

Blogs

Preview of Defense-In-Depth Presentation at 2018 Global Summit

May 02, 2018, by Sara Aly
Tags: 2018 Internet2 Global Summit, End-to-End Trust and Security, Frontpage News, Security, Security & Identity

By Jason Borinski and Cooper Nelson (University of California - San Diego)

2018 Global Summit logo Thirty years ago, the Morris Internet Worm was released and ushered with it the birth of the Internet security industry.

What started as perimeter security, firewalls, and honey pots has since evolved to include “next generation” products, intrusion detection/prevention, managed SOC, deception networks, and most recently a shift towards endpoint and identity technologies.

There continues to be raging debate over in-sourcing vs. outsourcing, default permit vs. default deny, and open vs. closed source. Should detection/deflection be on the endpoint or network? Should we build or outsource the SOC? Answers to these questions and more during our presentation at Global Summit next week!

Join us on Monday, May 7 at 10:30 a.m. to hear the perspective of two security operations veterans with over 30 years of combined experience acquired in managing security for one of San Diego's largest IP networks.