The role of System Security Engineering in the engineering lifecycle
Stephen Dill - Lockheed Martin
Apr 21, 2010Size: 446.1MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThis seminar will provide an overview of how Information Security (AKA Cyber Security, AKA INFOSEC) engineering, requirements analysis and security policies and other activities fit into the overall life cycle of an IT system. We will define an INFOSEC systems engineering methodology using industry best practices and we will define the major steps or key activities in that systems engineering methodology. We will also discuss what the role of Information Systems Security Engineering and the Systems Security Engineers should be in the Life Cycle processes.
About the SpeakerMr. Dill has been working in information security for 35 years, primarily in IT and communications systems architecture & design and operations & maintenance. Currently he is the CyberSecurity Solution Family Chief Architect, responsible for the coordination and execution of Cyber Security Research and Development within IS&GS; and managing contracted R&D with other businesses and at universities. He has been with Lockheed Martin since 1991. In the past Mr. Dill led R&D projects in cross-domain information sharing, multilevel security, Information Assurance management systems, data provenance, identity management and intrusion detection and atmospheric sounding. Other work experiences include IT over satellite comms systems architecture and program management, IA training and career development, C2 program management for the White House Communications Agency, Communications-Electronics Repair Activity Management, DSCS Satellite Terminal Station Chief, and Avionics and Armament Repair Management. Mr. Dill holds a BS in Biology/Botany from Bucknell University, a MS in Telecommunications Management from the University of Maryland and received his initial training in Information Security courtesy of the US Army.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.