AXENT Tools For Enterprise Wide Security
James A. Burdick - SNC
Oct 30, 1998
AbstractSecurity tools are designed to assist security professionals as they do their jobs. This inlcudes securing the entire enterprise, not providing point-solutions of security software that does "neat, cool stuff".
Software can do amazing things, but unless it fits into an organized plan to secure the enterprise it is nothing more than a curiousity. There is, however, a way to approach security as an enterprise activity. We will discuss not only the software that can provide this assistance, but the environment into which it should be placed to properly provide security to the enterprise.
About the SpeakerMr. Burdick is currently the Vice President and Chief Technology Officer for Secure Network Consulting, Inc. He has a broad background and extensive experience in development and implementation of communications/computer architecture and security to both government and commercial clients. He established SNCI's standard procedures for conducting security risk assessments, controlled penetration tests, and security integration. He served as the primary security consultant for several CIOs and Security Directors of Fortune 100 companies in the financial, insurance, energy, transportation, and manufacturing fields.
In the past, Mr. Burdick served as Chief Engineer of Trident Data Systems where he helped build and lead a team of over 100 security practitioners at several sites across the United States. He designed a Virtual Private Network architecture allowing over 200 banks to handle secure electronic commerce transactions over the Internet and managed the technical implementation of the network.
Mr. Burdick consulted with the Air Force, responding to the famous hacker intrusion of Rome Laboratories, helping identify and repair damage to systems. He was one of the pioneers of network intrusion detection technology. He designed developed, and managed the network test environment and tested the Air Force's Distributed Intrusion Detection System. He led the team that implemented a fish bowl network for the Air Force's Computer Security Assessment Program to capture and observe the behavior of hackers.
He served 15 years with the Department of Defense. He acted as the base Communications/Computer Architect, establishing the baseline architecture and crated both the near-term and long-term migration paths. He provided expert support for operations and security of WAN/LLAN networks and UNIX computing environments to McClellan Air force Base. He was also the Technical Director of the Defense Electronic Commerce/Continuous Acquisition Lifecycle Support (DE/CALS) Electronic Commerce/Electronic Data Interchange project jointly conducted by the Air Force, Lawrence Livermore Laboratories, and Brigham Young University
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.