Information Technology Peer Group Meeting 

Redefining Security: Adaptive Security Architecture to Protect Against Persistent and Advanced Attacks 
February 22, 2017 09:00 AM - 03:00 PM 
How do you protect your organization from emerging threat vectors? 

Most organizations still rely on preventative security measures to deter hackers and cybercriminals. The archaic perimeter based security measures are simply inadequate and too passive to protect against or deter a highly-skilled and motivated attacker. Defending against these threats require security professionals to redefine their security approach. Adaptive Security Architecture (ASA) offers an integrated, comprehensive, intelligent and flexible security stance that could protect against these advanced threats. In an article published in 2008, Sun Microsystem defined the core tenants of an Adaptive Security Architecture. ASA comprises of four main elements: Predict, Block/Prevent, Detect and Respond. Based primarily on continuous monitoring and harnessing the power of analytics, ASA can adapt to changing threat vectors and create intelligent response plans. Nine years later, ASA has proven to be the more effective approach to protecting our organizations.

The extremely complex data-flows and architecture in today’s IT environments makes securing data extremely tenuous. Further exasperating the situation is a hodgepodge of stand-alone security solutions that are at best loosely coupled. The prevalent policy and signature based security measures are unable to morph with changing threat vectors and often leave gaping security holes in its wake. While IDS and IPS solutions have proved successful at protecting against the majority of malware based attacks, they are incapable of guarding against advanced persistent threats and acutely targeted sophisticated attacks. It is within this context that a more advanced approach to security had become necessary.

Please join your peers from other world-class companies of the UW E-Business Consortium to discuss Adaptive Security solutions and ways to protect our organizations from threats.

Webcast Available: If you can't make it to the event in-person (or if in-person registration has reached capacity), you can still register to attend from your computer. This option allows you to view the presentations, while attending in person provides you with the opportunity to participate in break-out discussions, ask questions or take advantage of networking opportunities. To attend the webcast, click the "Register for webcast" button on this meeting's homepage. You will receive a confirmation email with the link to the webcast a week before the meeting.

Agenda Items:
9:00 AM Welcome and Introductions
9:30 AM Issues Facing the Security Industry - Webcasted
  Cavinda Caldera, UWEBC
10:00 AM Break
10:15 AM Status Report on Emerging Threat Vectors - Webcasted
  Tim Otis, CheckPoint Solutions.
11:15 AM Develop Agenda for Breakout Discussions
  Participants will identify topics/issues that they would like to host a discussion on.
11:30 AM Breakout Discussions - Segment 1
12:15 PM Lunch
1:00 PM Cybersecurity Deterrence and Protection Strategies - Webcasted
  Thomas Heideman and Jeff Olson, Fortinet
2:15 PM Breakout Discussions - Segment 2
2:50 PM Debrief and Key Take-Away Exercise
3:00 PM Adjourn
The second level of Gordon Dining and Event Center, UW-Madison 
Jennifer Anderson, 608-890-1406, 

Annual Conference

Save the date!

The Business Best Practices & Emerging Technologies Conference is Wisconsin's premier knowledge-sharing and networking event for business leaders from well-known companies in Wisconsin and the Midwest.

Next year's conference will be September 25, 2018.

Helpful Resources

For more information on attending events, check out our FAQ page.

Please double-check the location of any meeting you attend and read our parking information page.

If you are having problems viewing a live webcast of a meeting, visit our webcast help page.

For additional help please contact Betsy Golomski at or 608-262-1145.

© 2000-2017 UW E-Business Consortium, University of Wisconsin-Madison. All rights reserved. Site credits»