[96all] Thursday Host Speaker Series TODAY!

IETF Secretariat <ietf-secretariat@ietf.org> Thu, 21 July 2016 07:51 UTC

Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: 96all@ietf.org
Delivered-To: 96all@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C4D212DB5D for <96all@ietf.org>; Thu, 21 Jul 2016 00:51:01 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: <96all@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.29.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20160721075101.4536.24169.idtracker@ietfa.amsl.com>
Date: Thu, 21 Jul 2016 00:51:01 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/96all/YyUnZiTeg_5KyooB1hcctsPX5n0>
Subject: [96all] Thursday Host Speaker Series TODAY!
X-BeenThere: 96all@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: IETF Agenda <agenda@ietf.org>
List-Id: "Mailing list of all 96 attendees for official communication." <96all.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/96all>, <mailto:96all-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/96all/>
List-Post: <mailto:96all@ietf.org>
List-Help: <mailto:96all-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/96all>, <mailto:96all-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2016 07:51:01 -0000

IETF 96 - Thursday Host Speaker Series

Date: Thursday, July 21st 
Time: 13:00 - 13:45
Room: Potsdam I
Lunch will NOT be provided

Topic: Advancing Cybersecurity through NGP

Description: The threats to our networks and ecosystems are continuously increasing in capability and frequency. Subjectivity in standards and protocol implementation are common attack methods and often quite difficult to prevent or detect. What can we do to both reduce these types of attacks yet build in future proof protections?

Standards based upon “assumed trust” will need to transition to a model of “assumed harm”. How can we establish such a paradigm shift yet maintain performance, flexibly and interoperability?

Speaker: Kevin D. Walker

Biography: Kevin D. Walker is the Security Chief Technology and Strategy Officer for Juniper’s Development and Innovation (JDI) organization. He is responsible for driving the security strategy.  He provides the guidance required for JDI to conceive, develop and create momentum for industry-leading security solutions. Working closely with the Security Engineering team, Walker identifies the opportunities for improved security, growth, and innovation to deliver the scalable, reliable, and compliant security architecture needed in today’s security landscape.

Before joining Juniper, Walker was VP and Assistant Chief Information Security Officer (CISO) at Walmart.com. He has served as a Chief Information Security Officer (CISO), Chief Security Strategist and Director of Information Security across a number of notable companies including Intuit, Cisco, Symantec and VERITAS Software. With over twenty-five years in various computer science and information technology disciplines, focusing on enterprise applications, network design, and information security, Walker possesses research and engineering expertise across of range of technologies including networking protocols, securing applications at the atomic level, cryptography, and speech biometrics.