The Quilt 2016 Security Round Table

2011 Quilt Logo small

The Quilt Security Round Table


Contact Carol for questions

Thursday, February 11, 2016, 1:00 – 5:00 PM & Friday, February 12, 2016, 8:00 – 11:00 AM

Security has been a focus of The Quilt community for quite some time, so we are excited to announce a round table discussion on network security will be held following the winter member meeting. The format for the two, half-day Security RT will be a mix of discussions and presentations on The Quilt members activities for their own networks as well as that of their members in the three stages of security: prevention, mitigation, and reaction. The discussion will include, but not be limited to current activities with respect to DDoS mitigation, member education & training, security policy, resource requirements, best practices, security service portfolios, leveraging regional resources, etc. The round table discussion will conclude with a brainstorming session on what we can do as a community.

Quilt Member’s Security Strategies – through discussions and presentations, learn and share best practices for the three stages of security: prevention, mitigation, and reaction.

Security Services for Members – understand the steps to developing security programs as a service for your members and identify services you could be offering.

Community Action Plan – develop a plan for the community to leverage experience, resources, and other initiatives.

Since security has been a driver in our community’s conversation for so long, we are pleased to offer this opportunity to get our members around a table for an in-person conversation. The discussion will focus on information for Quilt members’ staff who: are responsible for network security strategy and operations within their own organization; are responsible for supporting security issues for their member institutions; and/or are responsible for identifying and building services.

The Security RT is open to The Quilt members and their staff. There is no cost to attend, but a separate registration is required.


Meeting Registration
Meeting Location and Hotel
Registered Attendees
Security Round Table
Meeting Agenda