REGISTER

email 14 48

0530tn

Recorded:    May 30 | 2019       Attend

The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

CCTNacl

When:    March 7 | 2019       Attend

Access control, a critical component of IT security compliance programs, ensures that organizations protect confidential information, like intellectual property and customer data. But your access management program can easily become outdated and static—especially if you rely on manual control testing and user access administration tasks.

ValueAddIT

When: May 06 2010 3:00 am

Presenting: Peter Cummings, CEO, ValueAddIT

Peter Cummings, presents a case study on Identity Management 2.0

Online Identity Verification

When: May 06 2010 6:00 am

Presenting: Steven Furnell, Head of School of Computing, Plymouth University

As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.

Federal

When: May 06 2010 11:00 am

Presenting: David Temoshok; Federal Identity Management GSA, Director

This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.

MassMutual

When: May 06 2010 2:00 pm

Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect

The Realities of Emerging Technologies for IAM

NSA

When: May 06 2010 4:00 pm

Presenting: Dickie George; (NSA) National Security Agency

Cyber Coldwar

Ponemon Institute

When: May 06 2010 5:00 pm

Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa

Trends in Access Governance

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top