When: March 7 | 2019 Attend
Access control, a critical component of IT security compliance programs, ensures that organizations protect confidential information, like intellectual property and customer data. But your access management program can easily become outdated and static—especially if you rely on manual control testing and user access administration tasks.
When: May 06 2010 3:00 am
Presenting: Peter Cummings, CEO, ValueAddIT
Peter Cummings, presents a case study on Identity Management 2.0
When: May 06 2010 6:00 am
Presenting: Steven Furnell, Head of School of Computing, Plymouth University
As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.
When: May 06 2010 11:00 am
Presenting: David Temoshok; Federal Identity Management GSA, Director
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.
When: May 06 2010 2:00 pm
Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect
The Realities of Emerging Technologies for IAM
When: May 06 2010 4:00 pm
Presenting: Dickie George; (NSA) National Security Agency
Cyber Coldwar
When: May 06 2010 5:00 pm
Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa
Trends in Access Governance
8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance
John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.