Recorded: May 30 | 2019 Attend
The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.
When: September 10 | 2019 Attend
Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.
When: May 06 2010 11:00 am
Presenting: David Temoshok; Federal Identity Management GSA, Director
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.
8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance
John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.
When: March 7 | 2019 Attend
Access control, a critical component of IT security compliance programs, ensures that organizations protect confidential information, like intellectual property and customer data. But your access management program can easily become outdated and static—especially if you rely on manual control testing and user access administration tasks.
8 Sep 2009 12:00 pm Presenting Al Zollar, IBM; Gerry Gebel, Burton Group, Ken Blossom, Tivoli
Burton Group Vice President and Identity and Security expert, Gerry Gebel,IBM Tivoli General Manager Al Zollar and IBM Trusted Identity Vice President Kent Blossom discuss . .
28 Jul 2009 6:00 pm Presenting Peter Tapling, President & CEO, Authentify,Inc
In the context of smaller budgets and more sophisticated security exploits, many entities are turning to out-of-band authentification (OOBA)to strengthen their Identity and Access Management strategies . .
When: May 06 2010 6:00 am
Presenting: Steven Furnell, Head of School of Computing, Plymouth University
As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.
28 Jul 2009 3:00 pm Presenting Paul Engelbert, VP, Global Security Management Practice, CA Services.
Identity Lifecycle Management is a comprehensive approach to managing user identities throughout their lifecycles. An effective identity lifecycle management approach should greatly assist corporations in improving efficiency, achieving tighter security controls, and ensuring continuous compliance.