8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance
John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.
8 Sep 2009 12:00 pm Presenting Al Zollar, IBM; Gerry Gebel, Burton Group, Ken Blossom, Tivoli
Burton Group Vice President and Identity and Security expert, Gerry Gebel,IBM Tivoli General Manager Al Zollar and IBM Trusted Identity Vice President Kent Blossom discuss . .
28 Jul 2009 6:00 pm Presenting Peter Tapling, President & CEO, Authentify,Inc
In the context of smaller budgets and more sophisticated security exploits, many entities are turning to out-of-band authentification (OOBA)to strengthen their Identity and Access Management strategies . .
28 Jul 2009 3:00 pm Presenting Paul Engelbert, VP, Global Security Management Practice, CA Services.
Identity Lifecycle Management is a comprehensive approach to managing user identities throughout their lifecycles. An effective identity lifecycle management approach should greatly assist corporations in improving efficiency, achieving tighter security controls, and ensuring continuous compliance.
28 Jul 2009 1:00 pm Presenting Dr. Michael J. Mestrovich, President of FiXs
Many visions, definitions, strategies and concepts on how "federation" should or would work currently abound when discussing Identity Management scenarios. .
28 Jul 2009 12:00 pm Presenting Chris Sullivan, Courion, Vice President of Customer Solutions
Ensuring that the right people have the right access and are doing the right things across a complex enterprise can be a dauniting challange.
28 Jul 2009 10:00 am Presenting Matthew Gardiner; Director of Product Marketing at CA
What is it and why is it a key security foundation for SAAS and the future of the web?
Mathew Gardiner is a recognized industry leaded in the security management and IAM markets worldwide.
28 Jul 2009 9:00 am Presenting Phil D'Angio, VeriSign EMEA, Head of Business Development
Making PKI and Two Factor Authentication simple and cost effective: Hundreds of public and private organisations use PKI and One Time Password (OTP)credentials to secure transactions and interations with their employees, customers and business partners every day.