REGISTER

Webinars:

cmt

When: May 19 2010 12:00 pm

Presenting: Tulio Quinones, Core Media Technologies & Chuck Darst, HP

The reality is-change is complex. In additional to challenges of change in a distributed CAB environment, CMT faced pressures of speed and risk - to be more responsive to business needs and more consistent on risk and impact analysis.

BCBS

When: May 19 2010 2:00 pm

Presenting: Thomas Dosedel, BlueCross BlueShield & Mike O'Grady, HP

The Infrastructure and interdependencies between resources just keep getting more complex.

MassMutual

When: May 06 2010 2:00 pm

Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect

The Realities of Emerging Technologies for IAM

Travelex

When: Apr 29 2010 12:00 pm

Presenting: Michael Black, ISO - Americas, Travelex Holding Limited

With the proliferation of powerful mobile devices ranging from laptops to Smartphones, securing email in a mobile environment is never an easy task.

ValueAddIT

When: May 06 2010 3:00 am

Presenting: Peter Cummings, CEO, ValueAddIT

Peter Cummings, presents a case study on Identity Management 2.0

NSA

When: May 06 2010 4:00 pm

Presenting: Dickie George; (NSA) National Security Agency

Cyber Coldwar

Experian

When: Apr 29 2010 1:00 pm

Presenting: Ben Isaacson CIPP; Experian, Privacy & Compliance Leader

This session will give you a summary of global anti-spam laws and requirements for senders to maintain compliance. In addition, the session will provide education on industry self-regulatory efforts, including best communications practices developed by leading industry organizations.

Online Identity Verification

When: May 06 2010 6:00 am

Presenting: Steven Furnell, Head of School of Computing, Plymouth University

As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.

Ponemon Institute

When: May 06 2010 5:00 pm

Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa

Trends in Access Governance

SonicWALL

When: Apr 29 2010 @ 2:00 pm

Presenting: Jan Sijp and Allen Schoonmaker; SonicWALL

Powering Regulatory and Corporate Compliance with an Email Security Strategy.

Federal

When: May 06 2010 11:00 am

Presenting: David Temoshok; Federal Identity Management GSA, Director

This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.

Brightfly

When: Apr 29 2010 11:00 am

Presenting: Brandon Dunlap; Brightfly, Managing Director

Companies invest significant amounts of resources in developing, marketing and positioning their products or services within a given market, yet when it comes to promoting the protection of the business and the identities of their employees and customers, many companies fail to drive the same level of marketing internally.

Mimecast

When: Apr 29 2010 @ 9:00am

Presenting: Peter Bauer, CEO, Mimecast

Guidance on security, continuity, compliance and archiving.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top