REGISTER

Webinars:

tweetspam

13 Aug 2009 6:00 pm Presenting Susan L. Lyon, Of Counsel, Perkins Coie LLP

Aocial media in the new Web 2.0 world has proven to be an effective new marketing tool but one that also creates some interesting privacy challanges.

exploits

13 Aug 2009 3:00 pm Presenting David W. Campbell; Leader; OWASP

The Web is a Dangerous Place: Expolits and Defenses for a Web 2.0 World.

13 Aug 2009 6:00 am

Presenting Cameron Craig, DLA Piper, Partner Technology and Media

Cameron Craig is a Solicitor at the Supreme Court in England and Wales 

fivekeys

28 Jul 2009 3:00 pm Presenting Paul Engelbert, VP, Global Security Management Practice, CA Services.

Identity Lifecycle Management is a comprehensive approach to managing user identities throughout their lifecycles. An effective identity lifecycle management approach should greatly assist corporations in improving efficiency, achieving tighter security controls, and ensuring continuous compliance.

cis

13 Aug 2009 1:00 pm Presenting M. Ryan Calo; Residential Fellow; Stanford Law School

In online privacy today, notice is king. Notice is how we deal with the conflict between the preference of internet companies to gather as much user dat as possible and the rights of users to control their information.

13 Aug 2009 4:00 am Presenting Ajit Jaokar, Futuretext, Founder and Author

Smart Grids are in the news considering the Obama administration impetus for broadband stimulation. The starting point

federated

28 Jul 2009 1:00 pm Presenting Dr. Michael J. Mestrovich, President of FiXs

Many visions, definitions, strategies and concepts on how "federation" should or would work currently abound when discussing Identity Management scenarios. .

scott

13 Aug 2009 12:00 pm Presenting Julie Machal-Fulks; Partner at Scott & Scott LLP

Since February 2005, the identities of approxomately 98 million people have been exposed because of data leaks. This presentaion examines 

trusted

8 Sep 2009 12:00 pm Presenting Al Zollar, IBM; Gerry Gebel, Burton Group, Ken Blossom, Tivoli

Burton Group Vice President and Identity and Security expert, Gerry Gebel,IBM Tivoli General Manager Al Zollar and IBM Trusted Identity Vice President Kent Blossom discuss . .

courion

28 Jul 2009 12:00 pm Presenting Chris Sullivan, Courion, Vice President of Customer Solutions

Ensuring that the right people have the right access and are doing the right things across a complex enterprise can be a dauniting challange. 

ponemon

13 Aug 2009 11:00 am Presenting Mike Spinney, Senior Privacy Analyst, Ponemon Institute

Social Media impact and implications for corporate privacy

outof

28 Jul 2009 6:00 pm Presenting Peter Tapling, President & CEO, Authentify,Inc

In the context of smaller budgets and more sophisticated security exploits, many entities are turning to out-of-band authentification (OOBA)to strengthen their Identity and Access Management strategies . .

identity

28 Jul 2009 10:00 am Presenting Matthew Gardiner; Director of Product Marketing at CA

What is it and why is it a key security foundation for SAAS and the future of the web?

Mathew Gardiner is a recognized industry leaded in the security management and IAM markets worldwide.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top