Webinar Week: Access Denied- Is Authentication the Unsolvable Information Security Problem?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Industry experts are almost unanimous in their acceptance of authentication as the unsolved problem facing the information security industry. Passwords are both forgettable and inadequate, memorable information is easily sought out via social networking sites, two-factor authentication can be inconvenient, three-factor authentication is inconvenient, biometrics are treated with suspicion…

As an industry, the authentication problem is yet to be cracked, and the consequence is enormous. Authentication is at the heart of anything meaningful we do online, and the ability to authenticate online in a secure, timely and convenient way is crucial in today’s world. This webinar will take a look at the problem, the existing offerings, and potential future solutions.

Speakers

Photo of Adrian Davis

Adrian Davis

Consulting COO & CIO

Photo of Ramses Gallego

Ramses Gallego

International Chief Technology Officer, Micro Focus

Photo of David Hald

David Hald

Chief Relations Officer, SMS Passcode

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Photo of Peter Wood

Peter Wood

Partner, Naturally Cyber LLP

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.