Addressing your identity challenges in a tough economy

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

As economic and budgetary constraints bite, keeping control of data and application access in your organisation becomes a tough call.  Do you really know who has access?  How do you combat increased insider threats by disgruntled ex-employees? What role does access control play in addressing ever more rigorous governance and compliance requirements? How do you address access via mobile devices such as smart phones?

 

Fraud and hacking is everywhere, so how can you trust that the person interacting with your business IT resources is really who they say they are?

 

Simple - authenticate their credentials using a tried and trusted technology.

 

That's a lot easier said than done. This 60-minute webinar will take a look at the role that multi-factor authentication plays in defending against security threats and identity fraud.

 

This webinar will:

  • Explain how deploying two-factor authentication allows you to confidently establish a person's identity when providing access to sensitive data, networks, or applications.
  • Help you understand what is involved with implementing two-factor authentication such as one-time passwords.
     
  • Educate you on solutions preventing unauthorized and/or ex-employees from accessing sensitive and/or valuable company information.


This webinar is for:

 

  • C-Level management who have concerns about their organisation’s authentication and credential management solutions.
  • IT security specialists/managers wanting to stay abreast of the latest security threats and solutions in the two-factor authentication sector.
     
  • IT managers with an interest in better defending their digital assets
     
  • Managers wanting to learn more about the importance of identity and access management technologies.
     
  • Anyone wanting a 60 minute run-down on the latest authentication technology.


    CISSP SSCP logo
    CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

Speakers

Pascal Boulvais

EMEA Pre-Sales Director, ActivIdentity

Steve Gold

Infosecurity Magazine

Photo of Fran Howarth

Fran Howarth

Snr Analyst, Security, Bloor Research

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.