Mastering the Security Art of Identity, Access & Authentication

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

A comprehensive and fully-functioning identity program is an ever-evolving mission. From creating security awareness that sticks with employees, getting executive buy-in and assembling the right team, there’s a lot to do.

Then, deciding the correct mix of services and solutions that are required for the identity program can be quite a challenging task. One thing is certain – security should not compromise user experience. If there is too much friction in the mix, users will avoid best practice.

In this webinar, we will explore:

  • The key identity program challenges that exist today
  • The solutions that will help into the future
  • What group of solutions can help you deliver an effective identity program that is both robust and flexible

Speakers

Photo of Gerald Beuchelt

Gerald Beuchelt

Chief Information Security Officer, LogMeIn

Photo of Dan Blum

Dan Blum

Managing Partner and Principal Consultant, Security Architects

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Raef  Meeuwisse

Raef Meeuwisse

CISM, CISA, Author of Cybersecurity for Beginners

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.