Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

How to Make Access to your Sensitive Data More Secure - The Easy Way

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Sensitive data is shared more than ever, through cloud services and via remote access as more and more employees use their mobile devices for work.

This brings practical advantages, but brings more risk of identity theft, data breaches and outages.

A security challenge faced by enterprises is that passwords are not enough. Multi-factor authentication is critical. But businesses looking to implement multi-factor identification need to balance improved security with its costs and the potential burden on the IT department.

In this webinar we will examine:

  • The different existing methods of two-factor authentication with their pros and cons;
  • The benefits of using digital certificates (Certificate-based authentication provides users with the strength and benefit of two-factor with no additional effort required) and how it works;
  • How to implement a secure access to all users for internal networks, cloud services and mobile devices;
  • How to implement a strong identity verification in a scalable manner to accommodate growth.


Alan Goode

Managing Director, Goode Intelligence

    Lila Kee

    Chief Product & Marketing Officer, GMO GlobalSign

      Stephen Pritchard

      Moderator, Infosecurity Magazine

        Mark Ridley

        Director of Technology, Reed.co.uk

          Amar Singh

          CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

            Brought to You by