How to Make Access to your Sensitive Data More Secure - The Easy Way

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Sensitive data is shared more than ever, through cloud services and via remote access as more and more employees use their mobile devices for work.

This brings practical advantages, but brings more risk of identity theft, data breaches and outages.

A security challenge faced by enterprises is that passwords are not enough. Multi-factor authentication is critical. But businesses looking to implement multi-factor identification need to balance improved security with its costs and the potential burden on the IT department.

In this webinar we will examine:

  • The different existing methods of two-factor authentication with their pros and cons;
  • The benefits of using digital certificates (Certificate-based authentication provides users with the strength and benefit of two-factor with no additional effort required) and how it works;
  • How to implement a secure access to all users for internal networks, cloud services and mobile devices;
  • How to implement a strong identity verification in a scalable manner to accommodate growth.

Speakers

Alan Goode

Managing Director, Goode Intelligence

    Lila Kee

    Chief Product & Marketing Officer, GMO GlobalSign

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

        Mark Ridley

        Director of Technology, Reed.co.uk

          Amar Singh

          CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

            Brought to You by

            Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.