Identity Management for a Dynamic Workforce: Zero Trust Versus Risk-Based Security

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

User working patterns have completely turned upside down within the last six months. Recently, most organisations have adopted remote working, collaboration tools, cloud storage and applications into their critical business processes.

Let’s address the elephant in the room: how can businesses securely facilitate access to these applications, data stores, devices and tools?

In this webinar, a panel of security experts will discuss Zero Trust versus risk-based security strategies, analysing the benefits and limitations of both approaches.

Learn how to:

  • Leverage identity management principals in new, intelligent, user friendly and innovative ways
  • Achieve the right balance between user experience and risk mitigation
  • Use identity to secure and protect your digital assets

Speakers

Ian Jennings

Managing Director, BlueFort Security

    Ed  Moyle

    General Manager and Chief Content Officer, Prelude Institute

      Russel Ridgley

      CTO UK & IRE, RSA Security

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.