News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS18 - Dissecting Blockchain for the Practical Application to Identity
#IMOS18 - Dissecting Blockchain for the Practical Application to Identity
Webinar
12 Sep 2018
Speakers
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Damian Starosielsky
CTO and Co-Founder, Evident ID
Why not watch?
#IMOS18 - CISO Interview; Heath Renfrow, Leo Cybersecurity
12 Sep 2018
#IMOS18 - Advancements in Authentication: How Have Evolutions in Biometrics, Multi-Factor & Standards Changed the Authentication Landscape?
12 Sep 2018
#IMOS18 - Time to Stop Blaming the User: Making Security Usable
12 Sep 2018
#IMOS18 - CISO Interview; Paul Watts, Dominos
11 Sep 2018
You may also like
Keeping Your Crypto Wallet Safe
Next-Gen
3 Aug 2020
Blockchain Startups Move From Coin Offerings to Investment for Funding
News
30 Apr 2020
Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable
Opinion
16 Jul 2018
Let's Steal a Coin
Next-Gen
2 Jul 2018
Cryptocurrency Hacking Raises Threats of Financial Vulnerability
Opinion
26 Mar 2018
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Most IT Leaders Say Severity of Cyber-Attacks has Increased
News
25 Jul 2024
1
Chinese Espionage Group Upgrades Malware Arsenal to Target All Major OS
News
23 Jul 2024
2
Russia Shifts Cyber Focus to Battlefield Intelligence in Ukraine
News
23 Jul 2024
3
Exclusive: Paris 2024 CISO Reveals Cybersecurity Plans for the Olympics
Interview
23 Jul 2024
4
Prolific DDoS Marketplace Shut Down by UK Law Enforcement
News
23 Jul 2024
5
Cybercriminals Exploit CrowdStrike Outage Chaos
News
22 Jul 2024
6
Fact vs. Fiction: Dispelling Zero Trust Misconceptions
Opinion
18 Jul 2024
1
Cybercriminals Exploit CrowdStrike Outage Chaos
News
22 Jul 2024
2
Exclusive: Paris 2024 CISO Reveals Cybersecurity Plans for the Olympics
Interview
23 Jul 2024
3
CISA's Jack Cable Discusses US Push for More Secure Software
Interview
15 Jul 2024
4
Chinese Espionage Group Upgrades Malware Arsenal to Target All Major OS
News
23 Jul 2024
5
North Korean Hackers Targeted Cybersecurity Firm KnowBe4 with Fake IT Worker
News
24 Jul 2024
6
The Future of Fraud: Defending Against Advanced Account Attacks
Webinar
18 Jul 2024
1
Mastering IP & Data Security in the Industrial Age
Webinar
27 Jun 2024
2
Experiencing a DDoS Simulation to Enhance Defenses
Webinar
2 May 2024
3
How to Unlock Frictionless Security with Device Identity & MFA
Webinar
11 Apr 2024
4
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
5
How to Proactively Remediate Rising Web Application Threats
Webinar
30 May 2024
6
#Infosec2024: Claire Williams on Leadership, Cultivating a High Performing Team and Overcoming Adversity (video)
Interview
6 Jun 2024
1
#Infosec2024: Navigating the Ransomware Toll on Victims with Jason Nurse (video)
Interview
6 Jun 2024
2
#Infosec2024: Experts Share How CISOs Can Manage Change as the Only Constant
News
6 Jun 2024
3
#Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity
News
5 Jun 2024
4
Infosecurity Magazine Autumn Online Summit 2024: Day Two
Online Summit
10:00
–
15:00 EDT, 11 Sep 2024
5
Infosecurity Magazine Autumn Online Summit 2024: Day One
Online Summit
09:45
–
15:00 BST, 10 Sep 2024
6