Hi [[ session.user.profile.firstName ]]

Identity and Access Management: Strong Authentication and Compromises

Identity and Access Management (IAM) are critical enterprise services which require policy and technical execution. Employee performance and enterprise governance, risk management and compliance depend on this. Threats exists to IAM services throughout their lifecycle from registration through tra
Identity and Access Management (IAM) are critical enterprise services which require policy and technical execution. Employee performance and enterprise governance, risk management and compliance depend on this. Threats exists to IAM services throughout their lifecycle from registration through transaction authentication. Surprisingly many organizations continue to employ identity, credentialing and access control solutions which are broken.

This webcast will look at:

· Requirements for personal and device identity registration

· Strong authentication compromises

Broken crypto

Access tokens

XML

· Secret compromises

· Infrastructure compromises

· Best practice for robust identity and access management and strong authentication

· Evolving standards
Recorded Jun 21 2012 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Salvatore D’Agostino, CEO, IDmachines LLC
Presentation preview: Identity and Access Management:  Strong Authentication and Compromises
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identity and Access Management: Strong Authentication and Compromises
  • Live at: Jun 21 2012 6:00 pm
  • Presented by: Salvatore D’Agostino, CEO, IDmachines LLC
  • From:
Your email has been sent.
or close
You must be logged in to email this