InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Authentication Requirements for the Presidential Executive Order

Presented by

Asaf Lerner, IAM Market Owner, Thales

About this talk

The recent White House Executive Order for multifactor authentication and data encryption is inducing organizations to take essential steps in order to meet fundamental cyber security requirements. Ensuring secure remote trusted access and authentication as part of a broader zero trust environment is crucial for enterprises to thrive as they modernize their IT and security frameworks. During this webinar we will discuss immediate and practical steps that CISOs and IT professionals can take today to start implementing identity-centric zero trust security. By the end of this webinar you will have a better understanding on how to address the multiple user authentication journeys in your organization and apply the appropriate level of authentication, taking into account: *Authentication use cases *User profiles *Security requirements *Regulatory constraints
Identity Defined Security Alliance

Identity Defined Security Alliance

9392 subscribers160 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics