InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Reckoning: Why Traditional MFA is Not Enough for Cyber Insurance Compliance

Presented by

Donovan Blaylock, Director of Solutions Engineering, SecureAuth

About this talk

A reckoning is coming for Traditional MFA, as many methods are easily hacked and grounds for higher cyber insurance premiums and non-renewals. To best stay ahead of the latest hacker attacks and exceed cyber compliance, you need a novel approach to MFA. One that is powered by a risk-based, continuous authentication platform that provides passwordless options, device, trust, and security controls throughout the digital journey including post authorization. Attend this webinar to hear which MFA methods are being mandated to attain cyber security compliance. Attendees Will Learn: – Why certain MFA methodologies are not allowed by highly regulated industries like the Federal Government, Energy and Financial Services. – How to use a passwordless continuous authentication approach to analyze user activity and detect anomalies for ultimate security. – Real-world examples on how to decrease the chance of cyber insurance being rescinded. – How to implement unified security controls for all users and resources to block unauthorized and malicious access in real-time for cyber insurance compliance. Who Should Attend: – Manager, Identity and Access Management – Global Head of IAM Strategy – Senior IAM engineer – CISO – Director, Identity and Access Management – Identity and Access Management – Information Security Directors – VP of Cybersecurity
Identity Defined Security Alliance

Identity Defined Security Alliance

9338 subscribers159 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics