The Future of Authentication and Authorization
- LANGUAGE: English DATE: Tuesday, July 23, 2013 TIME: 4:00pm CEST, 10:00am EDT, 2:00pm GMT
Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. In this webinar, KuppingerCole Senior Analyst Dave Kearns will talk about the bigger picture on the future of authentication and authorization.
Continuing Education Credits
After attending this webinar you will be able to:
- List the important approaches to consider when looking at the future of authentication and authorization in your organization.
- Describe the concepts of Versatile Authentication, Risk- and Context-Based Authentication and explain why these are important.
- How Access Control combines the elements of Authorization and Authentication *Explain traditional authentication methods, how they combine in multi-factor ceremonies and how they connect to the future of Authentication as part of a context-based access control scheme
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.