The Future of Authentication and Authorization
- LANGUAGE: English DATE: Tuesday, July 23, 2013 TIME: 4:00pm CEST, 10:00am EDT, 2:00pm GMT
Continuing Education Credits
After attending this webinar you will be able to:
- List the important approaches to consider when looking at the future of authentication and authorization in your organization.
- Describe the concepts of Versatile Authentication, Risk- and Context-Based Authentication and explain why these are important.
- How Access Control combines the elements of Authorization and Authentication *Explain traditional authentication methods, how they combine in multi-factor ceremonies and how they connect to the future of Authentication as part of a context-based access control scheme
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.