Secure Identity
Facebook Twitter LinkedIn

Secure Identity

Expert Talk
Thursday, May 11, 2017 15:30—16:30
Location: WINTER GARDEN

Full-Stack OAuth Security

The OAuth 2.0 stack has matured but it involves a whole bunch of IETF RFCs. Join Pamela Dingle in a run through of the actual protocols involved in creating an OAuth identity ecosystem that might meet PSD2, Open Banking or high-assurance corporate standards. The goal will to be to see the big picture of how all the bits combine to make a working ecosystem.

Pamela Dingle
Pamela Dingle
Ping Identity
Pamela Dingle is a well-known contributor in the identity management world, with over 15 years of experience focusing on implementation and system architecture providing strategic direction in web...

Privilege Management and IAM Considerations in Hybrid Environments

As traditional definitions of privileged and end users become blurred, privileged identity management extends to much more than managing on-premises and cloud system-level logins. More users outside our companies access our systems and applications, and most data breaches are caused by compromised credentials.

It’s therefore vital to:

Privilege Management and IAM Considerations in Hybrid Environments
Presentation deck
Privilege Management and IAM Considerations in Hybrid Environments
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Barry Scott
Barry Scott
Centrify
Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across...

The Future of Cybersecurity: Giving your business Leadership the Confidence of Control

IT Security professionals today are charting a new course. The techniques used to prevent attacks in the last decade are not working. Today the systemic monitoring aimed at securing information, detects less than one percent of all data breaches. Business leaders need a new approach to secure the future of commerce and address new regulations, specifically when mitigating risks as part of digital transformation projects. In this session, we will talk about the techniques and approaches used by forward thinking information security leaders into how companies can protect against insiders and external hackers, and more importantly, give business leaders the confidence to know they are in control.

Suresh Sridharan
Suresh Sridharan
CA Technologies
Suresh Sridharan is part of CA’s Product Marketing team responsible for Privileged Access Management & Threat Analytics. He comes to CA from Gigya, where he lead their Product Marketing...
Subscribe for updates
Please provide your email address