Day 2: Monday, March 25th
Monday, March 25th, 2019
Strengthening authentication, the first line of defense, is important as cyber crime continues to grow. Innovation and usability are keys to successful delivery of information security. Compare benefits and shortfalls of authentication methodologies and how to limit a hacker’s access.
Attend this session to explore:
•Reducing the risks with de-centralization (shifting authentication and fortifying access)
•Deter, detect and mitigate breaches with innovative combinations of identity and analytics
•Navigating in an open-access environment with legacy applications, IoT and remote applications