Improving Enterprise Authentication

Many enterprises have implemented some basic methods for managing user authentication to sensitive data, and some have even mastered the “single sign-on” problem for data access. But today’s IT environment increasingly involves a wide range of user devices and locations, including mobile equipment, cloud services, and even Internet of Things devices. In this Dark Reading webinar, experts will discuss emerging methods for solving the authentication problem, and the need for building authentication strategies that go beyond the enterprise premises.

 

Available:
Thu, Jul 19, 2018 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attend this webinar and you’ll:

  • Get tips for better management of a variety of authentication methods, so you don't just need to choose one
  • Learn about new innovations in behavioral biometrics that may improve end user security while reducing friction  
  • Discover how email authentication can fight spoofing and phishing        
  • Gain insights on how to move past passwords and overcome the operational and business challenges to implementing strong multi-factor authentication

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale. John has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture professional and (ISSAP) and Information Systems Security Management Professional (ISSMP). He is also a published author and writer, highly quoted and often interviewed by global media, and a award winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.

  • Vivek Asija
    Vivek Asija
    VP of Product Marketing
    Valimail

    Vivek is VP of Product Marketing at Valimail, a Shasta and Tenayabacked cybersecurity startup in San Francisco. An "IT guy" turned product marketer, Vivek has been on both sides of the table as buyer and seller of technology solutions for over 20 years. He combines a unique blend of customer empathy, strategic marketing, and storytelling ability that brings business solutions to life.

    Vivek is a graduate of Phillips Exeter Academy and holds a B.A. in History from Wesleyan University and an M.B.A. from Babson College. He is a board member of the Sonoma Ashram Foundation.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By