Improving Enterprise Authentication: Taming the Password Beast

Many enterprises have implemented some basic methods for managing user authentication to sensitive data, and some have even mastered the “single sign-on” problem for data access. But today’s IT environment increasingly involves a wide range of user devices and locations, including mobile equipment, cloud services, and even Internet of Things devices. In this Dark Reading webinar, top experts will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.

On Demand
1h 00min

Attend this webinar and you'll learn:

  • what essential questions you must ask yourself and your service providers, before designing an authentication strategy for your business
  • why the FIDO2 / WebAuthn standard shifts authentication paradigms and might support your identity and access management strategy
  • how to support better security and lower friction for both internal and external users
  • what to consider now if you want your authentication strategy to stand the test of time (and whether passwords should be part of the long-term plan)

Featured Speakers

  • Jerrod Chong
    Jerrod Chong
    Chief Solutions Officer

    Jerrod Chong is Chief Solutions Officer at Yubico where he focuses on improving and enhancing product development initiatives to align with customer and market demands. Jerrod has also delivered numerous presentations on modern authentication and open standards for leading IT conferences including Black Hat, Cloud Identity Summit, Gartner IAM, and many others.

    Jerrod has more than 18 years of IT security experience specializing in enterprise solution selling. He has proven success in managing large complex Global 2000 customers at both Pointsec Mobile Technologies and Check Point. M.S.E. Jerrod received his Bachelor’s degree in Computer Science and Engineering from the University of Michigan.

    Jerrod is passionate about making strong authentication secure, simple, and scalable. If he's not convincing you that hardware-backed keys are cool, he is looking for good coffee.

  • John Pironti
    John Pironti
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By