Find out what's inside the November 2020 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.
Kurt Seifried – Chief Blockchain Officer and Director of Special Projects, Cloud Security Alliance
Kurt Seifried is a long time technologist and currently works as the Chief Blockchain Officer and Director of Special Projects for the Cloud Security Alliance. With respect to FIDO (and FIDO2) Kurt is a strong advocate for them, especially when using security keys or tokens due to their inherent security and simplicity for end users.
John MacInnis – Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
John MacInnis, HID Global, Product Marketing Manager, Identity & Access Management Solutions (IAMS). John is an experienced marketing professional with a background in cybersecurity and software development. He has a Bachelors in Computer Engineering from University of Michigan, an MBA from the University of Phoenix and holds CISSP certification from (ISC)2. In his spare time, John enjoys hanging out with technology and white hat hacker groups in and around San Jose, CA.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.