Find out what's inside the October 2020 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.
It is time to remove human error from the equation.
The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods; Biometrics and hardware authentication keys
Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.
Dipto Chakravarty – Chairman of Security COE, IoT CommunityDipto Chakravarty is the author of three best-selling books on computer architecture and security from McGraw-Hill and Wiley that have been translated in five languages. He has 11 patents to his credit in AI, security and cloud, holds a M.S in Computer Science from U. of Maryland, GMP from Harvard Business School, and EMBA from Wharton School U. Penn. He is currently the Chairman of Security, Privacy and Trust COE for IoT Community, and board member at RANK Software.
Stephen Cox – Vice President and Chief Security Architect, SecureAuth
Stephen Cox is a technology veteran with nearly 20 years in the IT industry, including more than 10 years leading cybersecurity software development teams. A key player in some of the most influential IT security firms in the world, he is recognized as an expert in identity, network and endpoint threat detection, as well as an accomplished software architect.
As Vice President and Chief Security Architect at SecureAuth, Stephen is helps drive the strategy, vision and development for the company’s products and solutions. Prior to SecureAuth, Stephen worked at FireEye/Mandiant, RSA, VeriSign, Northrop Grumman and America Online. He holds a Master of Science in Software Engineering and a Bachelor of Science in Integrative Studies, both from George Mason University.
Mike McKinzie – Solutions Advisor, Swivel SecureMike McKinzie is a Solutions Advisor with Swivel Secure, a leading provider of 2FA/MFA solutions. Prior to joining Swivel Secure, Mike operated a boutique Security practice focused on Cyber Security serving Fortune 1000 companies. In addition, Mike has worked in Security Operations with a prominent Casino operator in Las Vegas, as a Systems Engineer with PGP, taught an Information Security course at Cal State, Fullerton and held various technical and security positions with a nationwide accounting firm. He holds a B.A from UC Irvine, earned his CISSP designation and is an active member of ISSA, Infragard and the ISF
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.