Catch today’s webinar: Next-gen Identity Management

October 23, 2017 2 minute read
users around a computer

Are your users really who they claim to be? What is the impact to your business if your end-users are registering as fake individuals, or impersonating others? If the identity of your users matters to your business, then you’ll want to join today’s webinar hosted by SC Magazine.

Identity, the internet, and your business—architecting your online product/service once was as simple as enabling someone to create a user name and a password. It’s not that easy or simple anymore. User names are easily guessed and passwords are easily breached. The answer, of course, is that identity and access management software need to be absolutely certain that the identity is correct and not an attacker pretending to be the authorized user. NIST 800-63-3 recommends combining identity proofing with multi-factor authentication.

Tune in to today’s webinar on next-gen identity management. Yubico’s foremost Identity expert, John Bradley will chat with SC Media’s Editor, Stephen Lawton about identity proofing in the real world, and how companies can ensure a user’s identity is accurate and not an imposter.

About John Bradley

John has over 15 years experience in the information technology and identity management field. He advises Government Agencies and commercial organizations on the policy and technical requirements of Identity Management, Federated Identity, PKI and smart card solutions. He is often consulted and brought in to brief clients, vendors, staff, and standards organizations on complex state-of-the-art identity management concepts, best practices, and technical requirements because of his amazing ability to make complex topics simple.

Share this article:

Recommended content

Accounting for the human element: A security tool that nobody wants to use is destined for the trash heap

To continue our effort to peel back the layers on the journey to passwordless, Yubico talked with former Navy intelligence officer and University of Tulsa professor, Sal Aurigemma, about his research in the behavioral information security field. Professor Aurigemma focuses on end-user experiences and adoption rates of authentication technologies. He regularly runs field experiments with ...

Cloud vs. On-Prem: Why opting for on-prem can cost you your next data breach

Most CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down.  To help quantify the problem, recent research from Canalys shows that there were more records ...

Find us at Oktane21 and discover how Okta and the YubiKey bridge enterprises to passwordless

Okta’s premier identity conference, Oktane21, is taking place virtually on April 6-8, and Yubico is once again a proud sponsor. This year, Yubico will highlight our continued partnership with Okta and showcase the YubiKey as the key to trust.  Okta Adaptive MFA and the phishing-resistant YubiKey allow organizations to quickly and securely deploy strong multi-factor ...

Yubico announces general availability of next-generation Android and iOS SDKs

Yubico is committed to enabling YubiKey integrations for all of our technology partners and enterprise customers with the least amount of friction and time-to-market as possible. With this goal in mind, we are very excited to announce the public general availability of our Android and iOS SDKs that went into public beta in December last ...