Identity & Access Management

 

Education Level: Intermediate

6414 - Social Login and BYOD—and Their Impact on Authentication Systems

Wednesday, September 27
2:15 PM - 3:15 PM

Trends associated with adopting social login services and bring your own device (BYOD) policies create security vulnerabilities. Device hijacking, identity hijacking, man-in-the-middle and man-on-the-device attacks present very real threats to corporate applications and infrastructure. Emerging technologies can close these vulnerabilities. The concepts of Identity proofing, device signatures, step-up authentication, independent channel authorization and transaction signing will be presented and discussed in real-world scenarios, demonstrating how they can be effectively integrated with existing authentication infrastructure to create new paradigms, efficiently countering these threats.

Learning Objectives:

Eric A. Tuttle

Senior Identity and Access Management Consultant
Blue Bay Technologies, Inc.

Eric Tuttle is a senior-level security architect with significant background in information system management. Providing IT consulting to Fortune 500 companies for the last 22 years, his experience includes work in government, manufacturing, healthcare and financial services.

He has spent the last twelve years performing security-related architecture planning and implementation projects in identity management, threat management and security information management as a senior infrastructure architect and information security consultant. Including the role of leading IBM's GTS national practice for Identity management service delivery for four years.

In addition, from 2000 to 2005, he was the CISO for American Standard's ebusiness unit; In this role he supported applications design, platform implementation and Sarbanes-Oxley compliance efforts for business units implementing e-commerce applications, information management systems and web hosting platforms.

Presentation(s):

Send Email for Eric Tuttle


Assets

6414 - Social Login and BYOD—and Their Impact on Authentication Systems

MP3 Audio Slides Video

Attendees who have favorited this

Please enter your access key

The asset you are trying to access is locked. Please enter your access key to unlock.

Send Email for Social Login and BYOD—and Their Impact on Authentication Systems