As government modernizes its information technology capabilities, the ability to successfully manage the identities of internal and external users – employees, constituents, contractors, partners, suppliers, et. al. – will be more critical than ever. Many of the advanced and emerging IT tools that improve government’s efficiency and effectiveness also alter the security landscape.
Cloud computing, the internet of things, mobile solutions and other technologies are boons to government, but they enlarge the potential attack surface. And as perimeter security becomes a less viable means of protecting the government’s systems and networks, authenticating identity and authorizing access is emerging as the new front in the escalating war with cyber adversaries.
In this webcast, you will learn:
Invited to Speak: