This session addresses the technologies, business processes, policy considerations, and standards that define and shape today’s strong identity and strong authentication practices. What makes for a strong identity that can be trusted by public and private sector institutions today? What is the relationship between a strong identity and strong authentication? Are they synonymous? What are today’s pitfalls in today’s identity and authentication practices? How does risk management factor into the equation and what are the consequences for tomorrow as the state of the art evolves?
- What is the real world doing about authentication?
- Four technologies that will help kill usernames and passwords
- Additional Topics TBA