article thumbnail

Internet Identity Workshop 37 Report

Phil Windley

We recently completed the 37th Internet Identity Workshop. In closing circle someone said (paraphrashing) that authentication is solved and the next frontier is authorization. Summary: The latest IIW was great with many high intensity discussions of identity by people from across the globe. The topics were diverse. I tend to agree.

article thumbnail

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs.

CTO 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. By Bob Gourley. More from: [link]. Join the Leaders in Secure Collaboration.

Security 258
article thumbnail

In Memory of Kim Cameron

Phil Windley

But my relationship with him grew into friendship through Internet Identity Workshop (IIW). The idea was that everyone would pay for their own meal since the workshop hadn't collected any money in the registration for that. Microsoft has sponsored the workshop dinner at every in-person IIW we've held. That started a tradition.

Microsoft 133
article thumbnail

Next CIO Champions the Rising Stars of IT in the UK

CIO Business Intelligence

2022 welcomed 26 members to the Next CIO Cohort and throughout the year were connected with a CIO mentor and gained exclusive access to some of the UK’s leading digital, data, and technology professionals through workshops and sessions. 2023 will host a similar series of workshops and will continue the mentoring programme.

article thumbnail

The Balancing Act: Strategies for Integrating Innovation and Security in EdTech

Kitaboo

It’s essential to choose and review the privacy policy and ensure a secure learning environment by using relevant data encryption practices and user authentication features. Regular workshops, security awareness campaigns, and webinars can educate all stakeholders about the threats and tell them how to use digital environments safely.

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

Commonly, this involves using scare tactics in an attempt to bypass the user's rational mind and emotionally manipulate them into action without them second-guessing the authenticity of the request. Multi-factor authentication (MFA): If an employee receives a suspicious request, MFA can save the day if used correctly.