| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
The presenter will discuss the evolution of Organizational Identity Fraud and the abuse of
organizational identity assets from the beginning of the World Wide Web to its current incarnation.
They will assess the state of organizational identity asset protection programs and answer the question
?Are organizations prepared for the world of software defined everything, nation state threat actors and
coexisting with the Internet of Dangerous Things??
The presentation will update the definition of Corporate Identity Assets and introduce relevant, novel,
and forward-thinking threat catalog items associated with Organizational Identity Fraud. The presenters
will articulate control affinities and practical life-cycle management practices for consideration, positing
how transformational trends in mobility, computing and social media conspire to make organizations
more vulnerable, while demonstrating how marketing, security and operations can join forces to turn
the tables on their adversaries by becoming ?hard targets?.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast