Smarter Identity Management for Government

Details

The sprawl of enterprise computing has made obsolete the concept of perimeter security, long considered the foundation of digital defense. The new perimeter is pixelated, comprising millions of users equipped with mobile devices accessing data and services in the cloud. To bring order to this new frontier, enterprises are relying on Identity, Credential, and Access Management (ICAM) to establish security at the source. This session will delve into specific ways that ICAM can deliver security.

View this PDF to learn more.

Speakers:

LaChelle Levan
Acting Director, Federal Identity, Credential and Access Management (FICAM) Program Office, General Services Administration

Ted Girard
VP Public Sector, Okta