Securing End User Identities

Episode 4 of the Dark Reading Cybersecurity Crash Course

Not so long ago, the notion of “endpoint security” focused on the management of desktop devices. But today’s end user employs a wide variety of devices in a wide variety of locations – many of which don’t belong to your organization. How can enterprises build a security strategy that identifies the end user and applies the appropriate security – no matter what their location or device? This session provides new insights on securing your end users.

Available:
On Demand
Duration:
1h 00min

Attend this webinar, you'll learn:

  • How to evolve from a device-centric endpoint security program to an identity-centric one
  • How to manage identities securely throughout their lifecycle  
  • What tools and techniques can help

Featured Speaker

  • John  Hawley
    John Hawley
    VP, Portfolio Strategy - Security Business
    CA Technologies

    John is Vice President of Portfolio Strategy for Security solutions at CA Technologies. He helps define the CA Security vision and evaluates new portfolio growth opportunities. John works with large enterprises using Identity and Access Management to achieve more agile and collaborative, yet secure, business interactions.

    John has held previous roles in Product Management and Technical Sales. Prior to CA, John founded and managed a venture funded SaaS company providing performance monitoring for cloud applications. Earlier, John managed Solutions Engineering and Security teams at Internet services provider UUNET and consulting firm Ernst & Young, LLC.

    John holds an MBA from the Katz School of Business at University of Pittsburgh and a BS in Information Systems from Virginia Tech.