Security Secure user authentication: Regulations, implementation and methods:
Identity and Access Management Security School
Secure user authentication: Regulations, implementation and methods
When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors when deciding the best option. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, helps you understand the FFIEC's mandate, choose an authentication option for diverse user communities, and solidify an authentication strategy.