Secure user authentication: Regulations, implementation and methods

Security Secure user authentication: Regulations, implementation and methods:

Identity and Access Management Security School

Secure user authentication: Regulations, implementation and methods

When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors when deciding the best option. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, helps you understand the FFIEC's mandate, choose an authentication option for diverse user communities, and solidify an authentication strategy.

This Content Component encountered an error