- If the pandemic was a driver for digital transformation, where do digital identities fit in?
- Best practice in managing the complexity of issuing, provisioning and renewing digital identities
- Why does Zero Trust Identity matter to governance?
Join this teissTalk to answer some of the biggest questions facing the Information Security industry including:
Jenny Radcliffe, also known as “The People Hacker,” is a world renowned Social Engineer, hired to bypass security systems through a no-tech mixture of psychology, con-artistry, cunning and guile.
Jenny is a sought after keynote speaker, panelist and moderator at major conferences and corporate events, both in-person and online, is a TEDX contributor and is host of her own multiple award winning podcast series.
Sarah is an energetic and tenacious Director with over 20 years experience delivering, and advising c-suite on large scale Business & ICT Continuity, cybersecurity, data protection and resilience programmes.
Sarah has been voted one of the ‘most influential women in UK tech’ and ’top 50 most influential women in cybersecurity’ by her peers.
As a security leader with over 20 years of experience in Security and IT, I find value in aligning security and technological initiatives with the business goals, ensuring that they are supported in execution by mature processes, as well as by strong personal networks of trust across the organization. And I always like to ask myself: Could we do this in another way?
Jason has 20 years of experience researching, innovating, educating markets, developing intellectual property, and contributing to national-level guidance and consortium standards. He works closely with enterprise companies daily to synthesize managed PKI security solutions that meet real-world operational needs.
Jason is an experienced security technology innovator. The CTO of PKI for Sectigo is responsible for facing customers, researching, innovating, educating, and contributing to strategy, national level guidance, intellectual property development, and consortium standards. Solving real business problems by synthesizing security state of the art with real world operational needs is what Jason does on a daily basis.
Jason has previous experience in complex data structures and Geographic Information Systems, especially in the fields on climate statistics and spatial mathematics. Jason worked as an architect and developer of complex data structures and mathematical problems related to GIS systems for the oil and gas industry.
Register today and get access to every episode of teissTalk.