Identity Squatting: Laws, Tools and Methods for Security Professionals

In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?
Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.
In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.
This article was written by Jeff Edwards on March 20, 2017
Jeff Edwards
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017