In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?
Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.
In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.
Latest posts by Jeff Edwards (see all)
- The Identity and Access Management Blogs We’re Reading - November 16, 2017
- Survey Reveals Widespread Mismanagement of Privileged Accounts and Access - November 8, 2017
- Access Governance and the Remote Employee - November 7, 2017