Identity Squatting: Laws, Tools and Methods for Security Professionals

In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?

Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.

In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.

Jeff Edwards
Follow Jeff

Jeff Edwards

Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff

Latest posts by Jeff Edwards (see all)