Vice President for Information Technology, University of Georgia
Protecting sensitive information requires more than passwords. Multifactor authentication—using hardware tokens—is being deployed at UGA to add additional protections. This panel will discuss the evolving threat landscape surrounding user authentication, flexible technical architectures supporting multifactor authentication, and policy implications supporting adoption at a complex, highly decentralized, flagship research institution.
Hear about the evolving information security threat landscape. | Discuss how multifactor implementations can integrate into complex, decentralized technical architectures. | Discuss business functions, user requirements and usability, and policy considerations.