Training

Governance , Next-Generation Technologies & Secure Development

How to Properly Manage Identities and Secure Documents Within Government Agencies

How to Properly Manage Identities and Secure Documents Within Government Agencies

Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Though it has been around for years, it has recently come back into the spotlight with Gartner's research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of PKI can be summed up in one word - TRUST.

In this webinar we'll review:

  • How government agencies can authenticate identities and securely share sensitive information online;
  • Establishing and managing certificate-based security;
  • How PKI is employed and delivered within all levels of government;
  • Form factors (example - passports) that employ the use of PKI.

Background

At a high level PKI provides assurances that you are dealing with someone trusted, in a secure and confidential manner, enabling sensitive information to be communicated. Although the components of a PKI are generally understood, a number of different approaches and services are emerging. We'll review the components and take a look at some of the approaches.

Within the government space, trust is more than critical - it is essential. Protection of citizens, critical infrastructure, borders and other resources becomes more challenging as attacks become more sophisticated. PKI can help provide solutions for governments in the areas of identity management, secure documents, authentication, encryption and more. Each area where PKI is employed increases the trust factor between government, its citizens, business partners and employees.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.