Social Network For CISO (Chief Information Security Officers)
In the age of the data breach there are no more secrets. Name, address, date of birth and Social Security number have been the de facto identity attributes for years. But as this information has become more exposed it’s time for organizations to rethink identity proofing and take a more holistic approach to knowing who they are doing business with online.
1: Learn why there are no more secrets.
2: Discover why we must stop relying on traditional attributes for ID proofing.
3: Learn to take a holistic view of identity proofing.
Speakers: Gregory Crabb, Paul Grassi
Greg Crabb is responsible for protecting the Postal Service—its employees, customers, critical infrastructure and information systems—against present and future digital threats. He leads a team of information security professionals in defining and executing the Postal Service’s cybersecurity strategy, as well as educating stakeholders and the public about the information security mission. He directs, in conjunction with the Inspection Service, the investigative response to violations of laws that defend the nation’s mail system from cybercrime and misuse. Crabb also leads efforts in developing secure digital solutions designed to support new and innovative product offerings and strengthen the Postal Service’s business processes.
Paul Grassi is the SVP of Cybersecurity for Easy Dynamics Corp. Grassi is responsible for helping clients mature effective cybersecurity programs via an appropriate mixture of policy, process, technology and operations. Prior to joining EDC, he was the Senior Standards and Technology Advisor and Lead for Digital Identity at the National Institute of Standards and Technology (NIST). His portfolio included NIST 800-63, leading contributions to NIST 800-53 and the Cybersecurity Framework (CSF), multiple identity projects in the National Cyber Security Center of Excellence, and leading USG activity in various standards orgs, namely FIDO, IETF and X9. Grassi has a broad background of technology and management consulting, and significant experience developing enterprise security strategies and systems, having served a range of Fortune 500 companies, as well as domestic and foreign governments.