Skip survey header
0%

ISSA Web Conference - Identity Management: Are You Really a Dog Surfing on the Internet? (June 25, 2013)

Thank you for attending the ISSA Web Conference - "Identity Management: Are You Really a Dog Surfing on the Internet?" on June 25, 2013. Please complete the following quiz based on information presented during the conference. After successful completion of the quiz, a message will appear indicating you have passed (or neglected to pass).

A passing message or "Certificate of Attendance" can be printed and used as verification of your participation. Please PRINT this page and use it to submit CPE (continuing professional education) credit in accordance with the guidelines of the certifying organization.
This question requires a valid email address.
3. How satisfied are you with the educational content of the ISSA Web Conferences?
Very SatisfiedSatisfiedNeutralDissatisfiedVery DissatisfiedNot Applicable
4. Which of the following educational subjects are the most valuable to you?
Space Cell Very ValuableValuableSomewhat ValuableNot Valuable
Application Security
Cryptography
Data Protection
Disaster Preparedness
Endpoint Security
Forensics
Governance, Risk & Compliance
Identity Management
Incident Response
Information Security Ethics
Legal/Regulatory Trends
Physical Protection of IT Assets
Research & Trends
Securing the Mobile Workforce
Security and Third Party Vendors (Cloud, SaaS, etc)
Security Awareness
Strategy & Architecture
Threat Updates
6. According to Malcolm Harkins, what do you need to do in order to start building a trust model? *This question is required.
7. According to Malcolm Harkins, once lost, private data cannot be reclaimed. *This question is required.
8. According to Malcolm Harkins, the internet is becoming a distributed virtual network that is neither collaborative nor private. *This question is required.
9. According to Nathan Moon, "user management concepts" are critical for businesses wanting a central component of security strategy. *This question is required.
10. According to Nathan Moon, which technology change evolved within identity management space over the years? *This question is required.
11. According to Nathan Moon, vendors are still slow to adopt open authentication and authorization standards. *This question is required.
12. According to Jaimon Jose, electronic and physical identities are growing farther apart over time. *This question is required.
13. According to Jaimon Jose, organizations should: *This question is required.
14. According to Jaimon Jose, BYOD brings new risks and values because an organization is not able to take control of the device. *This question is required.