Video

Why ID Security Must Evolve

Entrust's David Rockvam on How to Mitigate ID Security Risks
Why ID Security Must Evolve

In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's Dave Rockvam. It's time for a security evolution.

But to raise the bar on ID security, organizations first must assess their current gaps and gain a better understanding on where attackers are seeing success, says Rockvam, VP of product management and marketing communications at Entrust.

In a video interview recorded at RSA 2014, Rockvam discusses:

  • Why current ID security strategies are inadequate;
  • Threat trends that are changing the landscape;
  • How organizations can address their ID security gaps.

Under Rockvam, Entrust Certificate Services has seen a rapid expansion, more than doubling since the company went private in 2009. This growth has helped Entrust shift from a mainly perpetual software company to a cloud software-as-a-service company, deriving roughly 60 percent of product revenue from cloud, software-as-a-service or subscription-based offerings. Rockvam is a graduate of Texas Tech University where he received an undergraduate degree in international trade and economics. He also holds a master's degree in business administration from the University of Texas at Dallas.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.