Upcoming Webinar: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication

Posted 5.15.13 by

Stolen credentials? Hacked social network accounts? Not with two-factor authentication! Learn more about how to protect your company and data with a simple security service. Join Dug Song, CEO of Duo Security and Jason Yaeger, Director of Operations/Risk Management & Security Officer of Online Tech as they discuss a cost-effective way to achieve security and compliance with two-factor authentication.

Title: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication
When: Tuesday, June 4, 2013 @2PM ET
Register: Online with GoToMeeting
Description: Never suffer from weak passwords again. According to Mandiant, 100% of security breaches involve stolen credentials. Not a week goes by without news of another high-profile security breach– trusted websites like LinkedIn, LivingSocial, Evernote, and more. And in a cascade of damage, when these sites are breached, passwords are stolen and can be reused to access additional accounts. The impact on your business and the professional reputation of your business can be disastrous.

If you must meet industry compliance standards such as HIPAA compliance or PCI DSS compliance, two-factor authentication is a best practice to fulfill authorization and authentication requirements. Join Dug Song, CEO of Duo Security and Jason Yaeger, Director of Operations/Risk Management & Security Officer of Online Tech as they discuss how to employ two-factor authentication to protect your data and your business.

Dug SongDug Song, CEO of Duo Security

Dug has a history of leading successful products and companies to solve pressing security problems. Dug spent 7 years as founding Chief Security Architect at Arbor Networks, protecting 80% of the world’s Internet service providers, and growing to $120M+ annual revenue before its acquisition by Danaher.

Before Arbor, Dug built the first commercial network anomaly detection system (acquired by NFR / Check Point), and managed security in the world’s largest production Kerberos environment (University of Michigan).

Dug’s contributions to the security community include popular open source security (OpenSSH,libdnet, dsniff), distributed filesystem (NFSv4), and operating system (OpenBSD) projects, and co-founding the USENIX Workshop On Offensive Technologies (WOOT).

Jason YaegerJason Yaeger, Director of Operations/Risk Management & Security Officer, Online Tech

In his three years at Online Tech, Jason has guided the company through successful completion of many audits, including SAS 70 Type I, SAS 70 Type II, SSAE 16, and HIPAA. In addition to overseeing operations across all of Online Tech’s data centers, Jason is also the Vice President of the Southeast Michigan Chapter of 7×24 Exchange.

Prior to Online Tech, Jason was Director of Internet Operations at 20/20 Communications where he spent 8 years developing the company’s wireless and internet initiatives.

More About Two-Factor Authentication:

Evernote Adds Two-Factor Authentication
On Saturday the online SaaS (software as a service) note-collecting Evernote posted a blog with subsequent email stating that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the … Continue reading →

Two-Factor Authentication Helps Fight Unauthorized Access
Access is a huge security concern for every company, no matter the industry. Thus, having an extra layer of technical security in place that employees must go through in order to access a company’s network can help reduce the risk … Continue reading →

Simple Security Improvements with Your Mobile Device
Two, 2-minute security improvements to secure your account My inbox receives between 100 and 200 work emails daily – so far, as of writing this at 4:11pm, I’m up to 155. I won’t share my personal email stats – it … Continue reading →

About Otava

Otava provides the secure, compliant hybrid cloud solutions demanded by service providers, channel partners and enterprise clients in compliance-sensitive industries. By actively aggregating best-of-breed cloud companies and investing in people, tools, and processes, Otava’s global footprint continues to expand. The company provides its customers in highly regulated disciplines with a clear path to transformation through its effective solutions and broad portfolio of hybrid cloud, data protection, disaster recovery, security and colocation services, all championed by an exceptional support team. Learn more at www.otava.com.

Get in touch with an Otava Rep today – just provide us with a bit of information below to get started and we’ll reach out to you shortly!