Chief Technology Officer, EMILY’s List
Security Key Deployment for Political Organizations
EMILY’s List has moved to 100% security key for second factor with its staff. Mike will discuss building organizational buy-in, challenges for deployment, and best practices.
Key Takeaway: Attendees will recognize the importance of key-based authentication and phishing mitigation for high risk organizations, getting over difficulties with staff who are resistant to technological change, risks and challenges with a partially remote staff moving to key based authentication.