Security Staff Acquisition & Development, Vulnerability Management, Threat Management, Identity

Why Duke allows users to own their own authentication

The instinct among security teams is often to establish policies that force users to comply with security standards to prevent system compromise. But what if they were given more choice? Shelly Epps, senior director of cyber risk services & program management at Duke Health, and Mary McKee, Duke University’s deputy CISO and senior director of identity management and security services, spoke to Jill Aitoro about enabling buy-in through empowerment of the users.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds