Our weblogin site was hit with a flurry of phishing attempts earlier this year. We ought to assume this will happen again. Explore how we can better protect our weblogin users from these attacks.
Internet2 is launching a 'cohortium' to pursue this question.
They have mostly questions. We want answers.11 votes
Right before this Tech Talk several of us in CI-IAM are going to analyze a new technical component in our authentication architecture: the UW Social2SAML gateway. During this proposed session, we'd like to share our analysis and, more so, discuss with other like-minded CI'ers what tools and processes we used to break components into their configuration items and get each one into some sort of configuration management regime. If you're a subject matter expert in this area, please vote for this item and attend. We want to learn from what you're doing!9 votes
What do you collect?
How do you collect it?
Where do you visualize it?
What might you feed to the new ITIL system?6 votes