Skip to content
Today: Friday, May 16 2025
eema.org
eema.org
eema.org

eema.org

  • Home
  • Cybersecurity Trends
    • 5 Simple Things You Can Do to Be More Secure Online
    • Digital Identity: Definition & the Key Risks
    • Microsoft Sponsors and Hosts EEMA’s 35th Annual Conference
  • Data Privacy and Protection
    • Digital Identity Management: 4 Ways to Win Customer Trust
    • Digital Identity Technology: Common Misconceptions
    • InfoCert Joins Debate on eIDAS 2.0, Identity Schemes and Digital Wallets as Sponsor of the EEMA Annual Conference
    • Microsoft Sponsors and Hosts EEMA’s 35th Annual Conference
    • InfoCert Joins Debate on eIDAS 2.0, Identity Schemes and Digital Wallets as Sponsor of the EEMA Annual Conference
    • EEMA Training launches with focus on eIDAS, Self-Sovereign and National Identity, Blockchain, EU Legal Frameworks and Cyber Security
  • Cybersecurity Threats
    • How to Choose the Right eSecurity Company for Your Business
    • Tech Services: Is E-security Overrated?
  • Contacts
  • Call for papers
  • Click here for more info.
  • Conference website
  • Contacts
  • EEMA Training launches with focus on eIDAS, Self-Sovereign and National Identity, Blockchain, EU Legal Frameworks and Cyber Security
  • eID Interoperability Conference- OpenID roundtable( eema.org )
  • https://www.eema.org/isse-2017-future-digital-security-trust/
  • I did a presentation at the EEMA eID Interoperability conference last month on alternatives to “consent” in federated access management.
  • InfoCert Joins Debate on eIDAS 2.0, Identity Schemes and Digital Wallets as Sponsor of the EEMA Annual Conference
  • Microsoft Sponsors and Hosts EEMA’s 35th Annual Conference
  • OASIS Security Track
  • Privacy Policy
  • Program
  • Visit the EEMA website for more information
  • Wednesday 13, of course hosted by friendly Couchsurfers . The program is quite interesting, I’m especially looking forward for the keynote
© All rights reserved. Proudly powered by WordPress. Theme NewsMarks designed by WPInterface.
News Flash
5 Simple Things You Can Do to Be More Secure Online

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Posted by Fletcher Turner
Digital Identity: Definition & the Key Risks

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Posted by Fletcher Turner
Digital Identity Management: 4 Ways to Win Customer Trust

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Posted by Fletcher Turner
Digital Identity Technology: Common Misconceptions

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
Posted by Fletcher Turner
How to Choose the Right eSecurity Company for Your Business

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Posted by Fletcher Turner
Tech Services: Is E-security Overrated?

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
Posted by Fletcher Turner

LIGHTest

Posted on August 9, 2022October 16, 2024
Posted by Fletcher Turner
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Tech Services: Is E-security Overrated?
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
Posted in Cybersecurity Trends

LIGHTest

Posted on August 9, 2022October 16, 2024
Posted in Cybersecurity Trends

ISSE Conference 2022

Posted on August 2, 2021March 17, 2025
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024

Breaking News

5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
  • Trending
  • Latest
  • Opinion
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Tech Services: Is E-security Overrated?
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Tech Services: Is E-security Overrated?
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Tech Services: Is E-security Overrated?
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Estimated read time 3 min read
Posted on December 14, 2023September 25, 2024
by Fletcher Turner

Not a week goes by without a case of data breach worldwide. Schools, social media accounts, websites, factories, and government…

Learn More
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Estimated read time 3 min read
Posted on September 13, 2023September 25, 2024
by Fletcher Turner

Digital services feature prominently in different aspects of our everyday lives. Whether it’s business, work, or individual systems, our online…

Learn More
Digital Identity Management: 4 Ways to Win Customer Trust
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Estimated read time 3 min read
Posted on July 7, 2023September 25, 2024
by Fletcher Turner

When it comes to business, digital identity management primarily means how a customer’s information is collected, processed, stored, and accessed.…

Learn More
Digital Identity Technology: Common Misconceptions
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Estimated read time 3 min read
Posted on April 11, 2023September 25, 2024
by Fletcher Turner

No one would worry about digital footprints and other terms if this were in the 50s or a few years…

Learn More
How to Choose the Right eSecurity Company for Your Business
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Estimated read time 3 min read
Posted on February 9, 2023September 25, 2024
by Fletcher Turner

Selecting the right e-security firm that matches your company’s needs will take some time and effort. It’s a major decision…

Learn More
Tech Services: Is E-security Overrated?
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Estimated read time 3 min read
Posted on January 5, 2023September 25, 2024
by Fletcher Turner

Recently, there’s been a lot of talk about attacks on company computers and the damage they can cause. Many people,…

Learn More
Posted in Cybersecurity Trends

LIGHTest

Estimated read time 3 min read
Posted on August 9, 2022October 16, 2024
by Fletcher Turner

An ever increasing number of transactions are conducted virtually over the internet. How can you be sure that the person…

Learn More
Posted in Cybersecurity Trends

ISSE Conference 2022

Estimated read time 1 min read
Posted on August 2, 2021March 17, 2025
by Fletcher Turner

ISSE provides the ideal platform for the dissemination, qualification and discussion of the key European Commission security objectives and policy…

Learn More

Recent Posts

  • 5 Simple Things You Can Do to Be More Secure Online
  • Digital Identity: Definition & the Key Risks
  • Digital Identity Management: 4 Ways to Win Customer Trust
  • Digital Identity Technology: Common Misconceptions
  • How to Choose the Right eSecurity Company for Your Business

Just For You

5 Simple Things You Can Do to Be More Secure Online
Posted in Data Privacy and Protection

5 Simple Things You Can Do to Be More Secure Online

Posted on December 14, 2023September 25, 2024
Digital Identity: Definition & the Key Risks
Posted in Data Privacy and Protection

Digital Identity: Definition & the Key Risks

Posted on September 13, 2023September 25, 2024
Posted in Cybersecurity Trends

Digital Identity Management: 4 Ways to Win Customer Trust

Posted on July 7, 2023September 25, 2024
Posted in Cybersecurity Trends

Digital Identity Technology: Common Misconceptions

Posted on April 11, 2023September 25, 2024
Posted in Cybersecurity Threats

How to Choose the Right eSecurity Company for Your Business

Posted on February 9, 2023September 25, 2024
Posted in Cybersecurity Threats

Tech Services: Is E-security Overrated?

Posted on January 5, 2023September 25, 2024
© All rights reserved. Proudly powered by WordPress. Theme NewsMarks designed by WPInterface.