Speakers

Sort by
Newest
Trending
1-5 of 5
Filter
Martin Zugec
Senior Architect - Technical Marketing at Citrix
active directory, analytics, app store (ios), authentication, authenticator, authorization, automation, best practice, big data, biometrics, botnet, brute-force attack, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer security, dark web, desktop virtualization, email, end user, enterprise, exploit (computer security), facebook, gmail, google account, google chrome, google voice, group policy, internet of things, legacy system, login, machine learning, man-in-the-middle attack, mentorship, microsoft windows, mobile app, mobile phone, mobility, multi-factor authentication, nap, networking, ntfs, one-time password, operating system, password, plug-in (computing), powershell, qr code, replay attack, risk, risk assessment, secure communication, security token, shell (computing), sim card, single sign-on, social media, software , start menu, taskbar, technology, the avengers (2012 film), thin client, time-based one-time password algorithm, understanding, universal windows platform, universal windows platform apps, user (computing), virtualization, windows 10, windows 7, windows xp, workspace
Oscar Day
Product Manager at Citrix
active directory, authenticator, business, citrix cloud, citrix synergy 2019, citrix systems, cloud, collaboration, email, enterprise, google authenticator, identity document, internet, login, mobility, multi-factor authentication, net neutrality, netscaler, networking, one-time password, password, passwordless authentication, qr code, sharefile, sharepoint, single sign-on, software , symantec, technology, time-based one-time password algorithm, virtualization, web portal, workspace
Ricardo Feijoo
Distinguished Engineer at Citrix
active directory, authenticator, business, citrix cloud, citrix synergy 2019, citrix systems, cloud, collaboration, email, enterprise, google authenticator, identity document, internet, login, mobility, multi-factor authentication, net neutrality, netscaler, networking, one-time password, password, passwordless authentication, qr code, sharefile, sharepoint, single sign-on, software , symantec, technology, time-based one-time password algorithm, virtualization, web portal, workspace
Daniel Feller
Lead Workspace Architect at Citrix
active directory, android (operating system), authentication, authenticator, authorization, biometrics, bluetooth, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, dropbox (service), email, end user, enterprise, facebook, firefox, firewall (computing), gmail, google account, google chrome, google drive, google play, google voice, ios, ios jailbreaking, itunes, man-in-the-middle attack, mobility, multi-factor authentication, networking, office 365, one-time password, onedrive, operating system, password, phishing, qr code, replay attack, security token, single sign-on, social media, software , tablet computer, technology, time-based one-time password algorithm, transport layer security, url redirection, user (computing), virtualization, windows 10, workspace, world wide web
Kelley Robinson
Developer Evangelist at Twilio
abstraction (computer science), amazon elastic compute cloud, api, apple inc., appsec, authentication, big data, bioinformatics, biometrics, call centre, category theory, computer programming, data transformation, database, database index, domain name, domain-specific language, end user, equifax, financial transaction, general data protection regulation, icloud, information security, interactive voice response, internet, java (programming language), java virtual machine, knowledge, lastpass, law, library (computing), linkedin, mapreduce, medical prescription, monad (functional programming), multi-factor authentication, myspace, numpy, object-oriented programming, onboarding, owasp, password, personal data, personal identification number, phishing, program optimization, python (programming language), quantization (signal processing), question, scala (programming language), scripting language, security token, sms, social engineering (security), social science, sql, statistics, teacher, text messaging, theory, time-based one-time password algorithm, troy hunt, twilio, type class, type safety, type system, user-defined function, utility, world wide web, yahoo! data breaches
1