Internet of things Security

In-depth look at the next Secure Technology Alliance webinar series

ENGLEWOOD, Colo., April 6, 2022 (GLOBE NEWSWIRE) — The tech space benefits from a near-constant stream of innovations that challenge industries to adapt or fall behind. The access control sector is no exception. The industry is witnessing the advanced integration and uses of mobile devices for physical and logical access control, cross-platform data exchanges, and enhanced accreditation. The Secure Technology Alliance’s upcoming webinar series, “What’s Next in the World of Access Control,” will look into the future of the industry and explore ways to create new solutions in response to technological advances.

The two-part webinar series will take place on April 14 and 26, 2022 at 2 pm ET (11 am PT). Attendees will learn about the scope of physical and logical access control and the various associated use cases. This includes access control considerations in both the public and private sectors. Registration details can be found on the Secure Technology Alliance website.

“Access control has gone far beyond PIV cards and fobs. The industry has become multifaceted and users are looking for adaptable and secure ways to confirm their identity and credentials without compromising ease of use,” said Jason Bohrer, CEO of the Secure Technology Alliance. “This webinar series aims to identify potential industry disruptors and empower attendees to stay ahead of future challenges.”

The webinars will feature presentations from the following speakers:
Colin Doniger, Department of Homeland Security; Mark Dale, XTec; John Jacobs, IDEMIA; Lars Suneborn, IDTP; Roger Roehr, Integrated Security Technologies; Jason Bohrer, Secure Technology Alliance

Security professionals, credential providers, developers, and access control relying parties can benefit from topics covered in the upcoming webinar series, including:

  • An overview of trends in credentials and authentication devices
  • The application of Attribute Based Access Control (ABAC)
  • The development of applications for access control on mobile devices
  • A look at clearinghouse services, risk-based factors, and growth opportunities
  • Centralized vs. Decentralized Identity Management and Pros and Cons of Both Approaches

To participate in the creation and development of future webinars, please visit the Alliance website for membership information. Membership and participation in Alliance activities enables organizations of all sizes, and their respective individual members, to not only be at the forefront of digital security, but also help shape it by sharing expertise, discussing with thought leaders industry and influencing industry best practices.

For ongoing updates on the Secure Technology Alliance, visit the organization’s LinkedIn page and follow @SecureTechOrg on Twitter.

About the Secure Technology Alliance
The Secure Technology Alliance is the leading association in the digital security industry. The Alliance brings together the leading providers and adopters of end-to-end security solutions designed to protect privacy and digital assets in the payment, mobile, identity and access, healthcare, transportation, and emerging Internet markets of things (IoT).

The Alliance’s mission is to stimulate the understanding, adoption, and widespread application of connected digital solutions based on secure chips and other technologies and systems needed to protect data, enable secure authentication, and facilitate commerce.

The Alliance is powered by its US-focused member companies. They collaborate by sharing industry expertise and best practices through industry and technology tips, focused events, educational resources, industry outreach programs, advocacy, training and certification. Through participation in the Alliance’s breadth of activities, members strengthen personal and organizational networks and gain the knowledge to build the business strategies necessary to market safe products and services in this dynamic environment. For more information, visit

Sherlyn Rios
Montner Tech PR

About the author


Leave a Comment