The buzz: Are you really \u201cyou\u201d? Authentication techniques designed to confirm you are who you say you are, typically entail one or more of three techniques: Something I have, Something I know, Something I am. Thus, accessing the things and information we value can range from easy \u2013 like physical keys to our home and our car \u2013 to complex passwords intended to protect the privacy of our medical records and national secrets. But we're in a hurry. And as we clamor for faster, easier processes, persistent thieves are toiling overtime to continue stealing our identities and our money. Aye, there's the challenge. The experts speak. Gerlinde Zibulksi, SAP: \u201cMy password is SECURE.\u201d Hillel Zafir, HMS Technology Group: \u201cA bad plan well executed is better than a good plan not executed (George S. Patton, Jr.). Richard McCammon, Delego: \u201cThose who cannot remember the past are condemned to repeat it (George Santayana). Join us for Data Security in the Age of Credit Card Breaches \u2013 Authentication.