Mark Joynes

About

Mark is Director of Product Management for Entrust PKI, Government & National ID Solutions. An Entrust veteran of 12 years, Mark has over 25 years’ experience in high-tech security. Prior to joining Entrust, Mark provided operational guidance for government secure-systems deployment, certification and accreditation consulting in law enforcement, defense and intelligence environments. Mark’s experience covers operational security policy and management across both private and public sector organizations.

Blog Posts 1-3 of 3

Entrust CEO Talks Credentials, Border Security at INTERPOL General Assembly

November 12, 2010 by Mark Joynes     No Comments

Entrust President and CEO Bill Conner was center stage for the world’s top law enforcement officials this week. On Monday, Conner spoke to global security leaders during INTERPOL’s 79th General Assembly in Doha, Qatar. Conner emphasized the seriousness of the current identity fraud threat landscape, and also outlined the multipurpose smartcard credentialsEntrust recently developed to properly secure [Read More...]

Entrust President and CEO Bill Conner Weighs in on the National Strategy for Trusted Identities in Cyberspace

July 20, 2010 by Mark Joynes     No Comments

As part of President Obama’s Cyberspace Policy Review, a drafted strategy known as the National Strategy for Trusted Identities in Cyberspace (NSTIC) was released to the public for review and comment June 25 through July 19. Developed in collaboration with key government agencies, business leaders and privacy advocates, NSTIC acknowledges the nation’s need for a trusted [Read More...]

Identity-Based Credentialing for All — Enterprises, Governments, Higher Education

June 15, 2010 by Mark Joynes     No Comments

Sometimes it’s hard to fathom how far technology has progressed in some areas, while in others we’ve yet to see necessary advancements that should be critical to the way we live our lives today. Specifically, security vendors are finally providing comprehensive identity and access management solutions that enable physical/logical access, strong authentication and a host [Read More...]