Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frictionless Fraud Prevention: Stopping Fraud Without Adding Friction Daryl Huff, VP Advanced Development at Jumio Fraud attack sophistication is constantly evolving and increasing, putting businesses at risk. The Association of Certified Fraud Examiners and Grant ... March 28, 2023 6:00pm Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... 1 month ago | 59 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 2 months ago | 64 mins Cybersecurity 101 Webinar 2: Managing Your Team’s Passwords Jerome Ferrara, LastPass Principal Product Specialist & Lou DeLillo, Senior Solutions Consultant Cybersecurity 101 Webinar 2: Managing Your Team’s Passwords Watch to learn how to educate your team and get them up and running quickly on LastPass, ... 4 months ago | 61 mins Scaling IGA to Cover the Whole Enterprise Kent Purdy, Senior Product Marketing Manager, Opentext and Jim Montgomery, Identity Management Consultant, Trivir Beyond the capabilities of NetIQ Identity Governance, a successful use of it depends on the teams involved knowing how to onboard, manage and maintain... 3 days ago | 60 mins State of Machine Identity Management Chris Hickman, Chief Security Officer, Keyfactor; Ryan Sanders, Senior Director of Product & Customer Marketing For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth ... 3 days ago | 46 mins Identity is the New Attack Surface: A CISO’s Perspective Tim Choi, Ofer Israeli, and CISO Guest Speaker, Yonesy Nunez Identities are a company’s crown jewels for access and privilege in corporate systems, and attackers have begun to focus on compromised identities to ... 3 days ago | 31 mins Turn identity data into a business accelerator with Radiant Logic John Pritchard, Chief Product Officer at Radiant Logic; Every digital interaction requires a chain of decisions to be made across a series of control points utilizing various technologies to authenticate an... April 4, 2023 6:00pm Load more