Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frictionless Fraud Prevention: Stopping Fraud Without Adding Friction Daryl Huff, VP Advanced Development at Jumio Fraud attack sophistication is constantly evolving and increasing, putting businesses at risk. The Association of Certified Fraud Examiners and Grant ... March 28, 2023 6:00pm Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... 1 month ago | 59 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 38 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 1 week ago | 37 mins Scaling IGA to Cover the Whole Enterprise Kent Purdy, Senior Product Marketing Manager, Opentext and Jim Montgomery, Identity Management Consultant, Trivir Beyond the capabilities of NetIQ Identity Governance, a successful use of it depends on the teams involved knowing how to onboard, manage and maintain... 3 days ago | 60 mins State of Machine Identity Management Chris Hickman, Chief Security Officer, Keyfactor; Ryan Sanders, Senior Director of Product & Customer Marketing For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth ... 3 days ago | 46 mins 360 Degree View of a Customer with Deloitte and ForgeRock Rajoo Nagar - Director, Product Marketing at Forgerock; Chad Veldhuizen, VP Solution Delivery, CIAM at Deloitte Let’s face it, today’s digital world is an incredibly crowded marketplace. Businesses must compete fiercely to capture the attention of customers and ... March 29, 2023 5:00pm Public Key Infrastructure as a Service vs. Traditional PKI Alon Nachmany, Field CISO, AppViewX While Public Key Infrastructure (PKI) is fundamental to enterprise security, traditional PKI deployments are often complex, expensive and a burden to ... 3 days ago | 35 mins Turn identity data into a business accelerator with Radiant Logic John Pritchard, Chief Product Officer at Radiant Logic; Every digital interaction requires a chain of decisions to be made across a series of control points utilizing various technologies to authenticate an... April 4, 2023 6:00pm Prevent account takeover fraud in seconds using phone intelligence Michael Becker - Identity Praxis, Van Hoeylandt Bram - Proximus, Surash Patel - telesign and Pravesh Arora - telesign As we reflect on the year gone by, something we can all agree on is that cybercrime isn’t showing signs of slowing down. One area of concern is Acco... 1 week ago | 57 mins Load more