Hi [[ session.user.profile.firstName ]]

CCW Online Roundtable: Untapped Contact Center Technology Opportunities

Today's Contact Center is all about creating positive and meaningful engagements with every interaction. Data fuels these interactions, but how can the right technologies ensure better insights and higher levels of security?

This webinar is a replay of a Customer Contact Week Executive Roundtable recorded on March 3, 2020 discussing latest innovations in contact center technology. Yubico's Chief Product Officer - Guido Appenzeller - was a featured guest and discusses why strong authentication is vital to protecting systems and data in call centers where shared workstations are the norm.
Recorded Mar 3 2020 68 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Guido Appenzeller, Chief Product Officer, Yubico
Presentation preview: CCW Online Roundtable: Untapped Contact Center Technology Opportunities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • La simplicité au service de l'authentification Jun 24 2020 9:00 am UTC 75 mins
    Arnaud Eschalier (NXO), Fabrice de Vésian (Yubico), Isabelle Diehl (Infinigate), Tony Cilibrasi, (Infinigate)
    Abstract
    Il est de plus en plus complexe pour les organisations de sécuriser l'accès aux périphériques, outils et applications de l'entreprise, pour l'ensemble des salariés, qui plus est avec une croissance des usages en dehors du système d’information.

    La multiplicité des outils, la diversité des connectiques, rendent le sujet de plus en plus complexe, alors même que l'essentiel des fuites de données est liée à des attaques de type phishing ou à des usurpations de comptes.

    Découvrez comment Yubico et NXO permettent de répondre à ces enjeux, en améliorant la sécurité des accès, en simplifiant l'expérience utilisateur, et en rationalisant les coûts.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its partner, NXO. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, and NXO for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials from Yubico AB., its Affiliates, and NXO. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice (https://www.yubico.com/support/terms-conditions/privacy-notice/) offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the privacy policy of NXO (https://www.nxo.eu/politique-de-confidentialite/) for additional information.
  • Comment se prémunir de l’usurpation de comptes avec Yubico Jun 18 2020 9:00 am UTC 75 mins
    Fabrice de Vésian (Yubico), Thomas Schwing (Talc SI), Tony Cilibrasi (Infinigate )
    Alors que les modes de travail évoluent, comment aborder le sujet de l'authentification, dans et en dehors du système d’information ?
    Talc SI en partenariat avec Yubico proposent un webinar pour étudier la réponse à cet enjeu.
    Authentification sur des VPN, solutions cloud (O365), ouvertures de postes: une clé unique pour répondre à différents use cases et renforcer la sécurité avec une expérience utilisateur optimale.

    Speakers:
    Fabrice de Vésian, Channel Manager, Yubico
    Thomas Schwing, Directeur Commercial, Talc SI
    Tony Cilibrasi, BDM, Infinigate

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its partner, Talc SI. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, and Talc SI for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials from Yubico AB., its Affiliates, and Talc SI. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice (https://www.yubico.com/support/terms-conditions/privacy-notice/) offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the privacy policy of Talc SI (https://www.talcsi.com/mentionslegales/) for additional information.
  • Digital Transformation: Are Enterprises Sacrificing Security for Speed? Jun 16 2020 4:00 pm UTC 45 mins
    Jeet Shah (Yubico), Shashank Rajvanshi (RSA), Rajan Barara (Entrust Datacard), Dr. Shimrit Tzur David (Secret Double Octopus)
    Enterprises are racing to modernize their applications and infrastructure. But are these companies sacrificing security and trust for speed?

    In the digital world, applications and infrastructure aren’t the only things that require a digital transformation. Security and authentication must evolve to address new threats of a digital-first and cloud-first world.

    Join Entrust Datacard, RSA, Secret Double Octopus, and Yubico for a roundtable discussion focusing on security strategies and best practices for your digital transformation, including:
    -Developing an ownership strategy for your digital transformation.
    -Securing data, devices, and applications that live outside the company firewall.
    -Understanding common mistakes and misconceptions of modernizing businesses.

    Confidentiality and Data Processing:

    The information you provide in this form will be held in confidence by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: RSA Security LLC, Entrust Datacard Corporation, and Secret Double Octopus Ltd. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, RSA Security LLC, Entrust Datacard Corporation, and Secret Double Octopus Ltd. for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to RSA Security LLC’s, Entrust Datacard Corporation’s, and Secret Double Octopus Ltd.’s own privacy policies for more information about their privacy practices.
  • Securing Google and G Suite Accounts with YubiKeys Jun 10 2020 5:00 pm UTC 75 mins
    Abby Guha Sr. Director, Enterprise Marketing, (Yubico) Chris Streeks Solutions Engineer, Americas (Yubico)
    The mobile security landscape has reached a new milestone. With Google’s recent support for NFC, USB, and Lightning-compatible hardware security keys on iOS, users can now easily and securely access Google apps and services natively on their iPhones and iPads, as they do with their YubiKey of choice on laptops and Android devices.

    Attend this webinar to learn about:
    -The evolving security landscape and the problem with stolen credentials
    -How to secure Google and G Suite Accounts, along with the Advanced Protection Program (APP) using YubiKeys
    -Modern authentication best practices and technology

    We will also show a demo of YubiKeys with Google services. This session will be valuable for businesses and consumers that use Google apps and services, so invite your team members, peers, and friends.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Der Key für eine Passwortlose Zukunft Recorded: May 27 2020 71 mins
    Patrick Schnell (Yubico), Andreas Mangerich (Microsoft Deutschland)
    Sichere Authentifizierung für Mitarbeiter & Remote Worker ist eine der Top-Prioritäten in der IT-Sicherheit - Benutzername und Passwort sind nicht sicher und gelten seit langem als überholt. Zusammen mit Microsoft Deutschland bietet Yubico moderne und sichere Lösungen, mit welchen ganz auf Passwörter verzichtet werden kann.

    Die Kombination aus Microsoft Azure Active Directory und YubiKeys bietet sehr benutzerfreundliche Möglichkeiten, um moderne passwortlose Authentifizierung mittels FIDO2/WebAuthn zu nutzen. Anwender und der Helpdesk werden durch die einfachere Handhabung ihrer Digitalen Identität entlastet, Prozesse werden optimiert und Kosten reduziert. Benutzerkonten sind zu 99.9% weniger gefährdet, wenn starke Authentisierung verwendet wird.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its partner, Microsoft. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, and Microsoft for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice (https://www.yubico.com/support/terms-conditions/privacy-notice/) offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the privacy policy of Microsoft (https://privacy.microsoft.com/de-de/privacystatement) for additional information.
  • Stärken Sie Ihre Belegschaft durch moderne Authentifizierung Recorded: May 26 2020 45 mins
    John Waters von OneLogin und Alexander Koch von Yubico
    Der Zugang zu Unternehmensinformationen wird in der Regel über Passwörter verwaltet. Aufgrund der wachsender von Sicherheitsverletzungen, die hauptsächlich durch schwache oder gestohlene Passwörter entstehen, evaluieren immer mehr Unternehmen alternative Authentifizierungs Optionen.

    Erfahren Sie wie moderne Standards der Authentifizierung Sie auf ihrer Reise von passwortlosen Anmeldung unterstützen können. Unternehmen haben dafür heute die Flexibilität z.B. YubiKeys (Security Keys) oder Biometrie für ihre starke Authentifizierung zu nutzen, ohne die Sicherheit zu vernachlässigen. Gleichzeitig steigern diese Lösungen die Akzeptanz beim Benutzer da der Login prozess stark vereinfacht wird.

    In diesem Webinar sprechen John Waters von OneLogin und Alexander Koch von Yubico über folgende Themen:

    -Wie moderne Authentifizierung heutige Belegschaften beeinflusst
    -Fallbeispiele über WebAuthN/FIDO2
    -Bewährte Praktiken zur Verwendung der WebAuthN-/FIDO2- Authentifizierung, um Ihnen einen sicheren Zugriff auf Unternehmensinformationen Ihrer Organisation zu ermöglichen
  • YubiKeys: Securing an Existing Environment Recorded: May 14 2020 61 mins
    Jason Edgewater and Jeet Shah
    Join Yubico and Fishtech for an interactive session on YubiKeys.

    We will cover the "why" behind YubiKey security including protecting against phishing and man in the middle attacks, as well as how to help your users overcome "push overload."

    We will also demonstrate how to integrate YubiKeys in your current environment with your existing single-sign on provider (including Ping, Okta, Duo, Microsoft Azure), turning on workstation authentication for Windows and Macs, as well as remote access leveraging Cisco AnyConnect VPN and remote desktop.

    Ask us all your questions!
  • The Remote Work Movement Heightens Contact Center Risk Recorded: May 13 2020 53 mins
    Brian Cantor, Principal Analyst, CCW Digital / Abby Guha, Sr. Director Product Marketing, Yubico
    Millions of employees are transitioning into the largest remote workforce that the world has ever seen with an explosion of remote work rising as much as 18x in the last few months.

    Modern contact centers are quickly adjusting to address the global health emergency, and look to enable more agents than ever before to deliver top notch service from home.

    Agents need access to the critical systems and information required to stay productive while ensuring social distancing and other health mandates are followed.

    But while Identity Access Management platforms, remote VPN, and secure computer login are excellent tools to support this work from home movement, are these technologies being optimized for the highest levels of security?

    View this on-demand CCW Digital webinar as we discuss how your contact center can be adequately prepared to deliver customer-centric service without missing a beat with the gold standard of authentication.
  • Go Passwordless: FIDO for Dynamic Workforces Recorded: May 6 2020 60 mins
    Brad Doctor (VMware), Shashank Rajvanshi (RSA), Karen Larson (Yubico)
    Passwords are painful and costly. They reduce the productivity of your employees and your help desk. But they’re required to access all of the resources your employees need. Or are they?

    It’s time to consider passwordless and the ability to support the diverse requirements of your dynamic workforce, while ensuring the highest levels of security and scalability.


    Hear how VMware is looking at the process of going passwordless, lessons they’ve learned and benefits they’re achieving.


    You’ll also get advice from RSA and Yubico experts on:

    - How to address authentication for a diverse set of users and workforce situations
    - Where to start on your passwordless journey
    - What benefits FIDO-based authentication enables
    - How to simplify authentication management for your organization


    A demonstration of the new YubiKey for RSA SecurID® Access will be included. This session is valuable for executives and practitioners alike, so invite your peers and team members.
  • Effective Password Management for Businesses Recorded: May 5 2020 33 mins
    John Duksta - Yubico // Matt Davey - 1Password
    Now more than ever, businesses everywhere are working remotely. The needs of your small but mighty and newly remote team are quickly changing as they each adapt to new and continuously changing situations—all while staying focused on the day-to-day to keep the business running.

    Join experts from Yubico and 1Password for a Q&A panel, where we will share insights on effective password management practices designed specifically for business owners and managers of smaller remote teams of employees.

    Learn about:
    - What it means to be the “IT manager” today when your day job is not IT management
    - The unique cybersecurity challenges businesses without large Security/IT management departments face
    - Why it is critical to secure your password manager with a high assurance form of 2FA, and how to do it
  • Modernizing Workplace Login: Securing Enterprises Recorded: Apr 30 2020 49 mins
    David Treece, Yubico // Corey Williams, Idaptive // Dan Conrad, One Identity
    The workplace is evolving, and with this expansion comes new questions about the solutions employees use to access critical workplace systems and data remotely. To support the recent shift to teleworking, organizations need a range of secure application and desktop authentication approaches to protect against breaches and enable employee productivity.

    Join experts from Yubico, Idaptive, and One Identity in a roundtable Q&A webinar, where they will share insights on solving tough application and computer login usability, productivity, and security challenges within the context of enabling a modern workplace.

    Learn about:
    - Defining the workplace — what it means in this day and age
    - The business advantages of modernizing the workplace and enabling remote workers
    - Emerging threat vectors and the security best practices that effectively mitigate these risks

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: Idaptive, LLC and One Identity, LLC. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, Idaptive, LLC, and One Identity, LLC for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to Idaptive, LLC’s and One Identity, LLC’s own privacy policies for more information about their privacy practices.
  • Modernizing Workplace Login: Securing Enterprises - EMEA Recorded: Apr 29 2020 56 mins
    Nic Sarginson - Yubico // Gerhard Zehethofer - ForgeRock // Allen Storey - Intercede
    Wherever any organization is on its path to modernizing the workplace, they require modern and more secure authentication approaches to protect critical systems and data. Organizations need to provide strong defense against security breaches while keeping the user experience fast and easy to enable productivity.

    Join Yubico, ForgeRock, and Intercede in a roundtable webinar where we together discuss how organizations can solve tough application and computer login usability, productivity, and security challenges.

    Learn about:
    - Defining the modern workplace
    - Top security threats encountered when modernizing workplace login.
    - Best practices to increase security, usability and productivity in the modern workplace.
    - Common security challenges related to remote workers, and how to solve them.


    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its Works with YubiKey partners: ForgeRock and Intercede. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, ForgeRock, and Intercede for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice (https://www.yubico.com/support/terms-conditions/privacy-notice/) offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the respective privacy policies of ForgeRock (www.forgerock.com/privacy-policy) and Intercede (https://www.intercede.com/privacy-cookies) for additional information.
  • Microsoft & Yubico: Enterprise Strong Authentication with YubiKey Recorded: Apr 28 2020 78 mins
    Nic Sarginson & Erik Parkkonen - Yubico // Tarek Dawoud & Aakashi Kapoor - Microsoft
    During this 2-hour briefing, we will take you through Microsoft’s passwordless journey and discuss methods of enabling strong authentication with Microsoft Azure Active Directory and YubiKeys for organizations. We will share scenarios (on-premise, hybrid and cloud) that may be relevant to what you will encounter as you plan, implement, and maintain strong authentication.

    At the end of the presentation, you will learn:

    - How YubiKeys can be used with Microsoft AD, ADFS and Azure AD
    - A deeper understanding of FIDO2/WebAuthn protocol
    - Why you should turn on MFA
    - How to enable your organization to go passwordless
    - How to enroll YubiKeys with Azure AD

    The workshop is geared towards Solution Architects, Security Architects, Cloud Administrators, and Technical Decision Makers with a strong technical background and an understanding of authentication and access principles.
  • Modern CAC/PIV alternatives: Securing government teleworkers & mobile devices Recorded: Apr 16 2020 60 mins
    Danelle Barrett, Principal, Deep Water Point (Fmr Rear Admiral, Dir Navy Cyber Security and Deputy CIO
    Recent global events are driving up numbers of teleworkers/remote workers along with an increased use of personal devices and mobiles phones for access to government systems. This introduces new challenges for government agencies. Unsecured WiFi networks, unmanaged personal mobile devices, and phishing scams make it easy to steal user credentials and difficult to securely manage geographically dispersed teams. CAC and PIV cards are cumbersome to implement for every teleworker and for use with mobile and personal devices. SMS and OTP device-based software authenticators aren’t secure alternatives, and in the case of BYOD/BYOAD, put the government on point to reimburse employees and contractors for mobile costs. Government agencies need to provide enhanced authentication that is secure, doesn’t create high recurring expenses and can enable personnel to securely work in any location, on any device, and across any network.

    Attend this webinar to learn how federal and other government agencies should handle authentication in a telecommuting and mobile-first world:
    - How recent events are necessitating the need for alternative authentication for teleworkers
    - How legacy authentication solutions are ineffective and costly
    - How to deploy highest assurance authentication for teleworkers, mobile derived PIV and BYOD/BYOAD use cases
    - How to ensure highest assurance multi-factor authentication (MFA) for teleworkers that are non PIV/non CAC eligible

    Speakers:
    - Danelle Barrett, Principal, Deep Water Point (Former Rear Admiral, Director Navy Cyber Security and Deputy Chief Information Officer)
    - Jeff Philips, Vice President Government, Yubico
    - Derek Hanson, Vice President Solutions Architecture and Alliances, Yubico
  • Securely Working From Home: Strong Authentication for VPN and Desktop Recorded: Apr 14 2020 52 mins
    Nic Sarginson, Solutions-Yubico EMEA and Chris Streeks, Solutions-Yubico
    With the global health emergency we’re all facing, remote access is the ultimate lifeline for businesses. But as remote working grows, phishing attacks and account takeovers are also on the rise. Hardware-based authentication is critical to protecting against these threats. As workers around the globe access corporate systems, it is imperative that they be given modern solutions to secure access to important information without slowing them down.

    Organizations can modernize their security VPN applications and physical and virtual desktops to enable productivity. The gold standard for security in the form of multi-function hardware security keys can greatly increase security for the enterprise while making the end user experience simple and easy. And let's not forget the massive cost benefits of drastically reducing password and account reset-related calls to the help desk. Attend this webinar to learn more.
  • Go Passwordless for Firstline Workers with Yubico+Microsoft Azure AD Recorded: Mar 31 2020 55 mins
    Melanie Maynes Sr. Product Marketing Manager Microsoft; Andrew Vitollo Sr. Solutions Engineer Yubico
    Firstline workers represent about 2 billion people globally in healthcare, finance, manufacturing, and hospitality to name a few. Making sure they have secure access to data to perform their jobs is critical. But for organizations, the structure isn’t as simple. Meeting compliance mandates while ensuring a frictionless user experience is challenging.

    During this webinar Yubico and Microsoft will share plans on how to:create a passwordless future that is:
    - Cost effective
    - Meets compliance regulations
    - Easy to implement and use
  • 5 Ways to Protect Remote Workers From Account Takeover Recorded: Mar 26 2020 47 mins
    Jerrod Chong, Chief Solutions Officer - Yubico
    In today’s enterprise journey to digital transformation, remote work is on the rise. Advancements in technology make it possible for employees to work from anywhere, but also introduce a new set of challenges for IT departments. Unsecured WiFi networks, unmanaged personal mobile devices, and phishing scams make it easy to steal user credentials and difficult to securely manage geographically dispersed teams.

    While the concept of remote work is not new, it is becoming more prevalent for modern businesses. Recent global events are driving these numbers even higher, making it imperative for organizations to set processes and systems in place that not only secure remote workers, but do so without hindering productivity. We are already seeing hackers taking advantage of the current state of business uncertainty with targeted phishing attacks. Companies need to rapidly increase security planning for workers outside of organizations. But where to begin?

    Join this webinar to learn five critical ways companies can protect their remote workforce from common vulnerabilities such as credential theft, account takeovers, and phishing attacks. In this webinar we will discuss best practices for protecting applications and systems such as:

    - Identity and access management (IAM) platforms
    - Remote VPN access
    - Computer logins
    - Password managers
    - Authenticator applications
  • 2020 Password & Authentication Security on the Path to Digital Transformation Recorded: Mar 18 2020 62 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; Abby Guha, Sr, Director Enterprise Product Marketing, Yubico
    The Ponemon Institute recently surveyed 2,507 IT and IT security practitioners in the United States, United Kingdom, Germany, France, Sweden, and Australia regarding password and authentication behaviors. Additionally, 563 individual users were surveyed to understand the differences in security behaviors between IT security practitioners and individuals. The findings were enlightening in answering questions like:

    What information are businesses and individuals most concerned with protecting? How many respondents admit to reusing passwords for workplace accounts? And how does the state of passwords and authentication impact a company’s ability to progress toward Digital Transformation?

    Register for this webinar to:
    - See how IT security and individual users respond to security threats
    - Understand security behaviors and practices in the workplace
    - Gauge the popularity of passwordless authentication
    - Clarify how businesses can protect customer accounts with strong two-factor authentication
    - Discover the increased risk to businesses with personal mobile devices being brought into the workplace
  • Conveniently Protecting Cryptocurrency Assets Recorded: Mar 12 2020 45 mins
    * Lance Vick, Lead Security Engineer, BitGo, Guido Appenzeller, Chief Product Officer, Yubico
    One of the primary impediments standing between cryptocurrency and mass adoption has been the process for securing the digital assets. Earlier methods created challenging user experiences at either the user or exchange level when trying to ensure protection. Luckily, strong authentication no longer has to be burdensome. This webinar explores how a progressive cryptocurrency exchange adopted and endorsed a secure authentication method that protects its customers' in a way that is as easy to use as it is strong.

    Attend this webinar to:

    * Learn about current perceptions surrounding cryptocurrecy account and exchange security
    * Hear practical advice for better security from BitGo's Lead Security Engineer
    * Explore how a physical, multi-protocol key has become a vital ingredient for wider cryptocurrency adoption and use
  • Dark Reading: Preventing Credential Theft and Account Takeovers Recorded: Mar 10 2020 62 mins
    Andrew Shikiar - CMO, FIDO Alliance & Hormazd Romer - VP Product Marketing, Yubico
    As companies move down a path of Digital Transformation, protecting against end user based threats has become more important than ever. Breaches that expose passwords and grant cyber attackers access to privileged user accounts are now so common that users greet the news with more shrugs than shock, and security experts advise to "assume user credentials have been exposed." Yet, these attacks can be as catastrophic as they are commonplace. Stolen credentials and account takeovers are the footholds cybercriminals use to launch all manner of attacks -- from financial fraud and virtual currency theft, to data breaches and cyber espionage. Watch this webinar to learn how these bread-and-butter cyberattacks work and how to bolster your defenses against them.
Your Key to a Safer Internet
Yubico was founded in 2007 with the mission to make secure login easy and available for everyone. In close collaboration with leading internet companies and thought leaders, Yubico co-created the FIDO U2F and FIDO2/WebAuthn open authentication standards, which have been adopted in major online platforms and browsers, enabling two-factor, multi-factor, and passwordless login and a safer internet for billions of people.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CCW Online Roundtable: Untapped Contact Center Technology Opportunities
  • Live at: Mar 3 2020 11:25 pm
  • Presented by: Guido Appenzeller, Chief Product Officer, Yubico
  • From:
Your email has been sent.
or close