Hi [[ session.user.profile.firstName ]]

Authentication 2.0 - Strengthening Authentication Measures for Mobile Security

As remote working become the new norm; cloud services, smart mobility initiatives, and bring-your-own-device (BYOD) policies have taken centre-stage and authentication measures have become ever more important. During this session, you will learn how to leverage existing IDs, smart cards and mobile phones for secure access extension.
- Using multifactor authentication to make authentication stronger without disrupting workflows
- Implementing differing levels of access based on the overall risk and responsibility of the users
- Relying on transparent, layered security capabilities for a security boost, without affecting user experience
- Using Advanced Fraud Detection measures such as location tracking and device information to limit access to trusted devices
- Leveraging behavioural analysis and forensics capabilities to better monitor and analyse processes
Recorded Feb 25 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Dan Raywood, Speakers: Munawar Valiji, Katherine Buller & Vincent Blake.
Presentation preview: Authentication 2.0 - Strengthening Authentication Measures for Mobile Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Thinking Out cLoud - Lessons & Failures in Cloud Security Recorded: Feb 25 2021 54 mins
    Stuart Hirst, Principal Cloud Security Engineer, Just Eat
    Despite growing cloud adoption, many security professionals still highlight the cloud as the primary area of vulnerability within their business. In this talk, Stu will describe what's it's like to embark on a journey of attempting to secure data, applications and infrastructure in cloud-first, extremely agile and fast-paced companies. The talk covers areas such as how to establish cloud risk frameworks, how to address common issues, how to prevent incidents and how to automate across complex environments.
  • Authentication 2.0 - Strengthening Authentication Measures for Mobile Security Recorded: Feb 25 2021 60 mins
    Moderator: Dan Raywood, Speakers: Munawar Valiji, Katherine Buller & Vincent Blake.
    As remote working become the new norm; cloud services, smart mobility initiatives, and bring-your-own-device (BYOD) policies have taken centre-stage and authentication measures have become ever more important. During this session, you will learn how to leverage existing IDs, smart cards and mobile phones for secure access extension.
    - Using multifactor authentication to make authentication stronger without disrupting workflows
    - Implementing differing levels of access based on the overall risk and responsibility of the users
    - Relying on transparent, layered security capabilities for a security boost, without affecting user experience
    - Using Advanced Fraud Detection measures such as location tracking and device information to limit access to trusted devices
    - Leveraging behavioural analysis and forensics capabilities to better monitor and analyse processes
  • Solving the Identity Crisis: IAM for the Digital Age Recorded: Feb 25 2021 46 mins
    Manoj Kumar, Director - Identity and Access Management, Philip Morris International
    As organisational complexity increases, the role of identity in protecting information assets has never been more crucial. Increased connectivity and digital transformation mean that enterprises are managing users across multiple platforms, applications and devices, and, as the enterprise perimeter dissolves with multiple third party suppliers the situation is only becoming more complex. During this session the speakers will share his insight into how to develop an identity and access strategy that is fit for purpose in the digital age.
    - Developing a robust governance strategy to manage identity and access in the enterprise
    - How to create a hybrid model that works for all environments, systems, and users
    - Dealing with the increasing federation of identity across digital ecosystems and analysing the risks of compromise on customer and staff identity
    - Integrating third parties and cloud into an identity and access management strategy
  • Embedding Cyber Security into Digital Transformation Recorded: Feb 24 2021 60 mins
    Moderator: Guy Harpak, Speakers: Simon Cole, Ledum Maeba & Amitabh Singh
    Organisations are under constant pressure to accelerate the pace of change in order to meet commercial business demands and technology investments such as firewalls, anti-virus, malware detection, and DDoS protection are essential to prevent potential breaches. During this session, the panel of experts will help you understand how to capitalise on digital strategies to create digitised operations that are scalable, efficient, and agile.
    - Scheduling security consultations when implementing new technologies or enhancing legacy systems
    - Mitigating risks when replatforming legacy systems onto secure native cloud infrastructure
    - Discussing the IoT potential to infer trends, reduce operating costs, predict maintenance needs, and better manage stock levels
    - Bridging the IT & OT Gap - A holistic approach to enhance business safety, traceability, and confidentiality
  • Threat Intelligence Excellence: Detecting and Responding to Cyber Attacks Recorded: Feb 24 2021 60 mins
    Moderator: Michael Hill, Speakers:Jörgen Mellberg, Quentyn Taylor & James Byrne.
    Since remote work became the new normal, there are more and more opportunities for malware to spread very quickly. Mobile and IoT devices now store tremendous amounts of data about their users creating a much larger attack surface. As attacks are becoming more sophisticated, businesses need to rethink their IT infrastructures, strengthen their networks and build resilient processes to recover quickly in the event of disruption and maintain business continuity.
    - Discussing best in class strategies and real-life solutions to tackle cyber threats and social engineering
    - Ensuring a secure by design approach to remote access capacity and scalability
    - Streamlining threat processes by automating vulnerabilities’ classification and escalation
    - Reducing the impact of organisational silos to create an effective business continuity plan
  • Building a Cyber Threat Intelligence Programme to Stay Ahead of Adversaries Recorded: Feb 24 2021 42 mins
    Keith Nicholson, Head of Cyber Threat & Vulnerability, HM Revenue & Customs (HMRC)
    From enabling security teams to effectively respond to incidents to ensuring investment decisions focus on practical real work risk; a cyber-threat intelligence function can deliver value across operational and strategic requirements. However, it can be difficult to know where to start, how to cut through the buzz words to focus on the value proposition for your organisation. In this session we will discuss how to establish a threat intelligence function aligned to strategic objectives and capable of delivering tangible value.
    - Laying the foundations, key pre-requisites to consider before investing in your new function
    - Defining intelligence requirements with examples of key use cases and benefits
    - Ensuring that your intelligence function brings clarity to risk decisions and focus on the organisation risk exposure
    - Effective data management tips for storing, analysing, retrieving your intelligence data
  • Risk Briefing: Navigating the New Threat Landscape Recorded: Feb 23 2021 55 mins
    Lee Howard, Head of IT Security, Risk & Shared Services, N Brown Group
    As organisations undertake unprecedented structural changes, digital transformation and connectivity, the digital security perimeter is evolving; this talk will discuss the leading-edge topics of risk management and the protection of assets for the modern enterprise.
    - What are the greatest threats for the coming year?
    - What technology will most impact the future of cybersecurity?
    - What data breaches or ransomware attacks or other threats will cause the most harm?
    - Cybersecurity predictions and insights on current and emerging threats and technologies
    - Discussing best in class strategies and real-life solutions to tackle cyber threats and social engineering
  • Eliminating the Blind Spots to get Better Visibility and Control Over your Data Recorded: Feb 23 2021 61 mins
    Moderator: Maxine Holt. Speakers: Craig McEwen, Lorraine Dryland & Cherry Colby.
    Data privacy continues to be a hot topic for infosecurity professionals and lawmakers. Following GDPR’s activation in May 2018, the California Consumer Privacy Act (CCPA) applies stringent regulations that are entirely new to the United States. As oversight increases how companies can quickly adapt, comply, and take full control of their data.
    - Identify and overcome threat detection blind spots
    - Storing, classifying, and prioritising data across a distributed network with end-to-end encryption
    - Data sharing habits and best practices for organisations in the digital workplace
  • Automate, Orchestrate and Delegate Recorded: Feb 23 2021 44 mins
    Ian Hill, Global Director of Cyber Security, Royal BAM Group
    Whatever your line of business, the world we live and operate in is 24/7, and so are the threats, requiring solutions that never sleep. An almost exponential rise in increasingly sophisticated attacks is rendering traditional SIEM/SOC capabilities obsolete and being supplanted by AI driven automated detection, response solutions, and services.
    - Time is everything, improving MTTD & MTTR
    - Increased use of AI based automation to detect and mitigate attacks
    - SOAR facilitating improved collaboration between differing solutions & technologies
    - MDR is more than just out-sourcing it’s about delegating to a trusted partner
Everyone and Everything in information and cyber security
This channel is brought to you by Infosecurity Group, which has 25 years of global experience in informing, inspiring and enabling business connections in information and cyber security. It features first-rate content and first-hand insight direct from industry thought-leaders, covering emerging threats and defences, and the biggest trends shaping our industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Authentication 2.0 - Strengthening Authentication Measures for Mobile Security
  • Live at: Feb 25 2021 1:00 pm
  • Presented by: Moderator: Dan Raywood, Speakers: Munawar Valiji, Katherine Buller & Vincent Blake.
  • From:
Your email has been sent.
or close