InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The "Proving You Are You" Problem for Organizations

Presented by

Lucy Yang, Manager Partner and Kaliya Young, Founding Partner | Identity Woman in Business

About this talk

Most organizations operating web and mobile applications focus on identity proofing and authenticating customers. However, as phishing schemes become more advanced, customers also need organizations to better "prove you are you" before they are willing to engage and share sensitive information. Tune into this session presented by Lucy Yang and Kaliya Young, partners from Identity Woman in Business, as they speak about experiences interacting with a scam chatbot and the lack of intuitive ways for customers to know whether they are engaging with a legitimate human or AI agent of an application. They’ll also explore organizational identity which has been one area of focus of the EU Digital Identity Wallet Large-Scale Pilots. As standards mature around digital wallets, it is time for organizations at large to think about how an organizational wallet can help you address identity and cybersecurity threats. Key Takeaways: - Understand the business risks caused by not being able to "prove you are you" . - Learn about the emerging topic of organizational identity and mutual authentication. - Discover the organizational digital identity wallet and the technical standards that underpin it.
Information Security

Information Security

259141 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics