CyberRiskTV Live Coverage from Identiverse 2024 – Day 1
View Show IndexSegments
1. KYB – Increasing KYB Coverage through linking Consumer and Business Data – Tarvinder Sembhi – IDV24 #1
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, online transactions, and remote customer interactions. While these developments offer numerous benefits, they also create opportunities for criminals to exploit vulnerabilities. Higher value remote transactions are performed at higher volumes. In addition, government programs such as the PPP program created a need for onboarding business quickly. This created a influx of fraudulent entities and claim who are now exploiting other channels. The convergence of these trends highlights the critical role of KYB in safeguarding businesses, ensuring regulatory compliance, and fostering trust among stakeholders in today's dynamic and interconnected business environment.
Segment Resources: https://files.scmagazine.com/wp-content/uploads/2024/05/idi-Identiverse-Brochure_05-2024-KYB-PRINT.pdf
This segment is sponsored by IDI. Visit https://securityweekly.com/idiidv to learn about their simple evaluation process!
Guest
Tarvinder Sembhi has over 20 years in the identity space. He has had executive roles in driving innovative technologies throughout his career. His roles included developing strategic roadmap for the company that invented iris recognition, driving adoption for one of the first multi-biometric companies, and introducing digital identity technologies such as the mobile driver’s license.
In his current role at IDI, Tarvinder has leveraged IDI’s AI/ML driven identity graph to develop powerful identity verification both consumer and business identity data solutions.
Host
2. Beyond Outages: How Strata’s Identity Continuity Technology is Transforming IAM – Gerry Gebel – IDV24 #1
In today’s increasingly complex cloud environments, ensuring continuous access to identity services is critical for maintaining business operations and security. Gerry Gebel, VP of Product and Standards at Strata Identity, will discuss the recently announced Identity Continuity product, designed to provide uninterrupted identity services even during outages. Unlike traditional disaster recovery solutions, Identity Continuity autonomously fails over to alternate identity providers, ensuring seamless access management. Join us to explore how Strata Identity is enhancing resilience in the identity management space.
Segment Resources: Strata Identity Continuity Product page: https://www.strata.io/maverics-platform/identity-continuity/
According to the 2023 State of Multi-cloud Identity Report, 56% of those surveyed said that they experienced interruptions to their cloud IDP twice a year or more, and 62% said they had two or more annual interruptions due to their cloud IDP itself being unavailable. Meanwhile, 23% of business decision-makers surveyed by Parametrix estimated downtime costs their organization $500,000 or more per hour, while 60% said they are “very concerned” about cloud downtime.
State of Multi-Cloud Identity report: https://strata.io/wp-content/uploads/2023/08/State-of-multi-cloud-identity-2023_Strata-Identity.pdf Parametrix Survey = https://www.reinsurancene.ws/leading-cloud-service-providers-faced-1000-disruptions-in-2022-parametrix/
This segment is sponsored by Strata. Visit https://securityweekly.com/strataidv for more information about Identity Continuity!
Guest
Gerry is a recognized leader in the identity management space. His accomplished career spans over two decades in which he has been instrumental in providing requirements definition, architecture development, and strategic planning for identity management projects with Fortune 500 corporations. In his current role as Head of Standards for Strata Identity, Gerry promotes standards-based approaches for addressing the challenges of managing distributed multi-cloud and hybrid cloud/on-premises identity systems.
Prior to joining Strata, Gerry managed business development for Axiomatics, a global provider of access control solutions. Previously, he was Vice President & Service Director with identity-focused research firm Burton Group for nearly 10 years, covering authentication, biometrics, federated identity, PKI architecture, identity management, authorization, user provisioning, privacy, directory services, and security architecture. He authored research reports on identity standards such as SAML, WS-Federation, XACML, and Liberty Alliance.
Host
3. Is your SSO on point, or is it more like Single Sign-Oh-no? – Chris Simmons – IDV24 #1
From wrestling with integration complexities to managing unexpected glitches, the realities of SSO implementation can produce very different results than what you want. Are users actually using SSO to login or are they still using the direct logins they gained before enabling SSO? We explore the reasons behind why SSO efficacy isn't always what it seems and what you can do about it.
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvyidv for a no cost SaaS-Identity checkup!
Guest
Chris Simmons is a cybersecurity industry veteran with deep expertise and decades of experience leading strategies for emerging technology companies. He is currently the VP of Strategy at Savvy Security where he is responsible for promoting a culture of proactive, identity-first security.
Simmons empowers organizations and individuals with the knowledge and tools to better secure their digital environments while enabling the business. With a focus on innovative technologies in network, end point, cloud, and identity security, Simmons has led with forward-thinking strategies which have been instrumental in promoting security tactics that enhance resilience across organizations including, Splunk, Phantom Cyber, IBM Security, Cisco, Sourcefire, Fortinet, Aqua Security and others.
Host
4. Future of Identity Management: Transitioning from Operational to Intelligent Platform – Vibhuti Sinha – IDV24 #1
With identity being the new security perimeter, identity platforms are now an integral part of the core security stack. Inherently these platforms are complex and it takes months and years for organizations to realize the business value. And this is going to get worse. The sheer volume and velocity with which new identity types are being added, as well the sophistication of attacks on identity platforms, requires a transformational shift to Identity security and governance. 50% operational efficiency and delivering security at scale are the two big initiatives which organizations have embarked on. In this session, Vibhuti Sinha, Chief Product Officer of Saviynt will share his insights and discuss how Saviynt is at the forefront of this transformation.
This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them!
Guest
As Chief Product Officer – Workforce Identity and Intelligence, Vibhuti is responsible for the vision, innovation and strategic direction of Saviynt’s product lines and product strategy, as well as, product and partner success. Prior to the CPO role, Vibhuti Sinha led the Cloud Products and Solutions at Saviynt as its Chief Cloud Officer. He was responsible for the strategy, architecture, and development of next-generation solutions including securing various cloud providers and platforms.He has nearly two decades of experience defining security architecture, IAM strategy, and implementing large scale security platforms for Fortune 500 organizations. Prior to Saviynt, he held various leadership positions and partnered with large financial institutions in addressing compliance and security needs including FFIEC, risk-based authentication, and access life-cycle management.
Host
5. Unlocking Business Value: Navigating Identity Program Challenges with Expert Insights – Ajay Gupta – IDV24 #1
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge working with large, global customers and vendors, we share how to identify and realize the business value in your organization’s identity program.
Segment Resources: https://files.scmagazine.com/wp-content/uploads/2024/05/SDG-IAM-Brief-1.pdf https://files.scmagazine.com/wp-content/uploads/2024/05/SDG-IAM-Modernization-Service-Brief-1-1.pdf
This segment is sponsored by SDG. Visit https://securityweekly.com/sdgidv to learn more about them!
Guest
Ajay Gupta is a visionary strategist at the intersection of business and technology. From his early days at Shearson-Lehman Brothers, where Ajay and his team helped revolutionize the brokerage industry with a real-time brokerage platform, to his global engagements empowering corporations with technological prowess and a return on their investments, Ajay has been a trailblazer.
In 1993, Ajay laid the cornerstone for SDG Corporation, driven by a commitment to delivery-driven and client-centric innovation. Under his leadership, SDG has soared to prominence, renowned for its pride, purpose, and passionate culture that delivers unrivaled expertise in Cyber Risk Management, Cloud Security, and Identity and Access Management services. Today, SDG stands tall as a beacon of excellence, recognized among the fastest-growing private companies and a trusted business partner to numerous Fortune 500 companies.
As President, CEO, and Chairman of the Board at SDG, as well as CEO of TruOps, Ajay continues to steer the ship towards greater heights. Armed with a Master of Science in Computer Science from the New York Institute of Technology and a wealth of executive education, he also pays it forward as an advisor to budding entrepreneurs and startup companies. As part of his continued commitment to public service, Ajay serves as a Governor appointed member on the Board of Directors of the Connecticut Lottery Corporation.
Ajay Gupta’s journey is not just about technology or corporate advancement; it’s a testament to the power of innovation, collaboration, and unwavering dedication to excellence.
Host
6. Most Effective Tactics to Combat Account and Platform Fraud – Mark Batchelor – IDV24 #1
Digital businesses are under attack from account and platform fraud, including Account Takeover (ATO), account opening fraud, and many variations of fraudulent account scams, impersonations, transactions and collusions. Learn best practices to stop fraud with better detection and prevention that can also improve customer satisfaction and operating efficiencies.
This segment is sponsored by Verosint. Visit https://securityweekly.com/verosintidv to learn more about them!
Guest
Mark is currently CTO and Co-founder of Verosint, developers of a fraud intelligence platform that discovers and prevents account and platform fraud in real-time. Prior to Verosint, Mark held various technical sales leadership roles at Chainalysis, Ping Identity, and AonHewitt among others that spanned SE leadership, CTO, Innovation labs, Partner and Alliance management, and M&A.
Host
7. The iShield Key Experience – What is different about this FIDO2 security dongle? – Kevin Fadaie – IDV24 #1
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market.
Segment Resources: Video "Swissbit iShield Key Pro: Protecting Digital Identities" https://www.youtube.com/watch?v=kxtqOyZ6e80
This segment is sponsored by Swissbit. Visit https://securityweekly.com/swissbitidv to learn more about them or visit booth #2432 to view a demo, receive a free iShield Key Pro and discuss your needs directly with experts on-site.
Guest
Kevin Fadaie has been Regional Sales Manager for Embedded IoT Solutions at Swissbit NA since early 2023. His key responsibilities include forging and enhancing partnerships with Identity and Access Management (IAM) solution providers and positioning Swissbit as a top FIDO2 solutions provider in the Americas. Fadaie’s efforts in establishing strategic alliances are crucial for enabling customers to smoothly integrate Swissbit’s advanced security products into their authentication systems.
Prior to joining Swissbit, Kevin held positions as a sales and technical account manager at leading companies, including Samsung and Intel. He earned a Bachelor of Science degree in Electrical Engineering from San Jose State University in California.
Host
8. What You Need to Know and How to Respond to the New Wave of GenAI Identity Attacks – David Mahdi – IDV24 #1
Cyberattacks, fraud and breaches, we’ve all studied them, and we are all aware that identity is under attack. And if we thought it was bad up until now, we haven't fully seen the impact of GenAI based identity attacks. Going beyond just Deepfakes, GenAI-powered malicious services such as FraudGPT, lets novices craft targeted and sophisticated attacks that bypass common IAM and security controls. Identity and security leaders must brace themselves for an increase in the volume, velocity and variety of attacks ("the three V's:). In this talk, former Gartner analyst David Mahdi and CIO of Transmit Security cover what you need to know about GenAI these attacks, and what you can do about it. Specifically, the types of attacks fraudsters are conducting across the identity lifecycle, insight into their tactics and services, and finally recommendations for a path forward.
This segment is sponsored by Transmit Security. Visit https://securityweekly.com/transmitidv to learn more about them!
Guest
Former Gartner research VP, identity, and cybersecurity, Mr. Mahdi is an industry recognized leader. David has helped large organizations tackle digital transformation projects that included digital identity, IoT security, and early stage blockchain efforts; guided organizations to build internal cryptography teams, such as the cryptography centre of excellence. Among many contributions, he is the co-founder of the emerging machine identity management market, consulted through IPOs, raising capital, and M&A, that has helped further the identity-security space. A top performing analyst, his depth and breadth of coverage made him one of the most demanded industry analysts for clients around the globe. As a market maker, David was instrumental in creating markets and definitions for areas such as: Decentralized identity, Bring Your own identity (BYOI), passwordless authentication, machine identity management, and privacy enhanced computation. At Transmit Security, David’s multifaceted role spans, security research, collaboration with industry analysts, R&D, as well as hosting CISO advisory sessions around the globe; the role of Chief identity officer keeps David busy!
Host
9. The Problem Isn’t Access, It’s Actions – Tim Prendergast – IDV24 #1
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor.
Tim will describe the importance of implementing a Zero Trust framework that evaluates each command, query, and configuration change in real-time, and how that delivers the most effective and complete security solution. Doing so involves the application of fine-grained authorization policies that adapt to the context of the user, the sensitivity of the action, and the prevailing threat landscape.
Segment Resources: https://www.strongdm.com/blog/pam-was-dead-strongdm-just-brought-it-back-to-life https://www.strongdm.com/whitepaper/technical-overview
This segment is sponsored by StrongDM. Visit https://securityweekly.com/strongdmidv to learn more about them!
Guest
Before joining StrongDM as CEO, Tim founded Evident.io—the first real-time API-based cloud security platform. In 2018, Palo Alto Networks (PANW) acquired Evident.io, and Tim joined the executive team at PANW. As the first Chief Cloud Officer, Tim helped outline GTM and product strategy with the C-suite for the cloud business. Tim also served as the principal architect for Adobe’s Cloud Team, designing and scaling elastic AWS infrastructure to spark digital transformation across the industry. Tim’s love for innovation drives his interest as an investor in true market disrupters. He enjoys mentoring startup founders and serving as an advisor.
Host
10. Automated (PKI) Infrastructure: The AI You Should Be Thinking About – Roni Bliss – IDV24 #1
While AI artificial intelligence is up-and-coming, automating your organization's PKI infrastructure is very much a reality, and can help save your IT team on hardware costs and employee costs in the long term. Additionally, a powerful PKI-as-a-Service solution provides the cryptoagility your organization can rely on as artificial intelligence, post-quantum computing, and shortened certificate validity periods become reality.
This segment is sponsored by HID. Visit https://securityweekly.com/hididv to discover the power of HID PKI!
Guest
As a regional sales manager at HID, I help CISOs, IT and IoT teams with TLS and PKI certificate management, streamlining their operations, reducing the risk of data breaches, and minimizing expensive outages or downtime. I have over 10 years of experience in B2B sales and marketing, with a focus on digital solutions and cybersecurity.
I am a certified professional and a TLS and PKI certificate management expert, with a deep understanding of the challenges and opportunities in this field. I leverage my consultative base selling, aggressive prospecting, and solid relationship management skills to secure large-volume, high-profit accounts and out-perform the competition. I am passionate about delivering sustainable results and customer satisfaction, as well as staying ahead of the industry trends and innovations.
Host
11. How AAG is Going Beyond Traditional IGA to Secure Real Enterprise Risk – Damon Tompkins – IDV24 #1
Traditional IGA solutions are not risk-focused by design, and as audit and compliance focus continues to expand beyond core ERP systems and into line of business apps and point solutions, organizations must plan holistically how to address risk across their application landscape. It’s never too late to start kicking off your risk reduction journey, and utilizing an innovative, unified platform for both identity and access risk governance has significant, compounding benefits and helps organizations realize faster time to value, lower TCO and longer term consistent risk exposure reduction. Ensuring access to all of your business-critical applications is provisioned seamlessly, efficiently, and cost-effectively while meeting risk, audit and compliance requirements should be the primary goal of any identity and access risk governance solution implementation.
Segment Resources: https://get.pathlock.com/demo-sem-kuppingercole-access-control-tools-multi-vendor-lob https://pathlock.com/learn/access-provisioning/ https://pathlock.com/compliant-provisioning-copy/ https://pathlock.com/learn/what-is-identity-governance-and-administration/ https://pathlock.com/distressed-iga-deployments/
This segment is sponsored by Pathlock. Visit https://securityweekly.com/pathlockidv to learn more about them!
Guest
Damon Tompkins, Chief Revenue Officer of Pathlock is a data-informed sales & marketing executive with a twenty-five+ year track record of successfully selling in a highly competitive landscape by demonstrating adaptable skills, imagination, and a lifelong passion for learning.