Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud – Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer – ESW Vault
Full Audio
View Show IndexSegments
1. Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud – Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer – ESW Vault
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor.
Tim will describe the importance of implementing a Zero Trust framework that evaluates each command, query, and configuration change in real-time, and how that delivers the most effective and complete security solution. Doing so involves the application of fine-grained authorization policies that adapt to the context of the user, the sensitivity of the action, and the prevailing threat landscape.
Segment Resources: https://www.strongdm.com/blog/pam-was-dead-strongdm-just-brought-it-back-to-life https://www.strongdm.com/whitepaper/technical-overview
This segment is sponsored by StrongDM. Visit https://securityweekly.com/strongdmidv to learn more about them!
Traditional IGA solutions are not risk-focused by design, and as audit and compliance focus continues to expand beyond core ERP systems and into line of business apps and point solutions, organizations must plan holistically how to address risk across their application landscape. It’s never too late to start kicking off your risk reduction journey, and utilizing an innovative, unified platform for both identity and access risk governance has significant, compounding benefits and helps organizations realize faster time to value, lower TCO and longer term consistent risk exposure reduction. Ensuring access to all of your business-critical applications is provisioned seamlessly, efficiently, and cost-effectively while meeting risk, audit and compliance requirements should be the primary goal of any identity and access risk governance solution implementation.
Segment Resources: https://get.pathlock.com/demo-sem-kuppingercole-access-control-tools-multi-vendor-lob https://pathlock.com/learn/access-provisioning/ https://pathlock.com/compliant-provisioning-copy/ https://pathlock.com/learn/what-is-identity-governance-and-administration/ https://pathlock.com/distressed-iga-deployments/
This segment is sponsored by Pathlock. Visit https://securityweekly.com/pathlockidv to learn more about them!
Remote identity verification is one of the biggest challenges in the digital age, especially with the use of AI-generated deepfakes which are now impossible to distinguish from real imagery with the human eye. AI-powered biometrics have emerged as the most robust defense against deepfakes - and therefore, the only reliable method for remote identity verification.
Segment Resources: iProov.com https://www.iproov.com/ iProov Threat Intelligence Report 2024: The Impact of AI on Remote Identity Verification - https://www.iproov.com/reports/iproov-threat-intelligence-report-2024
This segment is sponsored by iProov. Visit https://securityweekly.com/iproovidv to learn more about them!
The criminal opportunity shaping the landscape today and how authoritative, accurate and automated processes are helping others increase their conversion rates by 20% while preventing 99% of all fraudulent attempts. What is the Criminal Opportunity facing us all right now? Data breaches and mail theft have resulted in a record level of available compromised Identity Information, payment information, and login information and even stolen checks. It has been said that ’At this point, all of our information is out on the dark web and it's now just a matter of when is it going to be used against us.’ Combined with inadequate fraud strategies, fraudsters have the key to the castle, it’s a perfect scenario of having the answers to the quiz ahead of time.
This segment is sponsored by Intellicheck. Visit https://securityweekly.com/intellicheckidv to learn more about them!
Guests
Before joining StrongDM as CEO, Tim founded Evident.io—the first real-time API-based cloud security platform. In 2018, Palo Alto Networks (PANW) acquired Evident.io, and Tim joined the executive team at PANW. As the first Chief Cloud Officer, Tim helped outline GTM and product strategy with the C-suite for the cloud business. Tim also served as the principal architect for Adobe’s Cloud Team, designing and scaling elastic AWS infrastructure to spark digital transformation across the industry. Tim’s love for innovation drives his interest as an investor in true market disrupters. He enjoys mentoring startup founders and serving as an advisor.
Damon Tompkins, Chief Revenue Officer of Pathlock is a data-informed sales & marketing executive with a twenty-five+ year track record of successfully selling in a highly competitive landscape by demonstrating adaptable skills, imagination, and a lifelong passion for learning.
Andrew Bud, founder and CEO, iProov
Andrew is a British technology entrepreneur and leader with a career spanning more than 30 years. He founded iProov in 2011 to solve the growing issue of establishing trust online, and how people can simply and securely access vital services in the digital age.
In 1999 he founded mBlox and built the firm into a successful high-throughput technology-based service business to become the world’s largest provider of SMS transmission for enterprise applications.
He is a Chartered Engineer and a Fellow of both the Institution of Engineering and Technology and the Royal Academy of Engineering. In 2020 he was made a CBE (Commander of the British Empire) by Queen Elizabeth II for services to export.
As Senior Vice President of Sales at Intellicheck, my primary focus is elevating customer experiences through cutting-edge identity verification solutions.
Leading a dynamic team, we are committed to not just meeting, but exceeding our clients’ expectations. With a robust background spanning over two decades in technology, I leverage my insights to understand the unique needs of our customers. This understanding enables us to deliver solutions that not only address market dynamics and challenges but also enhance the overall satisfaction and success of our valued clients.
Together, we are reshaping the landscape of identity verification, ensuring a seamless and positive experience for every customer.