You have 20 mins with the board or have been asked to contribute no more than 3 points/metrics onto a wider board report - where do you start? (Martin Wilkins)
Cyber Security Strategy
3:49.
How can we incorporate AI in to security operations, security investigations or security controls management? (Andrew Horton)
Application Security
3:16.
The need for speed: How do you accelerate your Dev securely? (Matt Flannery)
Endpoint Protection
5:50 mins.
Why after 30 years, is malware still not contained and continues to pose a serious threat to even major organisations?
Identity and Access Management
14:02 mins.
How can we match authentication methods to the security profiles of different groups of employees and third-party suppliers?
How secure is 2fa and is it worth deploying?
What Biometric devices are on the market or coming to the market for remote security?
CIAM
3:13.
Can traditional Employee-based IAM solutions be repurposed for Customer-focused IAM solutions? If not, why not?
CIAM
3:46.
How do you design a seamless registration, authentication and login experience that is frictionless across all channels and devices?
CIAM
3:38.
How can you combine customer identity data with business data to create new revenue opportunities?
CIAM
4:32.
How do we tread the fine line between monitoring our customers to provide them with optimal service and a better buying experience without also being seen as spying on our customers at the expense of their privacy?
CIAM
4:36.
What is the typical maturity model for the adoption of CIAM within a business?
CIAM
3:45. Score: 2.00/5.00
Do you think the number and complexity of features in traditional employee solutions mean the overheads would be too high (both in terms of cost and management/maintenance time) to use them for the customer base?
CIAM
4:00.
What alternative authentication methods, other than user name, passwords, SMS and Socials, exist and are they worth using and in what combination?