Identity documents are increasingly used to verify someone’s identity online, e.g., to implement a Know Your Customer in the banking sector. Over the last year several European banks started leveraging the NFC capability of smartphones for this, including Rabobank, ING and DNB, as did the UK Home Office for the EU Settlement Scheme. Users hold their own smartphone to their ePassport to read and verify the embedded contactless RFID chip. Maarten will provide his view on why this new technology is replacing existing technologies based on photos of identity documents and/or video identification, how to combine it with selfies with liveness checks and lessons learned from the first deployments. |
- Current digital onboarding technologies lack security and user convenience |
There are new ways emerging to simplify customer journeys. These include increased security, thanks to blockchain and distributed technologies. These global technologies are of high value for underpinning cross-border commerce. What this means for consumers is that their personal identity management can now mirror their global connected digital lives. |
Key takeaways: |
|
Understanding problems with current customer on-boarding. |
6 years. It took 6 long years, ever since the Mat Honan hack opened everyone’s eyes to the need for two factor authentication, for us to reach the point where every major company added two-factor as their solution to block account hacks. Yet the news is still full of stories about account takeovers and data breaches. What happened? Why did 2FA, as the geeks call it, not prove to be the one-stop security fix it was promised to be? The answer lies in understanding what it means to properly augment your authentication with a second factor. Join me as we explore how not all second factors are created equal, and I show how complexity and vulnerabilities creep in from supporting systems around two-factor authentication. We’ll discuss how the fact that business is omnichannel impacts 2FA deployments, and lets not forget those pesky regulations. And we’ll discuss the single biggest challenge enterprises face when its time to go multi-factor, and how they can turn that challenge into an asset. Key takeaways |
- Critical understanding of the range, modalities and utility of different two-factor authentication mechanisms |