Fraud Reduction; Cybersecurity Mesh
Facebook X LinkedIn

Fraud Reduction; Cybersecurity Mesh

Combined Session
Thursday, May 11, 2023 11:00—12:00
Location: B 09

Creating the Identity Driven Cybersecurity Mesh Architecture

In overcoming the ancient concept of firewalled enterprise perimeters, securing identities has become the core element of a future driven Cybersecurity Mesh Architecture, with a composable approach of interconnected security controls – the Cybersecurity Fabric.
These Cybersecurity Meshes or Fabrics factually are nothing else than the concrete architecture and implementation of the Zero Trust paradigm, making this work in practice. In this session, we will start with a quick overview of these paradigms and their constituents, before showing how to adapt this to your current state of cybersecurity and your concrete cybersecurity requirements. Based on that, we will look at examples of such concrete architectures, the maturity levels, and on how to build your own roadmap towards the cybersecurity mesh/fabric that makes Zero Trust a reality.

Creating the Identity Driven Cybersecurity Mesh Architecture
Event Recording
Creating the Identity Driven Cybersecurity Mesh Architecture
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Creating the Identity Driven Cybersecurity Mesh Architecture
Presentation deck
Creating the Identity Driven Cybersecurity Mesh Architecture
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Christopher Schütze
Christopher Schütze
KuppingerCole
Christopher Schütze has been working as Director Practice Cybersecurity and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing...

Is it a User? Is it a Person? No, it's an.. Identity?

None of us in this industry work with bricks and mortar or other tangible, real objects. Everything we do (in IT, not just Identity and Access) is instead a digital representation, an abstraction, of something that might exist in the real world.

Identity and Access is the glue for many of those digital representations, and this concept of representation may be the most important thing to understand when considering the different possible meanings of words.

People new to Identity and Access quickly find that many of the words they encounter have different meanings than they first thought. Most frequently encountered are probably “user” and “identity” - do they represent the same type of entity or is a difference intended? Do they refer to the physical, real life person or do they refer to a virtual, digital object somewhere within the IT systems? Or both at the same time? And since people are often reluctant to show weakness in front of perceived experts, questions are too often not being asked when unsure.

In any industry, a typical consequence of miscommunication is that the end product or project will have lower quality or take longer to get delivered. This presentation highlight how this problem of misunderstanding may be larger in our industry of Identity and Access than in others, discuss why that is, and what might be done to counter it.

The presentation offers examples of where terms are ambiguous (where definitions seem to vary across the industry) and it discusses ways to perhaps improve the situation.

The presentation is based on a corresponding article in the IDPro Body of Knowledge.

Is it a User? Is it a Person? No, it's an.. Identity?
Event Recording
Is it a User? Is it a Person? No, it's an.. Identity?
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Is it a User? Is it a Person? No, it's an.. Identity?
Presentation deck
Is it a User? Is it a Person? No, it's an.. Identity?
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Espen Bago
Espen Bago
Norwegian Labour and Welfare Administration (NAV)
Espen Bago has been setting up Identity programs involving Identity and Access since 2010 and was an Identity and Access engineer for a decade before that. He is a founding member of the IDPro,...

Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview

Fraud is a major cost to businesses worldwide. Cybersecurity Ventures estimates that cybercrime costs will reach $10.5 trillion by 2025. Banking, finance, payment services, and retail are some of the most frequent objectives of fraudsters, as expected. However, insurance, gaming, telecommunications, health care, cryptocurrency exchanges, government assistance agencies, travel and hospitality, and real estate are increasingly targeted as cybercriminals have realized that most online services trade in monetary equivalents. In this session we will look at critical capabilities for FRIPs and provide an overview on the solution market.

Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Event Recording
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Presentation deck
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
John Tolbert
John Tolbert
KuppingerCole
  John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...
Subscribe for updates
Please provide your email address