Future-Proofing IAM
Combined Session
Wednesday, June 05, 2024 14:30—15:30
Location: A 05-06
Log in to download presentations
Wednesday, June 05, 2024 14:30—15:30
Location: A 05-06
Watch the video
Digital ecosystems continue to grow and expand at record levels as organizations and governments seek to provide remote access and services to meet customer, citizen and employee demand. However, an unintended side effect of this growth is an ever-expanding attack surface that legacy identity verification systems can’t stand up to. Couple that with easily accessible and criminally weaponized generative artificial intelligence (AI) and machine learning tools, and there is an increasing need for highly secure remote identity verification.
iProov’s Security Operations Center threat researchers observe unique evidence of large-scale, multi-platform remote identity verification system attacks that are easier than ever for even novice threat actors to launch. Supported by data from iProov’s threat intelligence research, Dr. Andrew Newell reveals how bad actors are using advan
ced AI tools, such as highly convincing face swaps in tandem with emulators and other metadata manipulation methodologies, to create new and widely unmapped threat vectors to attack remote identity verification systems.
This session is a critical primer for identity and cybersecurity professionals looking to preempt the next generation of attacks.
Watch the video
Enterprises today face a pivotal challenge: how to prepare for the future while maximizing current capabilities. In the heart of this challenge lies Identity and Access Management (IAM) transformation projects. While often seen as routine upgrades, these initiatives hold the key to unlocking a company's true potential.
Imagine a journey where mundane processes are transformed into dynamic workflows, where every transaction becomes a strategic move. This is the essence of IAM transformation. By harnessing the power of pattern deviation, we can revolutionise identity management, turning risk into opportunity.
But this isn't just about efficiency; it's about enablement. Picture a scenario where every action is orchestrated seamlessly, where human intervention is minimised, and risk is swiftly mitigated. The result? A leaner, meaner operation, primed for growth.
Join us on a quest to redefine the business case for IAM transformation. Discover the secrets behind successful implementations, and learn how to craft a compelling narrative that resonates with stakeholders. It's not just about upgrading capacity; it's about future-proofing your business for the challenges ahead.
Watch the video
Generative AI not only represents opportunities to transform Security for your organisation, but it creates new risks both in the hands of attackers and when deploying AI models within your technology stack. Wondering how you can responsibly use the benefits of AI in Identity and Access Management? Join our Senior Solution Engineer Arkadiusz Krowczynski to learn how you can apply AI capabilities to increase security, improve user experience and maximise operational efficiency.