Human-Centric Security: Behavioral Analytics and User Education
Combined Session
Wednesday, May 07, 2025 12:05—13:05
Location: B09
Wednesday, May 07, 2025 12:05—13:05
Location: B09
My talk, titled "Navigating Threat Response when security rely on user behavior ," will address critical areas including:
- Identifying and mitigating threats where cloud providers cannot assist.
- Implementing robust in-house security measures and protocols.
- Case studies on successful threat responses when security rely on security behaviors.
- Strategies to response to user misconfigurations or bypassing security baselines.
In today’s digital landscape, relying solely on cloud providers for security can leave organizations vulnerable. My presentation aims to equip attendees with practical knowledge and strategies to enhance their threat response capabilities independently when security relies on user behavior.
Digital transformation is everywhere and a new generation of digital-native consumers expects to access every service they need on the go, via a truly mobile-first experience. The rise of Digital Wallets across the EU is only going to accelerate this adoption of the mobile device as the de facto mechanism for enabling quick and friction-free access across all facets of an individual's digital life.
As identity professionals, we need to ensure that every interaction on the mobile phone is secured - through authenticating, authorising and monitoring every click and swipe. At the same time, we need ways to minimise friction for end users, or else risk removing the very value that consumers seek to gain from these mobile interactions.
In this session, Rob will share ideas and best practices regarding truly integrated mobile-first security journeys that leverage modern Identity Orchestration and Threat protection techniques to balance a great user experience with real protection.
As organizations are confronted with increasingly sophisticated cyber threats focusing on identities, the concept of Identity-Centric Security has gained prominence. However, the landscape is saturated with buzzwords, making it challenging for businesses to discern the true value behind the different approaches. In this session, Identity-Centric Security will be demystified, and a clear framework will be provided for identifying the most effective strategies, technologies, and products.
Key points to be covered include:
• Identifying the Value in the Buzz: The jargon will be broken down to reveal the real benefits of Identity-Centric Security.
• Understanding the Clustered Identity-Centric Security Landscape: The various components and how they work together to create a cohesive security strategy will be examined.
• Explaining it to the Business: Technical concepts will be translated into business outcomes that resonate with non-technical stakeholders and show the return on investment.