You have 20 mins with the board or have been asked to contribute no more than 3 points/metrics onto a wider board report - where do you start? (Martin Wilkins)
Cyber Security Strategy
How can we incorporate AI in to security operations, security investigations or security controls management? (Andrew Horton)
The need for speed: How do you accelerate your Dev securely? (Matt Flannery)
Why after 30 years, is malware still not contained and continues to pose a serious threat to even major organisations?
Identity and Access Management
How can we match authentication methods to the security profiles of different groups of employees and third-party suppliers?
How secure is 2fa and is it worth deploying?
What Biometric devices are on the market or coming to the market for remote security?
Can traditional Employee-based IAM solutions be repurposed for Customer-focused IAM solutions? If not, why not?
How do you design a seamless registration, authentication and login experience that is frictionless across all channels and devices?
How can you combine customer identity data with business data to create new revenue opportunities?
How do we tread the fine line between monitoring our customers to provide them with optimal service and a better buying experience without also being seen as spying on our customers at the expense of their privacy?
What is the typical maturity model for the adoption of CIAM within a business?
3:45. Score: 2.00/5.00
Do you think the number and complexity of features in traditional employee solutions mean the overheads would be too high (both in terms of cost and management/maintenance time) to use them for the customer base?
What alternative authentication methods, other than user name, passwords, SMS and Socials, exist and are they worth using and in what combination?