Managing data across multiple public clouds / on-prem, with DR and low cost backup to object storage, such as AWS S3
Why after 30 years, is malware still not contained and continues to pose a serious threat to even major organisations?
Identity and Access Management
How can we match authentication methods to the security profiles of different groups of employees and third-party suppliers?
How secure is 2fa and is it worth deploying?
What Biometric devices are on the market or coming to the market for remote security?
Can traditional Employee-based IAM solutions be repurposed for Customer-focused IAM solutions? If not, why not?
How do you design a seamless registration, authentication and login experience that is frictionless across all channels and devices?
How can you combine customer identity data with business data to create new revenue opportunities?
How do we tread the fine line between monitoring our customers to provide them with optimal service and a better buying experience without also being seen as spying on our customers at the expense of their privacy?
What is the typical maturity model for the adoption of CIAM within a business?
3:45. Score: 2.00/5.00
Do you think the number and complexity of features in traditional employee solutions mean the overheads would be too high (both in terms of cost and management/maintenance time) to use them for the customer base?
What alternative authentication methods, other than user name, passwords, SMS and Socials, exist and are they worth using and in what combination?
Is Social Authentication a good idea? Do people want to link their social credentials to business services? And can we trust the tech giants?
What is the difference between supply chain risk management vs supplier risk management?