Join Peter Dulay, Symantec Identity Management Adoption Advisor, Broadcom, as he introduces One PAM, which brings together traditional proxy-based (credential vaulting) with agent-based (granular access controls) capabilities into one consolidated solution and approach, and how One PAM is better positioned to help customers shift to a Zero Trust model.
Organisations perceive their users through data. In the world of fewer and fewer opportunities for physical contact, identity verification is going all remote. All online service providers need to model the risks related to user impersonation and user manipulation attacks. |
Static data can be easily spoofed. Dynamic data analysis (mainly in a time series manner) is the way to go. |
Most of the facts about ourselves currently exist in paper-based format, centralized government-controlled repositories or belong to large platforms such as banks and social networks. In this presentation I will give overview of the history of trust mechanisms and how digital decentralized identity technology can improve it. |
— How to build persistent digital decentralized reputation system in an open protocol format |