Event Recording

Gerald Beuchelt - Data Driven Identity Programs – Past, Present, and Future: End-User Experience is Key

Show description
Speaker
Gerald Beuchelt
CISO
LogMeIn
Gerald Beuchelt
Gerald  Beuchelt  as the Chief Information Security Officer at LogMeIn is responsible for the company’s  overall security, compliance, and technical privacy program.  With more than 20 years of experience working in information...
View profile
Top related content
Webinar Recording
Consumer-Focused Identity Management
Apr 14, 2016
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
Event Recording
Going Passwordless and Beyond - The Future of Strong Authentication
Sep 14, 2021

The onslaught of account takeover attacks from insecure passwords is driving the rapid adoption of passwordless solutions.  While the risk reduction benefits are substantial, eliminating passwords is just the first step on the path to fundamentally strong authentication.  In the “new normal” era of work from anywhere, and rapidly increasing cloud adoption, organizations are moving to a new risk-based authentication model.  Advanced organizations are validating users, their devices, and inspecting the security posture of the device for each login.  Strong and continuous authentication is a fundamental building block of Zero Trust. Learn how you can make it happen without making the user experience miserable.

 Discussion topics include:

  • New cybersecurity and identity management requirements in the post COVID era
  • Traditional MFA vs Passwordless - avoiding the “security vs. painful user experience” tradeoff
  • Device trust and the confluence of cybersecurity and identity management
  • Continuous risk-based authentication 

Takeaways:

  • Account takeovers and other attacks have increased as a result of distributed working - adopting a solution that removes passwords removes most of the risk
  • MFA has evolved beyond the traditional “password + SMS + pin” approach
  • CISO’s and IT no longer have to trade increased security for user convenience
  • Modern devices allow organizations to leverage the Secure Enclave / Trusted Platform Module for increased security
  • Continuous, risk-based authentication is a key factor in identity and access management
Patrick McBride, Chief Marketing Officer, Beyond Identity
Event Recording
Tobias Urban: The Balance Between User Experience and Security
Mar 04, 2021

Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver products and services, there is an explosion in the number of sources from which users can gain access. Overlaying all of that is the constant evolution of the threat landscape and regulations that inevitably follow.

Tech leaders who want to grow their position in the market must balance two goals: delivering security and customer experience.

Join Auth0 as we discuss, and provide some insights on how to utilize a strategic approach to digital identities, that has helped customers such as Siemens, HolidayCheck, and EnBW to:

  • Maintain and improve the user experience
  • Provide an innovative - and differentiated - product or service, that can scale as the business grows
  • Achieve the above two points, while still ensuring security and trust for their customers’ digital identities
Event Recording
Pools of Identity: Best Practices Start With Personal Password Behavior
Nov 09, 2022
Event Recording
Panel: Best Ways to Balance User Experience & Security for your Consumer Identity Management Strategy
Oct 28, 2020

The challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time. This combination must be taken seriously to provide a smooth Customer Experience (CX) and to guarantee that every consumer can control the access to his personal information. Join this panel to hier the best practise advises of experts in the branch.

Webinar Recording
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Mar 22, 2019

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

Event Recording
The End of the Password – How to Really Protect Digital Identity
Nov 13, 2018

In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack. Once a password is stolen, it opens the doors to fraudulent use and data theft. Furthermore, since most consumers link their online accounts at Amazon, eBay or Twitter to their Facebook or Google account, attackers only have to hack one password in order to gain access to the entire range of applications. This also enables them to easily compromise the complete digital identity of a user. All these examples show, that passwords are outdated. Their single application for the protection of digital identities is not only careless, but very harmful. However, there is a remedy, which is reliable and widely available today: the 2- or multi-factor authentication (2FA/MFA). Providers of online portals and services can offer their users a broad range of easy-to-use tokens, which relieve consumers of the burden to remember another password – from push tokens that only have to be confirmed by tapping the “OK” field on the smartphone’s touchscreen to scanning a QR code with the smartphone’s camera. In his presentation, Dr. Amir Alsbih explains the latest challenges and solutions in the protection of digital identities and illustrates how consumers can benefit of new MFA technologies.

Webinar Recording
Remote Work and IAM – A Unique Opportunity for Security Leaders
Jul 27, 2020

Nowadays, Identity and Access Management (IAM) is undeniably the first line of defense for organizations worldwide. It enables employees to securely access applications while enhancing control and transparency. But IAM is also on the change. It is already more than just the traditional employee IAM. Digital business requires advanced identity services, well beyond the human identities.

The segregation between various dimensions of IAM is blurring. IAM today treads the line between providing security and acting as a business enabler. It has left behind the notion of being "just IT" and turned into a necessity for implementing security and policy and a facilitator of modern business models. But how can security leaders turn the challenges, both legacy and new, into opportunities to mitigate risk and add value to the business? And all this in a way that will elevate the position, and change the perception, of security at the same time?

Webinar Recording
Shut the Door to Cyber Attackers Permanently
Jul 26, 2023

Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the user experience by implementing passwordless authentication within a Zero Trust security framework.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will present a matrix that helps organizations to prioritize their Zero Trust efforts, mapped to the key building blocks of a comprehensive Zero Trust strategy.

Patrick McBride, Chief Marketing Officer at Beyond Identity will explain how organizations can eliminate passwords and friction within a Zero Trust framework. He will also provide an overview of Beyond Identity’s Zero Trust Authentication solution.