Senior Director - Identity & Access Management Northwestern Mutual, United States
This topic covers the latest data on identity theft, financial crimes involving compromised identities, and growing security and privacy challenges posed by issues like synthetic identity fraud, deepfakes and the overall ongoing challenges of identity and authentication. The opportunities for phishing-resistant authentication standards and passkeys will resonate throughout the event. We'll discuss how we make it harder for threat actors to gain access into systems by requiring and ensuring that a person is who they say they are beyond the username and password. Authentication is at the heart of the work we are doing to improve the cybersecurity of critical infrastructure, upon which we all rely. We have to get identity right, as it is vital to building trust in the system.
Learning Objectives:
Impact of AI-powered emerging threats to the identity ecosystem – and what tools can be used to defend against them
How to protect against Non-Human Identities. What Should a Good NHIM system include
How re-use a verified identity will also be key to reducing the number of onboardings a person has to go through, offering a differentiated experience