Multi-factor & Risk-based Authentication
Category

Multi-factor & Risk-based Authentication

News, trends, technology insight, and analysis on authentication using multiple factors / identity establishing parameters; & Risk-based Authentication strategies, tool and techniques.

News, trends, technology insight, and analysis on authentication using multiple factors / identity establishing parameters; & Risk-based Authentication strategies, tool and techniques.

Consumer Data: Multi-Layered Security Gets Personal

Tim Horton - First Data  •   • 

Start this Session

The State of Adaptive Authentication in the Financial Industry

Tim Bedard - OneSpan  •   • 

Start this Session

The State of Adaptive Authentication in the Financial Industry

Tim Bedard - OneSpan  •   • 

Start this Session

Compromised Credential Detection

Session In Development  • 

Mike Greene - Enzoic  •   • 

Preview this Session

Fight Fraud and Improve Customer Experience

Will LaSala - OneSpan  •   • 

Start this Session

Facial Recognition and Emerging Technology: Privacy and Security Concerns

Jake Snow - ACLU of Northern California  •   • 

Start this Session

Data Encryption. Advanced Authentication. Digital Signing.

Prof. Yehuda Lindell - Unbound Tech  •   • 

Start this Session

Best Practices for UK & EU: Data Encryption. Advanced Authentication. Digital Signing.

Prof. Yehuda Lindell - Unbound Tech  •   • 

Start this Session

Digital Transformation: Best Practices for Cryptographic Key Management and Protection

Prof. Yehuda Lindell - Unbound Tech  •   • 

Start this Session

Know Your (Digital) Customer in the Identity Theft Era

Frank Mendicino - IBM US  •   • 

Start this Session

Taking the 'Fraud' Out of Authentication: Fraud-Aware Identities

Evan O'Regan - Entrust Datacard  •   • 

Start this Session

Breaking Down Authentication Siloes & Preventing Account Takeover

David Fapohunda - PWC , Rivka Gewirtz - NICE Actimize  •   • 

Start this Session

Cyber Self-Defense, Addressing Escalating Attacks through New Partnerships

Philip Reitinger - Global Cyber Alliance  •   • 

Start this Session

Why Does Healthcare Resist Strong Authentication?

Jennings Aske - New York-Presbyterian , Jay Kramer - Lewis Brisbois Bisgaard & Smith , Randy Vanderhoof - US Payments Forum  •   • 

Start this Session

Session Contributors

Alisdair Faulkner

Chief Products Officer, ThreatMetrix

Read Bio
Andrew Showstead

Director of Technical Consultancy and Market Solutions, VASCO Data Security

Read Bio
Ben Knieff

Senior Analyst, Aite Group

Read Bio
Bharat Panchal

Senior Vice President & Head-Risk Management, National Payments Corporation of India

Read Bio
Bryan Knauss

Head of Identity Verification Services, RSA Security

Read Bio
Byron Hynes

Infrastructure & Security Specialist

Read Bio
Carlos Santamaria

Product Manager, Faronics

Read Bio
Chris Marshall

Senior Vice President of Sales, PhoneFactor

Read Bio
Chris Silveira

Manager of Fraud Intelligence, Guardian Analytics

Read Bio
Christopher Beier

IT Security & Product Consultant, IBM Security

Read Bio
Christy Serrato

Solutions Marketing, HID Identity Assurance

Read Bio
Chuck Buffum

Senior Product Evangelist, Phone Authentication, RSA, The Security Division of EMC

Read Bio
Craig Priess

Founder and Vice President, Products and Services, Guardian Analytics

Read Bio
Dan Faulkner

Director of Product Marketing, Nuance Communications

Read Bio
David Dingwall

Senior Solutions Architect - Fox Technologies

Read Bio
David Pollino

Chief Cybersecurity Officer, Bank of the West (BNP Paribas)

Read Bio
Dr. Rakesh Goyal

Dir. Gen., Center for Research and Prevention of Computer Crimes (CRPCC)

Read Bio
Eli Katz

VP - Enterprise Strategies/Finance, 41st Parameter

Read Bio
Erik T. Heidt, CISA, CISSP

Manager Cryptographic Controls and Architecture Team (CCAT), Fifth Third Bank

Read Bio
Evan O'Regan

Global Director, Product Management, Authentication & Fraud, Entrust Datacard

Read Bio
Eve Maler

Principal Analyst, Forrester Research

Read Bio
Frank Barbato

Chief Information Officer, VirtualBank

Read Bio
Frank Mendicino

Digital Identity & Fraud Prevention, Cyber Security, IBM US

Read Bio
Garet J. Moravec

Former Head of Airborne Platform Systems Cyber Security, Lockheed Martin Aeronautics

Read Bio
Geoff Hogan

SVP - Business Development & Product Management/Marketing, Imprivata

Read Bio
George Tubin

Sr. Director, Product Strategy & Innovation, ThreatMetrix

Read Bio
Gray Taylor

Executive Director, Conexxus

Read Bio
Jake Snow

Technology and Civil Liberties Attorney, ACLU of Northern California

Read Bio
Jan Garvey

Director - Treasury Products Group, Citibank

Read Bio
Jay Kramer

Partner, Data Privacy and Cyber Security Practice Group, Lewis Brisbois Bisgaard & Smith; former Supervisory Special Agent, FBI - NY Cyber Division

Read Bio
Jeff Kopchik

Sr. Policy Analyst, Federal Deposit Insurance Corporation (FDIC)

Read Bio
Jeff Multz

Director - North America Midmarket Sales, Dell SecureWorks

Read Bio
Jennings Aske

CISO, New York-Presbyterian

Read Bio
Jesper Tohmo

CTO, Nordic Edge

Read Bio
Jodi Florence

VP - Marketing, IDology

Read Bio
Joe Rogalski

Principal Security Strategist, Symantec

Read Bio
Joel Hardi

Director, Solutions Architecture, Equifax Identity and Fraud

Read Bio
John Marsden

ID and Fraud Business Development Expert, Equifax

Read Bio
Ken Meiser

VP, Identity Solutions, ID Analytics

Read Bio
Krista Tedder

VP Global Product Manager - Risk, Fraud, and Identity Verification, MasterCard

Read Bio
Malcolm Harkins

Global CISO, Cylance

Read Bio
Mark Benoit

Security Specialist, Attachmate Corporation

Read Bio
Mary Ann Miller

Senior Director, Fraud Executive Advisor & Industry Relations, NICE Actimize

Read Bio
Matthew M. Speare

Executive Vice President & Enterprise CIO, Regions Bank

Read Bio
Michael Smith

Fraud Market Planning Lead, LexisNexis Risk Solutions

Read Bio
Mike Byrnes

Director - Customer Authentication & Fraud Detection Solutions, Entrust

Read Bio
Mike Greene

CEO & GM, Enzoic

Read Bio
Neira Jones

FBCS, MSc, Independent Advisor & International Speaker

Read Bio
Nicholas Holland

Senior Analyst, Aite Group

Read Bio
Patrick Vowles

Content Director, ISMG

Read Bio
Paul E. Caldwell, Jr.

Managing Director - Visa & Check Loss Prevention Group, Charles Schwab

Read Bio
Paul Madsen

Principal Technical Architect

Read Bio
Paul Smocer

President & Former VP Security, BITS

Read Bio
Peter Tapling

President and CEO, Authentify

Read Bio
Philip Alexander

Information Security Officer, UMC Health System

Read Bio
Philip Reitinger

President & CEO, Global Cyber Alliance; former Deputy Undersecretary for Cybersecurity, Department of Homeland Security; former CISO, Sony

Read Bio
Prof. Yehuda Lindell

Chief Scientist, Unbound Tech

Read Bio
Randy Vanderhoof

Director, US Payments Forum

Read Bio
Rivka Gewirtz

Director of Product Marketing, Fraud and Authentication Management, NICE Actimize

Read Bio
Robert Grapes

Chief Technologist - Cloakware

Read Bio
Roger Grimes

Data-Driven Defense Evangelist

Read Bio
Sam Curry

Chief Security Officer, Cybereason

Read Bio
Sarah Fender

VP - Marketing & Product Management, PhoneFactor

Read Bio
Seth Geftic

Product Marketing Manager, RSA

Read Bio
Shirley Inscoe

Senior Analyst, Aite Group

Read Bio
Steve Dispensa

CTO & Co-Founder, PhoneFactor

Read Bio
Terry Austin

President & CEO, Guardian Analytics, Inc.

Read Bio
Tiffany Riley

VP - Marketing, Guardian Analytics

Read Bio
Tim Bedard

Director, Security Product Marketing, OneSpan

Read Bio
Tim Horton

VP, Global Merchant Security and Compliance Solutions, First Data

Read Bio
Tom Field

Senior Vice President, Editorial, ISMG

Read Bio
Tom Wills

Director, Ontrack Advisory Group

Read Bio
Tony Karam

Senior Consultant for Identity Product Marketing, RSA

Read Bio
Uri Rivner

Co-Founder, Head of Cyber Strategy, BioCatch

Read Bio
Vijai Shankar

Sr. Product Marketing Manager for Consumer Authentication, VeriSign, Inc.

Read Bio
Vikas Jain

Director - Product Management, Intel - Cloud Identity & Security

Read Bio
Will LaSala

Director Security Solutions, OneSpan

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.