Made with FlowPaper - Flipbook Maker
Identity and Access Management Edition Nov 2021 THE PASSWORDLESS COMPANY Bojan Simic, Co-Founder & CEOHackers can’t steal what’s not there. www.hypr.com Protect your workforce and customer identities with True Passwordless™ MFA.Copyright @2021 GRC Outlook. All Rights Reserved. The content and images used in the publication should not be reproduced or transmitted in any form or by any means without the prior permission of Grc Outlook. Landon Noah Emily Ava Visualizers editor@grcoutlook.com Sophia Loren Joe TylerAnthony John Editorial staffs Natasha Jacob Managing Editor Copyright @ GRC Outlook 2021 As the digital ecosystems around the globe continues to advance, the world of identity management is also on the rise. Recently, there has been a quick rash of cyberattacks that has renewed attention on identity and access management (IAM), creating a surge in demand across enterprises. Passwordless authentication is on the mainstream and more businesses are adopting this approach since quite a while. Another method for authentication that stretched itself to the digital era were biometrics, which are physical characteristics of a person that are used to identify and verify one’s identity. Self-Sovereign Identity (SSI) is one among the latest technologies that is based on the concept that only users should own their identity data, rather than a third party. Meanwhile, the newly emerging zero-trust culture is making its way into the modern business world. Zero Trust is not dependent on a location–it must be proliferated across an entire organizational environment. However, achieving Zero Trust is often perceived as costly and complex. The fact is that, Zero Trust is built upon an existing architecture and does not require to rip and replace existing technology. Whatever the case is, as organizations go digital, moves to the cloud and adopts new technologies, it’s important to stay secure and manage users, all while staying compliant. To make your security initiatives more employee-friendly while enabling a more secure environment, we’ve developed this edition with some of the most innovative security solution providers. We hope this edition helps enhance your security posture. Is the Zero-trust Culture a Reality? Natasha Jacob Managing Editor Sam Morris Sales sam@grcoutlook.com sales@grcoutlook.com EDITOR'S LetterAt Managecore, we know SAP ® . We create a relationship with our customers that is built on trust and deliver our services with full-transparency. Can your MSP say that? Discover a new way to manage your SAP landscape managecore.com | 844-999-3133 >> SAP Technical Managed Services >> MigrationServicesforSAPHANA ® , SAP S/4HANA ® , SAP BW/4HANA ® >> Cloud Migration ServicesTHE PASSWORDLESS COMPANY Page No 08 Bojan Simic, Co-Founder & CEO44 4036 FIGHT AI WITH AI: AUTOMATED SPEAR PHISHING ATTACKS POWERED BY ARTIFICIAL INTELLIGENCE THE INTERNET OF REGULATION: IDENTITY, CONSENT, AND E>CITIZENSHIP. IDENTITY IS THE BASIS OF ALL SECURITY SO MANY REPOS, SO LITTLE TIME SPEEDING UP DEPLOYMENTS SECURELY Pan Kamal, Director of Product Marketing, BluBracket, Inc. Rick Moore, Chairman, paytrak$ Maeson Maherry, CEO lawtrust Joshua Crumbaugh, Chief Technology Officer, PhishFirewall PeopleSec One-Stop Place for Cybersecurity Zero Trust Full Identity Platform Powering Trusted Identities of People, Places, and Things. BRAINWAVE GRC EMPOWERED HID GLOBAL Eric Basher, CEO, & Co-founder Björn Lidefelt, President & CEO Björn Lidefelt, President & CEO 16 22 27 CONTENT PAGE 24 WHAT’S YOUR STRATEGY? Kristy Westphal, Director, Information Security & Operations, HealthEquityTHE PASSWORDLESS COMPANY COVER STORY Bojan Simic, Co-Founder & CEOThe Password Back in the 1960s when computers were still a fantasy for many, passwords were simply short codes meant to keep files private on a shared system. Ironically, the MIT researchers who are said to have pioneered the password, weren’t particularly concerned with security. Fast forward 60+ years and the password still remains a subject of debate. Although the industry has evolved with new technologies, more compliance and regulations, and new forms of authentication, the password has remained firmly entrenched, despite daily proof that it hasn't advanced as quickly as the attacks that have dominated headlines over the years. Organizations understand the need to implement a robust authentication system, one that doesn’t rely purely on the standard password. Many have incorporated additional authentication processes and methods, such as multi-factor authentication (MFA), to bring in much needed layers of security. Yet this has led to its own set of challenges. Businesses find it difficult to maintain a consistent user experience. Complaints about password complexity, a sense of reduced productivity, and “MFA fatigue” abound. The everyday employee finds themselves What differentiates us is that every single authentication flow that happens through our product is without the user typing anything in. So that means the person cannot be tricked into sharing their password with a hackerNext >