Made with FlowPaper - Flipbook Maker
IAM Edition SOLUTION PROVIDERS 2022 TOP IAM July 2022 REINVENTING CUSTOMER IDENTITY AND ACCESS MANAGEMENT Mickey Boodaei, Co-Founder & CEO Bruce Welch, Chief Security Officer of the Year LEADING THE CHARGE IN SECURE INNOVATIONS CHIEF SECURITY OFFICER OF THE YEARwww.complycube.com BuildTrust And Eliminate Fraud • Achieve robust and global AML/CTF compliance • Perform extensive KYC and KYBchecks effortlessly • Keep fraudsters at bay with cutting-edge biometric verification • Remove unnecessary friction and decrease customer dropouts Verify your customers’ true identity faster than ever with our market-leading SaaS platform.Nicholas Wilson Monica PhilipLeona George Sandy Philip Christopher MarkusAlex George James WilliamsAndrew Sebastian editor@grcoutlook.com Michael Robert Edward JohnDave Walker Sujay Kodoor Scott Morson Vishnu Santhosh Natasha Jacob At GRC Outlook Magazine, a team of industry veterans, editors, and cybersecurity specialists are on a constant quest to portray the best and the most innovative security solutions available in the industry so that you don’t’ have to take the trouble of finding the finest technology partner. In addition, our print and digital magazine provide CIO's and CISO's viewpoints on the latest security and compliance trends that are existing in the industry. Letters and Insights At GRC Outlook, we always look forward for your valuable feedbacks, comments and insights that could help us build better stories and enhance our reader’s experience. Please send your insights and comments to the editor to our office address or email. Advertising As a publisher, ads are the fuel that drive our customer’s growth. Let the world know your brand better with our customized advertising plans. Take advantage of our huge readership that includes CEOs, CTOs, and top-level business executives. For more information, drop an email to sales@grcoutlook.com. Publishing and Reprints We provide customized reprints and copies of articles as per your requirements. Get in touch with our team for a copy of the magazine or your article separately. Copyrights and Purchase All rights reserved. No portion of this magazine may be reproduced in any form, physically or electronically, without prior permission from the publisher, except as permitted by U.S. copyright law. For permissions contact: ICON Media Inc. 30 N Gould St Ste R Sheridan, WY 82801 (646) 396 6545 Richard Taylor Jennifer LetaLowrence Tse Benny DavisSam Morris benny@grcoutlook.com sales@grcoutlook.com Copyright © ICON Media Inc. 2022 Subscribe @ Visualizers Printing and Circulation Graphic Designers Editorial staffs Creative Team Managing Editor Editor-in-Chief SalesWhile identity and access management trends are evolving, there is a new frontier in IAM that’s going to create a new revolution, the machine identity. As the number of machines is growing faster than the number of people using them, it is important to ensure that all these devices are monitored and protected. This is because compromised machine identities can have a significant security impact on organizations. In most cases, these devices can be used by attackers to establish hidden or concealed encrypted communication tunnels while getting privileged access to data and resources. Moreover, any forged or stolen machine identities can also allow an attacker’s machine to masquerade as a legitimate machine and be trusted with sensitive data. That’s the key reason why the sheer scale of machine identities that need to be protected, including mobile, cloud, and IoT devices, makes it far more challenging to keep machine identities secure. While organizations are still getting prepared to be part of this new frontier, hackers are already into the game. To help businesses learn more about the identity and access management space and to get an idea about the upcoming trends, we’ve crafted this special edition on IAM Solution Providers. This special edition features some of the most cutting-edge solution providers as well as insights from industry veterans and tech experts to help you learn deeper about the latest IAM trends. We hope this edition adds value to your IAM initiatives. Voice of the Editor Natasha Jacob Editor-in-Chief ARE YOU READY FOR THE NEXT IAM FRONTIER?SOLUTION PROVIDERS 2022 TOP IAM REINVENTING CUSTOMER IDENTITY AND ACCESS MANAGEMENT Mickey Boodaei, Co-Founder & CEO28 36 38 CORPORATE IDENTITY CRISIS BREEDS CYBER RISK 3 SECURITY MAXIMS THAT EXECUTIVES NEED TO KNOW TO PROTECT ELECTRONIC HEALTH INFORMATION USING THE BLOCKCHAIN TO CREATE PROVABLE PROCESS AUDIT TRAILS YOUR STOLEN IDENTITY IDENTITY’S ROLE IN ISO 27001 COMPLIANCE Kip Boyle, Founder & vCISO, Cyber Risk Opportunities Joshua Kissee, Ph.D. and Mark Lynd, CISSP, ISSAP & ISSMP Jay Smith, VP of Business Development, DeFi Devs Jesse Tayler,Founder, TruAnon Chris Niggel, Regional CSO, Okta 22 18 16 Automatically Eliminate Authorization Chaos AUTHOMIZE Dotan Bar Noy, CEO Smart Threat Detection Solutions PATRIOT ONE TECHNOLOGIES Peter Evans, CEO 24 Onboard, Verify, and Authenticate Users Across Africa SMILE IDENTITY Mark Straub, CEO 32 GRC INSIGHTS LEADING THE CHARGE IN SECURE INNOVATIONS CHIEF SECURITY OFFICER OF THE YEAR 34Identity is security, so when security breaks, customer experience breaks…We have to change that COVER STORYSOLUTION PROVIDERS 2022 TOP IAM REINVENTING CUSTOMER IDENTITY AND ACCESS MANAGEMENT T he way people access digital services is often fraught with both friction and risk. For the businesses serving those people, unnecessary friction translates to reduced conversion, abandoned shopping carts, frustrated users, and diminished brand loyalty. Friction reduces revenue. At the same time, the processes and technologies enabling these identity journeys are too often fragmented and fail to provide the visibility and controls needed for good security. Fraud and the theft of customer data remains all too common. Transmit Security is on a mission to change this by reinventing customer identity and access management (CIAM). The company is reimagining the identity experience from end to end and delivering capabilities proven to eliminate account takeover (ATO) fraud and similar risks. “Identity is security, so when security breaks, customer experience breaks, said Mickey Boodai, CEO and Co-founder of Transmit Security. Examples are passwords, and then adding two- factor authentication on top of passwords, and users being blocked Mickey Boodaei, Co-Founder & CEONext >