Imagine a world without passwords. Think about the possibilities. Without passwords, there is not a central authentication repository that can be breached. Users would not have to create, remember or restore a password. Users would be immune to phishing scams that steal passwords. But how do we authenticate users without a password? There are plenty of passwordless technologies out there, but few are in use. The key to going passwordless involves two very important elements – simplicity and security. Passwords are holding us back from future innovations such as digital identities and more. We will conclude the session with a look at what is next on the horizon.
Learning Objectives Out of This Session:
In this presentation, we’ll discuss fraud trends which impact (and are perpetrated by) Information Technology professionals. We’ll cover fraud case studies and discuss how harvested data was used by the fraud perpetrators. We’ll then review current data analytics tools used by fraud and IT professionals in their fraud prevention and investigation efforts.
Learning ObjectivesAfter the session, participants will: