[AISWorld] Episode 48 -- Implementing Secure and Fast Authentication Processes

Dave Chatterjee dchatte at gmail.com
Thu Mar 30 06:38:04 EDT 2023


Dear Colleagues:

Greetings!

Traditional authentication methods are outdated and need many layers of
code, which can take time and resources away from developer teams. If
developments like FIDO2, WebAuthn, and passkeys are to be the cornerstones
of a passwordless future, then every application (not just Apple, Google,
and Microsoft) needs an easy way to adopt these methods and weave them into
current user authentication flows. Slavik Markovich, Co-founder and CEO,
Descope, discusses current and future authentication trends and the
importance of building a low-code/no-code passwordless authentication
solution for app developers. I hope you enjoy this episode of *The
Cybersecurity
Readiness Podcast Series <https://www.dchatte.com/podcast/>*.

*A short clip from Episode 48:  <http://goog_913120372>*
https://youtu.be/ITCu__z-3AU

*Full Episode 48:* https://www.dchatte.com/podcast/

*Prior Episodes: *https://the-cybersecurity-readi.captivate.fm/episodes

#47 -- Proactive Resilient Approach to Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/proactive-resilient-approach-to-cybersecurity>
-- *Guest:* Kriti Arora, Security Global Black Belt, Threat Intelligence
and Enterprise Attack Surface Management, Microsoft

#46 -- The Challenges and Best Practices of Cyber Security in Emerging
Markets
<https://the-cybersecurity-readi.captivate.fm/episode/the-challenges-and-best-practices-of-cyber-security-in-emerging-markets>
 -- *Guest*: Andre Keartland, Solutions Architect at Netsurit,
Johannesburg, South Africa

#45 -- Cybersecurity Perspectives of a Community College President
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-perspectives-of-a-college-president>
 -- *Guests*: Pamela Senegal, President, Piedmont Community College; Charle
LaMonica, the Director of UNC's World View Program,

#44 -- From Law Enforcement Officer to Chief Information Security Officer
<https://the-cybersecurity-readi.captivate.fm/episode/from-law-enforcement-officer-to-chief-information-security-officer>
 -- *Guest:* Brian Penders, Chief Information Security Officer, at the
University of North Carolina Chapel Hill Medical School

#43 -- To trust or not to trust: the overwhelming challenge
<https://the-cybersecurity-readi.captivate.fm/episode/to-trust-or-not-to-trust-the-overwhelming-challenge>
 -- *Guest:* Beatrice Cadet, Scientist Integrator at Netherlands
Organization for Applied Scientific Research (TNO),

#42 -- Useful Technology Should Be Attack Agnostic
<https://the-cybersecurity-readi.captivate.fm/episode/useful-technology-should-be-attack-agnostic>
 -- *Guest*: Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former
Chief of Trusted Systems Research Group, National Security Agency,

#41 -- Do you see what attackers see? Threat modeling done right
<https://the-cybersecurity-readi.captivate.fm/episode/do-you-see-what-attackers-see-threat-modeling-done-right>
 -- *Guest:* Marcos Lira, Lead Solutions Engineer at Halo Security

#40 -- Implementing Phishing Resistant Multi Factor Authentication
<https://the-cybersecurity-readi.captivate.fm/episode/implementing-phishing-resistant-multifactor-authentication>
 -- *Guest:* George Gerchow, Chief Security Officer and Senior Vice
President of IT, Sumo Logic

#39 -- How do SMBs protect themselves from ransomware attacks?
<https://the-cybersecurity-readi.captivate.fm/episode/how-do-smbs-protect-themselves-from-ransomware-attacks>
 --* Guest:* Grayson Milbourne, Security Intelligence Director at OpenText
Security Solutions

#38 -- Cybersecurity As A Strategic Opportunity
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-as-a-strategic-opportunity>
--* Guest:* Kal Sambhangi, Senior Vice President, Cybersecurity Strategy
and Architecture at Truist

#37 -- Comprehensive Asset Discovery
<https://the-cybersecurity-readi.captivate.fm/episode/comprehensive-asset-discovery>
 -- *Guest: * Huxley Barbee, Security Evangelist at runZero and former
Cybersecurity Practice Lead at Cisco

#36 -- Is Cybersecurity A Moving Target at Academic Institutions?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cybersecurity-a-moving-target-at-academic-institutions>
 -- *Guest:* Tej Patel, Vice President, and CIO at Stevens Institute
of Technology

#35 -- Securely Migrating to the Cloud
<https://the-cybersecurity-readi.captivate.fm/episode/securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience>
 -- *Guest:* Keith Weller, former Vice President, Enterprise Technology
Services, American Cancer Society (ACS)

#34 -- Detecting Malicious Insider Threats by Monitoring User Journeys
<https://the-cybersecurity-readi.captivate.fm/episode/detecting-malicious-insider-threats-by-monitoring-user-journeys>
 -- *Guest*: Doron Hendler, CEO, and Co-Founder at RevealSecurity

#33 -- Skilling Up for Security Operations Center Roles
<https://the-cybersecurity-readi.captivate.fm/episode/skilling-up-for-security-operations-center-roles>
 -- *Guest*: James Risler, Senior Manager, Cisco Learning and Certifications

#32 -- Bridging the Gap Between Intentions and Practicality in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/bridging-the-gap-between-intentions-and-practicality-in-cybersecurity>
 -- *Guest:* Daniela Almeida Lourenco, Chief Information Security Officer
(CISO) at Tinka

#31 -- Preparing for the Future of Device Management
<https://the-cybersecurity-readi.captivate.fm/episode/preparing-for-the-future-of-device-management>
 -- *Guest:* Mike McNeill, CEO, Fleet Device Management

#30 -- The State of Attack Surface Management
<https://the-cybersecurity-readi.captivate.fm/episode/the-state-of-attack-surface-management>
 -- *Guest:* David Monnier, Team Cymru Fellow

#29 -- Global Security and Post Breach Management Best Practices
<https://the-cybersecurity-readi.captivate.fm/episode/global-security-and-post-breach-management-best-practices>
 -- *Guest:* Tim Callahan, Senior Vice President and Global Chief
Information Security Officer, Aflac

#28 -- How to Tackle Burnout in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/how-to-tackle-burnout-in-cybersecurity>
 -- *Guest:* Thomas Kinsella, Co-Founder & Chief Operating Officer at Tines

#27 -- Actionable Threat Intelligence and the Dark Web
<https://the-cybersecurity-readi.captivate.fm/episode/threat-intelligence-and-the-dark-web>
 -- *Guest:* Victoria Kivilevich, Director of Threat Research at KELA Group

#26 -- Reducing the Disconnect Between Security and Development Teams
<https://the-cybersecurity-readi.captivate.fm/episode/reducing-the-disconnect-between-security-and-development-teams>
 -- *Guest*:  Harshil Parikh, CEO and Co-Founder Tromzo

#25 -- Perspectives of a Global Chief Information Security Officer
<https://the-cybersecurity-readi.captivate.fm/episode/perspectives-of-a-global-ciso>
 -- *Guest*: Vishal Salvi, CISO & Head of Cyber Practice at Infosys

#24 -- Thinking Like A Hacker
<https://the-cybersecurity-readi.captivate.fm/episode/thinking-like-a-hacker>
 -- *Guest*: Ted Harrington, Executive Partner at
Independent Security Evaluators

#23 -- Is Cybersecurity Regulatory Compliance Good Enough?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cybersecurity-regulatory-compliance-good-enough>
 -- *Guest*: Dixon Wright, Vice President, Vice President, Compliance
Management and Automation Platform, Coalfire

#22 -- Is Cyber Insurance Necessary?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cyber-insurance-necessary>
 -- *Guest*: Erica Davis, Erica Davis, Global Co-Head of Cyber, Guy
Carpenter & Co

#21 -- Dealing with Cyber Trauma
<https://the-cybersecurity-readi.captivate.fm/episode/dealing-with-cyber-trauma>
 -- *Guest*: Patrick Wheeler, a Luxembourg-based cybersecurity practitioner
and Director of the Cyber Wayfinder Program

#20 -- A Deep Dive into Ransomware Attacks and Negotiations
<https://the-cybersecurity-readi.captivate.fm/episode/a-deep-dive-into-ransomware-attacks-and-negotiations>
-- *Guest*: Art Ehuan, Vice President, Palo Alto Networks, and Former FBI
Special Agent

#19 -- Making Cybersecurity Communication Effective
<https://the-cybersecurity-readi.captivate.fm/episode/making-cybersecurity-communication-effective>
 -- *Guest*: Marcin Ganclerz, Cybersecurity Awareness & Training Expert

#18 -- Securing the Smart Supply Chain
<https://the-cybersecurity-readi.captivate.fm/episode/securing-the-smart-supply-chain>
 -- *Guest*: Alan Mihalic, President IoT Security Institute

#17 -- Reducing the Carbon Footprint
<https://the-cybersecurity-readi.captivate.fm/episode/reducing-the-carbon-footprint>
 -- *Guest*: Andy Bates, Chief Development and Strategic Partnership
Officer, Global Cyber Alliance

#16 -- Role of Emotional Intelligence in Creating a Healthy
Information Security Culture
<https://the-cybersecurity-readi.captivate.fm/episode/role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture>
 -- *Guest*: Nadja El Fertasi, Human Readiness and Resilience Expert and
former NATO senior executive

#15 -- Significance of the Human Element in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/significance-of-the-human-element-in-cybersecurity>
 -- *Guest:* Prof. Missy Cummings, Pratt School of Engineering, Duke
University

#14 -- Enhancing Organizational Readiness by Simulating Cyber Attacks
<https://the-cybersecurity-readi.captivate.fm/episode/enhancing-organizational-readiness-by-simulating-cyber-attacks>
 -- *Guest:* Prof. Robert Austin, Ivey Business School, London, Ontario,
Canada

#13 -- Cybersecurity is Patient Safety
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-is-patient-safety>
 -- *Guest:* Stoddard Mannikin, Chief Information Security Officer,
Children's Healthcare of Atlanta

#12 -- Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat
Management
<https://the-cybersecurity-readi.captivate.fm/episode/ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management>
 -- *Guest*: Anne Leslie, Threat Management Consultant, IBM Security

#11 -- Fly the Plane: A CIO's Approach to Cybersecurity Readiness
<https://the-cybersecurity-readi.captivate.fm/episode/fly-the-plane-a-cios-approach-to-cybersecurity-readiness>
 -- *Guest*: Dr. Timothy Chester, Vice President of Information Technology,
The University of Georgia

#10 -- Passwordless Authentication: Myths and Realities
<https://the-cybersecurity-readi.captivate.fm/episode/passwordless-authentication-myths-and-realities>
 -- *Guest*: Ori Eisen, Founder, and CEO of Trusona

#9 -- Cybersecurity Risk Reduction Tips for Small and Medium-Sized
Enterprises (SMEs)
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-risk-reduction-tips-for-small-and-medium-enterprises>
 -- *Guest*: Mike Benz, Partner | Fractional CIO at Fortium Partners

#8 -- What Does Good Cyber Governance Look Like? A Legal Perspective
<https://the-cybersecurity-readi.captivate.fm/episode/what-does-good-cyber-governance-look-like-a-legal-perspective>
 -- *Guest*: Rois Ni Thuama, Ph.D. (Doctor of Law), Head
of Cyber Governance, Red Sift

#7 -- Multidisciplinary and Integrative Approach to Cybersecurity Education
<https://the-cybersecurity-readi.captivate.fm/episode/multidisciplinary-and-integrative-approach-to-cybersecurity-education>
 -- *Guest:* Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and
Master of Engineering in Cybersecurity at Duke University's Pratt School of
Engineering

#6 -- Holistic Approach to Cybersecurity Readiness
<https://the-cybersecurity-readi.captivate.fm/episode/holistic-approach-to-cybersecurity-readiness>
 -- *Guest:* Ram R. Kumar, Executive Director, AT&T Business

#5 -- Being An Effective Chief Information Security Officer (CISO)
<https://the-cybersecurity-readi.captivate.fm/episode/being-an-effective-chief-information-security-officer-ciso>
 -- *Guest:* Richard Biever, Chief Information Security Officer, Duke
University

#4 -- The Human Vulnerability Factor
<https://the-cybersecurity-readi.captivate.fm/episode/the-human-vulnerability-factor>
-- *Guest:* Jenny Radcliffe, also known as “The People Hacker,” a
world-renowned Social Engineer

#3 -- Going Above and Beyond the Mandated Checklist
<https://the-cybersecurity-readi.captivate.fm/episode/going-above-and-beyond-the-mandated-checklist>
 -- *Guest:* Tushar Sachdev, Executive Vice President, and
Chief Technology Officer, KORE Wireless

#2 -- Protecting Academic Institutions from Ransomware and Other Forms of
Attacks
<https://the-cybersecurity-readi.captivate.fm/episode/protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks>
 -- *Guest:* Garry Scobie, Deputy Chief Information Security Officer, The
University of Edinburgh

#1 -- Role of Top Management in Cybersecurity Governance
<https://the-cybersecurity-readi.captivate.fm/episode/role-of-top-management-in-cybersecurity-governance>
 -- *Guest:* Rohit Verma, CEO of Crawford and Company

Thanks
Dave Chatterjee (https://dchatte.com)

*Latest Publication*: “Mission critical – How American Cancer Society
successfully and securely migrated to the cloud amid the pandemic,” *I by
IMD*, Institute for Management Development, Lausanne, Switzerland* (*
https://tinyurl.com/fdes2yh4)

*Latest Webinar*: Insights for 2023 Cybersecurity Readiness with Dr. Dave
Chatterjee (https://lnkd.in/gX2pMTFG)


More information about the AISWorld mailing list