How CISOs can go from *zero trust* to building trust, driving revenue, and delighting customers
Consumer-facing businesses need to attract, entice and delight customers, while deploying security that is unobtrusive but effective, providing assurance for both the customer and business. A high-end jewellery store may have $millions to protect, but it can’t take an impenetrable Fort Knox approach to security, similarly, what worked for securing your workforce does not work for securing your consumer-facing business.

You need to make your customer authentication smarter, make it easier to identify, verify, and authenticate customers with the degree of rigor appropriate to the level of risk. It needs to become a business enabler with the functionality that encourages users to sign up for services and purchases, letting you expand your organization and move to the cloud without increasing your threat landscape or reducing your security.


The key to providing a solution that can flex and adapt along with your customers’ business needs is being able to add or customize features quickly and seamlessly. When a visitor can create a new account in a matter of moments using credentials they already have, their user experience improves dramatically. In this session we will discuss how to implement a security process that achieves this elusive balance.

Discussion topics will include:

  • How can better authentication be used as a business enabler?
  • Why we aren’t weakening our security if we seek to use it to attract or retain more customers.
  • Reasons to outsource your organization’s authentication process, and why you should even if you have the capability to build it in-house.
  • The benefits – and downsides - of using a single, unified Customer Identity and Access Management system rather than best-of-breed solutions for particular implementations. Including addressing lock me in to a single vendor, and existing legacy solutions.
  • Why a Single Source of Truth, or SSoT, is more secure rather than a single point of failure. How it relates to user privacy.
  • Steps to tighten your identity perimeter while moving to the cloud, and you can leverage your authentication to ensure you are compliant with Bill C-11 and other international privacy regulations.


Join ISMG's Tony Morbin for a moderated discussion that will feature insight from Nabeel Saeed, Product Marketer - at event sponsor Auth0.
Nabeel Saeed
Nabeel Saeed
Product Marketer

Tony Morbin
Tony Morbin
Executive News Editor

ISMG
May 10, 2022 | 04:00 - 05:30 pm EDT | Canada
Sponsored By
Auth0

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

May 10, 2022 | 04:00 - 05:30 pm EDT

How CISOs can go from *zero trust* to building trust, driving revenue, and delighting customers