A Case of a Taken Identity: What Damage Can Be Done?
About
As increasing amounts of private data are made public, have we lost the battle to keep secrets? Our private identities are almost entirely public: usernames, browsing histories, social media interactions, shopping habits, and government identifiers. Breaches have become an acceptable risk of using online services and in many cases can’t be avoided.
This panel discusses the direction of travel and whether we need to consider other approaches as each additional breach compounds the problem. It aims to answer the following questions and more:
How does an employee identity differ from a personal identity?
We have taken an “assume breach” stance with networks and processes for some time. Should we be extending that to our own identities also?
How can non-human identities help?
What are the upsides of a public identity in terms of verification/validation?
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.