Compliance and Authentication as Digital Transformation Enablers

A Fireside Chat with Cybersecurity Attorney Jake Bernstein and BehavioSec VP Jordan Blake

For most companies, digital transformation is a necessary requirement to remain competitive, or in some cases, to remain in business altogether. More than two-thirds of firms worldwide are actively pursuing digital transformation strategies, but most are struggling with balancing this against adequate authentication to meet compliance mandates and prevent Account Takeovers (ATOs) and fraud. As your organization “transforms,” are you over 99% certain you can detect and prevent authentication security attacks? If not, what you’ll learn in this webinar could be vital.

Watch our free webinar for an informative, enlightening, and no-nonsense conversation with two industry experts who discuss the impact of new regulations and why some requirements could make legacy authentication or Identity Access Management (IAM) solutions obsolete. More importantly, why new technologies like behavioral biometrics are transforming transformation.

Highlights:

  • How compliance & authentication can enable digital transformation
  • Why user verification is needed for PSD2 strong customer authentication (SCA) compliance
  • Why new state civil codes like the California Consumer Privacy Act also require better authentication
  • The legal impact of future cybersecurity regulations on two-factor (2FA) and multi-factor (MFA) authentication
  • How to balance authentication and legal requirements against digital transformation and frictionless customer experience (CX)

Watch Free Webinar

You will be taken to the webinar after submitting the form

*Required Fields

Speakers

jake-bernstein-bio-hero-2

Jake Bernstein

Jake provides counsel on cybersecurity and privacy issues. He works with each client to help them understand and manage their cybersecurity risks from a combined legal and technical perspective. By leveraging his Certified Information Systems Security Professional (CISSP) certification, Jake bridges communication gaps between technical security professionals and an organization’s executive leadership.

As a former regulator for the Washington State Attorney General, Jake possesses a robust understanding of laws regulating the collection, storage, and use of private consumer data. His experience allows him to offer clients valuable insight and practical advice from the perspective of a government attorney. His practice includes advice, counseling, and practical compliance programs for the European Union’s GDPR, state laws like the California Consumer Privacy Act of 2018, and state and federal data breach statutes and regulations.

jordan-2

Jordan Blake

Jordan’s role as BehavioSec’s VP of Products drives the vision and growth of the company’s cyber safety solutions while ensuring quality and client satisfaction. His 20-year career in product management, internet security, cyber security, and cyber safety solutions makes him the best choice to lead the firm’s product division. Jordan has held many Product Management roles with global industry leaders like IBM and Symantec. Most recently as the Director of Product Management at Symantec, he led the complex integration of Lifelock after its $2.3 billion acquisition. He previously led early Product Management at FireEye (FEYE), inevitably leading to a multibillion-dollar IPO.

Logo_InterimBenedict_2-C[1]-1

About BehavioSec

BehavioSec is an industry pioneer and advanced technology provider of behavioral biometrics and continuous authentication, safeguarding millions of users and billions of transactions today.

Deployed across Fortune 500 companies to dramatically reduce fraud, friction, threat and theft, BehavioSec verifies and protects human digital identities by understanding how we uniquely type and swipe across our ever-changing devices. Whether used in the cloud or on-premises, BehavioSec delivers the superior user experience, precision and scale needed by organizations to keep customers engaged while catching evasive, real-time attacks other solutions miss.

www.behaviosec.com