Compliance and Authentication as Digital Transformation Enablers

A Fireside Chat with Cybersecurity Attorney Jake Bernstein and BehavioSec VP Jordan Blake

For most companies, digital transformation is a necessary requirement to remain competitive, or in some cases, to remain in business altogether. More than two-thirds of firms worldwide are actively pursuing digital transformation strategies, but most are struggling with balancing this against adequate authentication to meet compliance mandates and prevent Account Takeovers (ATOs) and fraud. As your organization “transforms,” are you over 99% certain you can detect and prevent authentication security attacks? If not, what you’ll learn in this webinar could be vital.

Watch our free webinar for an informative, enlightening, and no-nonsense conversation with two industry experts who discuss the impact of new regulations and why some requirements could make legacy authentication or Identity Access Management (IAM) solutions obsolete. More importantly, why new technologies like behavioral biometrics are transforming transformation.


  • How compliance & authentication can enable digital transformation
  • Why user verification is needed for PSD2 strong customer authentication (SCA) compliance
  • Why new state civil codes like the California Consumer Privacy Act also require better authentication
  • The legal impact of future cybersecurity regulations on two-factor (2FA) and multi-factor (MFA) authentication
  • How to balance authentication and legal requirements against digital transformation and frictionless customer experience (CX)

Watch Free Webinar

You will be taken to the webinar after submitting the form

*Required Fields



Jake Bernstein

Jake provides counsel on cybersecurity and privacy issues. He works with each client to help them understand and manage their cybersecurity risks from a combined legal and technical perspective. By leveraging his Certified Information Systems Security Professional (CISSP) certification, Jake bridges communication gaps between technical security professionals and an organization’s executive leadership.

As a former regulator for the Washington State Attorney General, Jake possesses a robust understanding of laws regulating the collection, storage, and use of private consumer data. His experience allows him to offer clients valuable insight and practical advice from the perspective of a government attorney. His practice includes advice, counseling, and practical compliance programs for the European Union’s GDPR, state laws like the California Consumer Privacy Act of 2018, and state and federal data breach statutes and regulations.


Jordan Blake

Jordan’s role as BehavioSec’s VP of Products drives the vision and growth of the company’s cyber safety solutions while ensuring quality and client satisfaction. His 20-year career in product management, internet security, cyber security, and cyber safety solutions makes him the best choice to lead the firm’s product division. Jordan has held many Product Management roles with global industry leaders like IBM and Symantec. Most recently as the Director of Product Management at Symantec, he led the complex integration of Lifelock after its $2.3 billion acquisition. He previously led early Product Management at FireEye (FEYE), inevitably leading to a multibillion-dollar IPO.

Group 28

About BehavioSec

BehavioSec is the industry pioneer and technology leader for behavioral biometrics and continuous authentication, safeguarding millions of users and billions of transactions today. Deployed across Global 2000 companies to dramatically reduce fraud, friction, threat, and theft, BehavioSec protects human-digital identities by understanding how we uniquely type and swipe across our ever-changing devices.

Founded in the Nordics in 2008, funded by top firms like Forgepoint Capital, Cisco, ABN AMRO, Conor Ventures, and Octopus, and headquartered in San Francisco, BehavioSec lowers risk, improves compliance, and helps digitally transform your distributed workforce and customer experience by catching evasive, real-time attacks other solutions miss.