By Emma Lindley
Last week I had the pleasure of moderating the Identity & Access Management stream at The European Information Security Summit in London. I moderated speakers, and panel sessions over two days, covering topics on IoT, biometrics and cloud security.
A well-attended event, it bought together some key leaders and influencers in the security and identity space from diverse market segments such as retail, banking and public sector.
Within my stream we discussed biometrics and the multi-layered approach that is required for strong authentication. We covered the upcoming regulations such as GDPR and how biometrics intersect with privacy and security requirements. It was noted that both scalability and security of biometrics are all important, and those methods which may be considered the most secure, such as iris, may well not scale for widespread applications.
In the second and third panel sessions we talked about securing the perimeter, and IoT. This is a huge challenge for organisations, and I think it’s safe to say many have concerns.
There is unprecedented change happening, the days of all on-premises software, where proprietary applications were accessed from within the confines of the corporate firewall, or by consumers from a single web access point, are long gone.
And with an estimated 20 – 30 billion IoT devices by 2020, there is still no clear picture about how the security and identity of these devices will be managed.
The intersection of mobile and cloud offers visibility and opportunities, but has also created an environment with multiple (and increasing), disparate identities across touch points. One of the toughest challenges facing business and IT leaders today is how to manage the balance of security and user experience.
In my view identity management holds the answer, and as we move toward a completely connected and always-on world, effective identity management is critical.
The worlds of identity and security are continuing to converge and professionals are seeing that identity management needs to be at the heart of security if it is to work. Effective identity management can provide the answer to regulation such as GDPR, can enable compelling user experiences and secure the global ‘anytime, anywhere’ perimeter.
Afterall – Identity is the new perimeter…