Strong Security Vs. User Experience: Finding The Right Balance

Authentication Methods That Can Help Or Harm Your Organization’s User Experience

Different strong authentication methods yield varying user experiences. Understand the trade-offs and what works best for your organization, your customers, and your employees.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
September 18, 2019
01:00 PM - 02:00 PM EST

Sponsored By:

All enterprises must balance their need of authentication practices with ensuring a frictionless user login process. That is because there is a fine line between maintaining the essential strong security posture for user accounts, while also ensuring a positive user experience — especially as people are critical in maintaining that posture. According to respondents of an Akamai/Ponemon Institute survey:

“71% said that preventing credential stuffing attacks is difficult because fixes that prevent such action might diminish the web experience for legitimate users.”

Different strong authentication methods yield varying user experiences: That is why, during this web seminar we will explore 2FA, MFA, Adaptive Authentication, Biometrics, Credential Screening and more to help you understand what works best for your organization, your customers, and your employees.

It is a simple fact that strong authentication will impact user experience and effectiveness. However, with various authentication methods your organization can now manage how significant that impact is for the user, in order to find the most secure balance.

Attendees will learn about:

  • Examples of user friction during authentication
  • The pros and cons of different authentication security tools
  • The differences in how industries are approaching authentication
  • What other enterprise organizations are doing to address the UX challenge

 

Presenters:

Michael Welch
Managing Director, GRC, Strategy, vCISO
Vaco

Mike drives the business vertical related to GRC and overall strategy outward-facing in additon to providing CISO services internally to the Vaco business.  Prior to joining Vaco, Mike was the Global CISO for OSI Group.

Dave Swift
VP of Engineering
The Grommet
Josh Horwitz
Chief Operating Officer
Enzoic
Entrepreneur and software executive with twenty years experience in both technology and marketing positions for start-ups and the Fortune 500. Co-founder of a security software start-up focused on network vulnerability and fraud risks caused by stolen login credentials. Previously founded a B2B SaaS company offering a customer-marketing platform to clients included Microsoft, Siemens, and Dell. Grew the business from inception through profitability and to its acquisition.

Host:

Jeff Orr
Editor
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.