Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Sharing Economy - Who Can You Trust #IMVC17

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Navigating Personal Identity & Managing Risk

Watch this Infosecurity Magazine Fall 2017 Virtual Conference keynote presentation, now on demand!

The sharing economy has turned the traditional marketplace on its head and it seems appropriate that the sharing economy be the venue that we use to challenge traditional notions regarding identity verification.

Despite personal data consistently being a reliable source for validating identity to companies, companies are investing more time and energy to effectively acquire, manage and protect the personal information of their users and workforce to the detriment of their own business focus. Additionally, the regulatory requirements and liability that accompany any interaction with personal data continue to increase, putting additional strain on businesses to stay current in their efforts and information.

From a user perspective, as individuals are asked to provide their information more broadly, security concerns and a loss of control become more prevalent, possibly even putting once standard interactions at risk. Individuals are looking for a simple, easy way to manage their personal information with minimal friction and energy.  

In this session we will discuss how establishing a trustworthy and verifiable identity can utilize the possibilities of the sharing economy, while mitigating the risk.

  • How the sharing economy is increasingly integrating into our daily lives, and is becoming a serious source of income with providers offering more sophisticated services.
  • The problems that are faced by businesses and individuals and finally potential solutions for managing the security of personal data.
  • What are the compliance barriers to the sharing economy

Speakers

Dan  Raywood

Contributing Editor, Infosecurity Magazine

Nathan Rowe

Chief Product Officer, Evident ID

    Brought to You by