Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K.
B (0:11)
This exclusive N2K Pro Subscriber only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter building full Stack zero trust networks from the ground up. Trusted by security and network leaders everywhere, Meter delivers fast, secure by design and scalable connectivity without the frustration, friction, complexity and cost of managing an endless proliferation of vendors and tools. Meter gives your enterprise a complete networking stack, secure, wired, wireless and cellular in one integrated solution built for performance, resilience and scale. Go to meter.com CISOP today to learn more and book your demo. That's M-E T E R.com CISOP Foreign. Four Individuals A British fashion designer, an American rap artist, a Filipino influencer and an old security Guy While there are many, many differences between these folks, there is one important similarity that is relevant to this discussion and that is this. Each of these individuals is named Kim Jones. With in person interactions, the differences between these four Kim Jones would be obvious. It would be as difficult for Kim Jones the Filipino influencer to masquerade as Kim Jones the old security guy as it would be for me to impersonate the rapper Lil Kim online. Though any of these individuals could at least begin the process of accessing data that is restricted to my personal use by honestly and truthfully providing their names. This example illustrates one of the fundamental challenges with combating online fraud establishing identity in a non reputable yet convenient manner. While we understand that merely a name is nowadays woefully insufficient in establishing online identity, adding both layers of complexity such as geolocation and authorizing financial transaction and additional factors for authentication have yet to stop the seemingly exponential advancement of fraudsters. As we provide more data to organizations, it's theoretically possible to create a unique identity using seemingly innocuous non regulated information. But this ignores another fundamental problem with establishing identity capturing the identity information in a pseudo physical or atomic fashion. Once identifying information is given and stored in some fashion, that identity becomes a de facto token and tokens can be tampered with or stolen. If we wish to get a handle on fraud, then it's time for us to start re examining how identity works and functions online. Rather than assuming that traditional models of identity are the only solution, we need to start exploring concepts such as making identity bidirectional, reinforcing or strengthening a session or transactional identity, and exploring the concept of secretless identity. I've written and spoken about these concepts before, all with the caveat that these concepts are by no means the only potential solutions to the problem. That said, it is clear that we need to move beyond rehashing or even complexifying old models of identity which fail to address the real needs of our data driven world. Buy $0.02. Welcome back to CISO Perspectives. I'm Kim Jones and I'm thrilled that you're here for this season's journey. Throughout this season we will be exploring some of the most pressing problems facing our industry today and discussing with experts how we can better address them. Today we're looking at fraud from a different angle than we did last episode. This time we're going to look at fraud from an identity perspective. Let's get into it. Richard Byrd is an internationally recognized expert on the topic of identity. Richard's goal, his push for our community rather, is to look beyond the traditional bounds and mechanisms of how we approach identity and explore innovative solutions to this topic. I sat down with Richard to explore the concept of identity and how getting identity right might solve a plethora of challenges to include fraud within cybersecurity. A quick note that the opinions expressed by Richard in this segment are personal and should not be interpreted as representing the opinions of any organization that Richard has worked for, past or present. Richard, it is really great to see you man. We don't get to see one another that often.
![Fraud and Identity [CISO Perspectives] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F6b0f15de-b35f-11f0-95e4-c39668b06a85%2Fimage%2F4576c79a6260b29daaff0ea0480913c0.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)