• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

PodChats for FutureCIO: Intelligently verifying digital identities

Allan Tan by Allan Tan
June 7, 2022
PodChats for FutureCIO: Intelligently verifying digital identities

PodChats for FutureCIO: Intelligently verifying digital identities

Oxford Languages define identity as the fact of being a person or thing. According to the World Bank ID4D data, over a billion people around the world do not have official proof of identity. In Asia-Pacific, up to 20% of the population lacks an ID.

Even as governments race to implement national digital identities, private sector service providers like banks or insurance are not always able to make use of these ID system features, even where the public entities can do so. In less developed sectors of economies, the challenge is even more significant reflecting broader gaps in digital infrastructure, capacity, access, and literacy.

Juniper Research estimates that by 2024, governments around the world will have issued 5 billion digital identity credentials. The question becomes will private sectors embrace these by then. The follow-up question to this – is how we securely access, use and manage these identities.

In the current world, the individual is viewed as new person whenever they have an interaction with a new entity, which gives rise to the situation of individuals holding multiple identities.

Accredify CEO and co-founder Quah Zheng Wei says your identity in the new digital world will put you at the centre of all data interactions. “Meaning you only need one single digital identity to authenticate yourself and to get access to different ecosystems and services around the world,” he added.

What “verifiable identity” solves

Quah says verifiable identity “allows you to control what you have and whom you share it with, in terms of personal data.”

Quah Zheng Wei

He claimed that it grants an individual data ownership and consent management over his data. In a way, it reminded me of the promises of General Data Protection Regulation (GDPR) – that ownership of one’s data belongs to the individual and that person can decide who gets access to what part of his or her information.

“Verifiable identities contain documents that are issued by Distributed Ledger Technology, which means these documents are tamper-proof and traceable back to the source. By granting access to certain data points within your verifiable identity, you can prove whom you are based on your data, such as education qualifications, healthcare records, and even automobile licenses,” he elaborated.

Previously, it was not possible to do so without sharing all your personal information without any discretion.

Where does identity security sit

Quah noted that individuals and organisations have ownership over their verifiable identities, which means organisations are relieved from being custodians of their stakeholders’ data.

He explained that verifiable identities can help organisations quickly establish relationships with stakeholders without having to go through lengthy authentication processes since verification is simplified to a simple QR code scan.

“As verifiable identities can be built for both individuals and organisations, this simplified and reliable verification method can bolster an organisation’s identity security strategy as well as secure KYC or KYB processes in high stakes, high-value business scenarios, such as an investment or an M&A,” he commented.

Why adopt verifiable identity

Asked why it makes sense to adopt a verifiable identity, Quah claims it can facilitate a better user experience from onboarding to offboarding since individuals can use the same verifiable identity for any data interaction, and verification is streamlined into a QR code scan.

They reduce the risk of data breaches since data ownership is transferred to the owner and does not sit with the organisation. “Lastly, verifiable identities contain immutable and tamper-proof data at each data field level, which can also be obfuscated, preserving information integrity. In these ways, verifiable data facilitates compliance with data protection regulations,” he touted.

The first step in verifiable identity adoption

To begin building a verifiable identity on the blockchain, individuals and organisations will have to create, control, and manage public and private key pairings on the blockchain that make up a verifiable identity.

“Organisations and individuals may not have the ability to do so, and this is where Accredify comes into play – by acting as a bridge between the Web 2 and Web 3 ecosystems. We manage private and public key infrastructure for organisations, so enterprises can easily adopt verifiable identities without needing to develop Web 3 capabilities in-house,” said Quah.

How to avoid vendor lock-in

In the adoption of emerging technologies, there is always the risk of vendor lock-in. Quah claims that Web 3 (using public blockchains) circumvents this because it provides perfect interoperability between different ecosystems.

“This means it is sufficient for organisations to work with only one solution provider. Enterprises will decide whom to work with based on which provider can provide the best UI/UX and has the most meaningful downstream integrations,” he opined.

Click on the PodChat player and listen to Quah talk about digital identities and what he calls verifiable identity.

  1. Let’s start with a base and move from there. Define identity in the context of today’s digital economy? How many identities can one person have that can be used to authenticate him or her?
  2. What is verifiable identity? What is/are the problems it aims to solve? Is this the only approach to solving the same problem?
  3. Who owns the identity in these verifiable identities? Where does it sit in an organisation’s identity security strategy?
  4. What are the benefits of this solution at IT/tech level, user level, the perspective of security, and from a compliance perspective?
  5. Will this use of verifiable identity introduce latency, and friction to the user experience?
  6. Given that there are many approaches to verifying identity, how does an enterprise decide which verifiable identity solution providers when looking to introduce verifiable identity as part of its security strategy?
Related:  PodChats for FutureCIO: Excelling in customer experience measurement
Tags: Accredifydata privacyGDPRGeneral Data Privacy RegulationPodchats
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe