• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Podchats for FutureCISO: Future of authentication

Allan Tan by Allan Tan
August 16, 2022
Podchats for FutureCISO: Future of authentication

Podchats for FutureCISO: Future of authentication

Whether for personal use or accessing your corporate network, authentication and authorisation are two critical concepts in access control. At times confused with authorisation, authentication is the process of verifying the identity of an entity before access or authorisation is given.

Authentication may involve the use of passwords, access tokens, and biometric verification while authorization uses processes like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC).

With all the innovations placed around authentication and authorisation, why do systems still get hacked? And as more organisations move to the cloud, what can we expect from these two facets of access control in the years ahead?

Jayavignesh (Jay) Reddy, a senior IAM evangelist for ManageEngine, says enterprises are at a historical low when it comes to trust.

“If you look at it there is no algorithm out there that you can write to detect the truth when it comes to human beings.”

He explained that cybersecurity is moving from being more machine-centric to being very human-centric. “There is a whole load of disinformation, misinformation, fragmentation and what not out there,” he continued. “The biggest challenge is to try and simplify this equation when it comes to the cybersecurity community to have a single source of truth.”

He opined that the best way to go forward is the transparency of processes, ensuring that we have reduced the friction that users have today. “The biggest issue that we have in hand right now is to be able to fool-proof security without compromising the user experience. Hope that answers your question,” he added.

How has authentication (technology and practices) evolved during the pandemic?

Jay Reddy: Before the pandemic, we were probably okay with our traditional network security models. Now enterprises are taking steps to move away from the perimeter because identities are decentralised and all over the place.

Jay Reddy

"There is a lot of talk going on about how to make it (authentication) passwordless, and the whole authentication experience more streamlined, effective, and frictionless. Implementation of zero-trust has been the single and most important role of security operation teams across the world."

Jay Reddy

To sum it up, the pandemic has moved the dial and triggered the thought of authentication being seamless for genuine users being stringent for malicious users.

How CISOs and CIOs position authentication as an enabler for digital business?

Jay Reddy: With multiple stakeholders involved, different business processes to cater to and all these different systems out there running on the cloud, the imperative is to make authentication foolproof.

This is the only goal with which CISOs and CTOs will work forward. This whole pandemic-powered digital transformation has relayed that information across other divisions of the company, making authentication a good sell, probably an easy sell for CIOs and CISOs right now.

Some suggest that passwords be dropped altogether. Is this a good idea in the current state of technology?

Jay Reddy: The one place where both businesses and consumers agree is login security. Consumers want to trust the apps that they are using or be able to hand over their sensitive and personal information to the vendor. For businesses, it is about keeping the information safe.

If you were to ask me is passwordless going to be the future? Yes, passwordless is going to be the future and passwords can be dropped altogether. But if you ask me, are we ready right away? The answer is NO.

It is going to take us a few more years to get there because as we speak, we see big names in tech coming together, probably as part of the FIDO Alliance, like Apple, Google all of them coming together to make one common way of authenticating based on devices or how do you go forward with passwordless.

That's a positive sign and passwordless is going to be the future but it is going to be a little bit delayed in my opinion.

Do you see zero trust as changing the landscape of authentication?

Jay Reddy: Yes. With the perimeter dissolving, it is an obvious incremental addition to what we've been doing all along. Zero-trust is more of a security strategy that makes us question our fundamental beliefs of trust all along.

With the whole zero-trust making momentum, authentication is also changing and one trend that we are observing s UEBA (User Entity Behaviour Analytics) taking centre stage for any authentication in the future. That's where it is headed.

How do you see the future of authentication evolving?

Jay Reddy: For anybody to get UEBA to work, machine learning and AI (Artificial Intelligence) become very prominent in that piece of technology. AI will be used to assist and weigh on individual factors like login attempts with a risk scenario.

The key benefit in this whole authentication powered by AI will be this mould that we have been trying to make. Authentication compromises user experience, and AI will make the user experience essentially much smoother and will give them easy instant access based on the context. If they are an attacker, it is going to stop them from getting into your systems, that's how I see it.

Click on the PodChat player to listen to Reddy share his perspective on the future of authentication.
  1. What is the biggest issue influencing/impacting authentication?
  2. How has authentication (technology and practices) evolved during the pandemic?
  3. How CISOs and CIOs position authentication as an enabler for digital business?
  4. Some suggest that passwords be dropped altogether. Is this a good idea in the current state of technology?
  5. Do you see zero trust as changing the landscape of authentication?
  6. Our topic is the future of authentication. How do you see the future of authentication evolving?
Related:  Podchats for FutureCIO: The evolving face of data protection
Tags: AuthenticationManageEnginepasswordless authenticationPodchats
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe