The crypto regulatory landscape is continuously evolving and establishing compliance is quickly becoming a competitive advantage. This week host, Cameron D’Ambrosi, is joined by Alice Nawfal, Notabene Co-Founder & COO, to tackle counterparty risk and why this spooks the regulators. You’ll also learn what you need to know about the Crypto Travel Rule — what it is, how it’s being enforced, and how crypto companies can stay ahead of regulations.
Alice Nawfal, Co-Founder & COO at Notabene
The past 10 years have introduced and welcomed mobile wallets, digital assistants, and the adoption of digital identity verification. With the intricacies of our online lives, the notion of tying verification to a credential is slowly dissipating. In this week’s State of Identity podcast, join host, Cameron D’Ambrosi, and Rick Song, Co-founder and CEO of Persona. They break down Persona’s recent $150MM raise, what the next 10 years pose for identity verification, and a few expected challenges we can anticipate along the way.
In this month’s Investing in Identity series, we break down the latest industry trends including:
Imagine a world where you can replace keys, passwords, smartcards, and other physical tokens with the touch of your phone. It’s not too far off. In this week’s State of Identity, Liminal Managing Director, Cameron D’Ambrosi is joined by Chad Spensky, CEO of Allthenticate, Inc. as they discuss what once started as hacking access control systems for fun to designing digital choke points akin to the movie 300, and how it’s fueled a mission to authenticate the “front door” of the future.
In the underbelly of the internet lurks darknet intelligence. When harnessed appropriately, big data from dark web indexing can minimize uncertainty and maximize cybersecurity in an increasingly hostile information environment. On this week’s State of Identity podcast, host Cameron D’Ambrosi welcomes Jessica Newman, Senior Director of Strategic Partnerships at DarkOwl, to discuss how creating a “Google for the dark web” lends itself to practical use cases – from law enforcement, government applications, to cybersecurity and beyond.
The Zero Trust model is the belief that no one should be trusted from inside or outside your network, until their identity has been verified. Zero trust refers to the alignment of maturing identity practices, an established understanding of user behaviors, and the application of least-privilege access security policy decisions to trust boundaries. In this week’s State of Identity, host, Cameron D’Ambrosi debunks the buzz around zero trust architecture with Ryan Case, Chief Cybersecurity Architect at SailPoint. They provide first-hand guidance on identity-defined security architecture and how it enriches authorization with both contextual and intelligent access information to make objective decisions. In this session, you’ll learn how to reduce friction to end-users while enabling deliberate identity verification and policy decisions.