Episode Deep Tech Revolution

Episode 243


Episode 243

Deep Tech Revolution

Will technology help save humanity or accelerate our demise? Listen in as host, Cameron D’Ambrosi, discusses with Guy Perelmuter, the Author of Present Future: Business, Science, and the Deep Tech Revolution and Founder of GRIDS Capital, to unwrap the evolution of cryptocurrencies and what that means for the future of money, how global supply chains change with AI, 3D printing, robotics, and blockchain technologies, and how a new “social score” may come into existence.


Cameron D'Ambrosi


Guy Perelmuter, Author of Present Future: Business, Science, and the Deep Tech Revolution and Founder of GRIDS Capital


Share this episode:

Share on facebook
Share on linkedin
Share on twitter
Share on email

Episode 250

The past 10 years have introduced and welcomed mobile wallets, digital assistants, and the adoption of digital identity verification. With the intricacies of our online lives, the notion of tying verification to a credential is slowly dissipating. In this week’s State of Identity podcast, join host, Cameron D’Ambrosi, and Rick Song, Co-founder and CEO of Persona. They break down Persona’s recent $150MM raise, what the next 10 years pose for identity verification, and a few expected challenges we can anticipate along the way.

Episode 249

In this month’s Investing in Identity series, we break down the latest industry trends including:

  • Movers & Shakers: Socure’s $450MM raise at a $4.5B valuation in identity verification, Permutive’s $75MM raise in privacy-first infrastructure for advertising, Neuro-ID’s $35MM for behavioral analytics, and more
  • M&A Activity: McAfee’s going private in a $14B deal and SecureAuth acquires Acceptto to fuel additional action in passwordless solutions
  • Musings of the Month: The internet was built without an identity layer. Will the metaverse? Here are our predictions on how governments, eIDs, and self-sovereign identity will play a role in building verifiable credentials for virtual reality.

Episode 248

Imagine a world where you can replace keys, passwords, smartcards, and other physical tokens with the touch of your phone. It’s not too far off. In this week’s State of Identity, Liminal Managing Director, Cameron D’Ambrosi is joined by Chad Spensky, CEO of Allthenticate, Inc. as they discuss what once started as hacking access control systems for fun to designing digital choke points akin to the movie 300, and how it’s fueled a mission to authenticate the “front door” of the future.

Episode 247

In the underbelly of the internet lurks darknet intelligence. When harnessed appropriately, big data from dark web indexing can minimize uncertainty and maximize cybersecurity in an increasingly hostile information environment. On this week’s State of Identity podcast, host Cameron D’Ambrosi welcomes Jessica Newman, Senior Director of Strategic Partnerships at DarkOwl, to discuss how creating a “Google for the dark web” lends itself to practical use cases – from law enforcement, government applications, to cybersecurity and beyond.

Episode 246

The crypto regulatory landscape is continuously evolving and establishing compliance is quickly becoming a competitive advantage. This week host, Cameron D’Ambrosi, is joined by Alice Nawfal, Notabene Co-Founder & COO, to tackle counterparty risk and why this spooks the regulators. You’ll also learn what you need to know about the Crypto Travel Rule — what it is, how it’s being enforced, and how crypto companies can stay ahead of regulations.

Episode 245

The Zero Trust model is the belief that no one should be trusted from inside or outside your network, until their identity has been verified. Zero trust refers to the alignment of maturing identity practices, an established understanding of user behaviors, and the application of least-privilege access security policy decisions to trust boundaries. In this week’s State of Identity, host, Cameron D’Ambrosi debunks the buzz around zero trust architecture with Ryan Case, Chief Cybersecurity Architect at SailPoint. They provide first-hand guidance on identity-defined security architecture and how it enriches authorization with both contextual and intelligent access information to make objective decisions. In this session, you’ll learn how to reduce friction to end-users while enabling deliberate identity verification and policy decisions.

Generic filters
Filter by Content Type
Select all
Case Study
Filter by Category
Select all
Customer Onboarding
Fraud and Risk
Growth Strategy
Identity Management
Market Intelligence
Transaction Services