YoVDO

Contact Center Authentication

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Web Application Security Courses Customer Support Courses Identity Theft Courses Mobile Application Security Courses

Course Description

Overview

Explore the challenges and best practices of contact center authentication in this 43-minute conference talk from AppSecCali 2019. Delve into Kelley Robinson's research on how companies authenticate customers over the phone, from startups to Fortune 50 organizations. Learn about the gaps in phone authentication compared to online security measures, and discover strategies to improve the experience for both customers and call center agents. Gain insights into what information should be available to agents and how to integrate authentication features into web and mobile applications. Examine real-world examples, discuss the limitations of current methods, and consider the future of authentication in customer support scenarios. Leave with actionable takeaways to enhance security and user experience in your own contact center operations.

Syllabus

Intro
Research
Show of Hands
About Kelley Robinson
Twilio
Research Methodology
Examples
Customer Support
IVR
Identifying You
Identity Verification
Identity is not authentic
Identity theft
Identity theft data
Qualitative data
Netflix example
Amex example
Good things
Bad things
Social Security numbers
Identity information
What to do about this
SMS authentication
Amazon account security
Fragmented systems
email verification
other options
threat model
future of authentication
takeaways
Questions


Taught by

OWASP Foundation

Related Courses

Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam
Cybersecurity Awareness: Phishing and Whaling
LinkedIn Learning
Cybersecurity for Executives
LinkedIn Learning
Avoiding Phishing Scams
LinkedIn Learning
Threat Modeling: Repudiation in Depth
LinkedIn Learning