www.spiceworks.com Open in urlscan Pro
45.60.13.212  Public Scan

Submitted URL: https://mail.spiceworks.com/c/AQiv0hQQ-JQdGIr_3L8BILPNwAcRMTG4oGSYc45rYYvJS_ae293H1TPmmfbHUPSMqlIPHg?_externalContentRedirec...
Effective URL: https://www.spiceworks.com/it-security/identity-access-management/guest-article/how-to-prioritize-digital-trust/?utm_source...
Submission: On March 06 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form role="form">
  <i class="mag-glass"></i>
  <input class="search-input" autocomplete="off" placeholder="Search Spiceworks" disabled="">
  <i class="clean-icon" style="display:none"></i>
  <div class="trending-topics"></div>
  <div class="search-box-results"></div>
</form>

Text Content

Skip to Main Navigation Skip to Main Content Skip to Footer
Home
 * News & Insights
   * News & Insights Home
   * Artificial Intelligence
   * Innovation
   * IT Careers & Skills
   * Cloud
   * Cyber Security
   * Future of Work
   * IT Research
   * All Categories
 * Community
   * Community Home
   * Cloud
   * Collaboration
   * Hardware
   * Networking
   * Programming
   * Security
   * Software
   * Storage
   * Vendors
   * Virtualization
   * Windows
   * All Categories
 * Events
 * IT Tools
   * Cloud Help Desk
   * Inventory Online
   * Contracts
   * Connectivity Dashboard
   * Pricing
   * All IT Tools
 * State of IT
 * Newsletters
 * Reviews


Login Join
Login Join




--------------------------------------------------------------------------------

Identity & Access Management


WHAT’S ON THE HORIZON FOR DIGITAL TRUST AND IDENTITY

Learn how to prioritize digital trust to secure your organization’s future in a
rapidly changing landscape.

Dean Coclin Senior Director, Digital Trust Specialist , DigiCert
March 5, 2024

--------------------------------------------------------------------------------




Dean Coclin, senior director & digital trust specialist of DigiCert, discusses
how organizations can proactively manage challenges, prioritize digital trust,
and stay resilient.

Last year, one of the most memorable milestones was the mainstream breakthrough
of artificial intelligence (AI) into mass awareness. Not long ago, AI
discussions were mostly around technical capabilities like speech recognition,
chatbots, search engines, and recommendation algorithms. But AI went mainstream
as groundbreaking new applications like ChatGPT burst into the headlines. And
fast.

It’s not surprising that AI and other maturing technologies are having a big
impact on cybersecurity strategies. We’ll explore how these and other trends are
shaping the outlook for identity and digital trust—and how organizations can
take steps to manage new challenges.


AI TURNS THE TABLES, AND ORGANIZATIONS MUST PREPARE

For security professionals, AI has long been a key enabler of defensive tools
like intrusion detection systems (IDS) and intrusion prevention systems (IPS).
However, as AI has become more widespread, it’s expected to be soon applied to
attacks and defensive systems. 

For example, today’s AI technology can rapidly write, build, and render websites
based on search queries. This dynamic capability is a powerful way to deliver an
engaging, personalized experience for end users, but it can also be applied to
malicious activities. For instance, a bad actor might use generative AI to set
up a fake web page with misleading information that looks authentic, damaging
the company’s reputation.

Deepfakes are another area where AI excels, and applications are already widely
available that can enable innovative new attacks on individuals and enterprises.
In the near future, cybercriminals might use AI to harvest data from publicly
available sources and put it to work for their schemes. Using tools that are in
reach today, a bad actor could easily extract data from a resource like LinkedIn
or sample a YouTube clip to impersonate a manager or an executive’s voice. Armed
with this stolen identity, the attacker could easily reset passwords, issue
false employee announcements, or create mischief that costs time and money to
correct.

See More: Is Your Corporate Data Safe from Insider Threats?


TACKLING POST-QUANTUM COMPUTING THREATS

Like AI, quantum computing technology is also introducing new threats for
cybersecurity professionals. With its enhanced processing power and accelerated
speed, current quantum technology is nearly capable of breaking traditional data
encryption algorithms—and compromising public key infrastructure. 

According to a recent Ponemon Institute survey, “Preparing for a Quantum-Safe
Future,” IT leaders are especially concerned over “harvest now, decrypt later”
cyberattacks, which steal encrypted data today with plans to decrypt it. The
survey also showed that most organizations have not established clear ownership,
budget, and strategies to enable post-quantum cryptography (PQC).

Fortunately, industry trends are in motion that will empower organizations to
boost their investments and enforce PQC policies more proactively. The National
Institute of Standards and Technology (NIST) plans to release new standards in
mid-2024 to help organizations develop and document their approaches to quantum
strategy. But the clock is ticking, and the time is now to prepare information
security environments and processes for a post-quantum world. 


DIGITAL TRUST AND IDENTITY ARE FUNDAMENTAL

As recent technology advances threaten to undermine cybersecurity strategies,
establishing digital trust and identity is becoming even more essential. In the
DigiCert State of Digital Trust reportOpens a new window , 99% of businesses
surveyed indicated that losing customer trust can directly result in lost
business. Industry and government organizations worldwide are moving fast to
strengthen identity verification and trust.

For example, in the EU (European Union), a new legislation called eIDAS
emphasizes trust services more strongly. One example is a Qualified Website
Authentication Certificate (QWAC). A QWAC makes it possible to authenticate a
website and link it to the entity to which the certificate is issued. It enables
secure internet connections by encrypting data and authenticating the owner of
the website and the domain name. 

The new EU law will require browsers to display the information in these
certificates prominently. The legislation will strengthen trust and identity
while empowering consumers and the organizations they interact with.
Governments, financial institutions, and online retailers will understand the
value of displaying their identities and will be able to advise their customers
to trust only websites that display QWACs. 

As more organizations emphasize digital trust, we’ll also see the increased
adoption of zero-trust architectures. Based on the concept of “never trust,
always verify,” these architectures will replace the traditional Virtual Private
Networks(VPNs) and infrastructures built around implicit trust for users.
Organizations can provide identity services, ensure integrity, and encrypt data
and application interactions via certificate-mediated authentication. 


INSTILLING TRUST FROM THE TOP DOWN

Like any major strategic initiative, these new approaches to cybersecurity,
digital trust, and identity will require direction from the highest levels of an
organization. We’re starting to see more enterprise organizations establish
Digital Trust Officer (DTO) and Chief Trust Officer (CTrO) positions. These
leaders are responsible for ensuring that an organization’s partners and
customers can trust the organization’s digital assets. 

A DTO focuses on keeping an organization’s digital presence secure and reliable,
with trust built into every digital interaction. Working closely with the Chief
Technology Officer (CTO) and Chief Information Security Officer (CISO), they
safeguard the organization and its reputation from cyber threats and legal and
compliance risks.

What makes a DTO different from a CISO or CTO? A Trust Officer considers the
bigger picture beyond security and cyber concerns. They ensure trust is embedded
throughout the organization, including its technology, processes, and individual
best practices. A DTO also ensures the digital strategy aligns with the
organization’s trust values. They must understand the nuances of security and
the technical aspects of mitigating the associated risk.

Rapid technological advances are changing how organizations think about
cybersecurity and digital trust. But with a proactive approach, informed
leaders, and the right strategies, there’s still time for organizations to
tackle complex new challenges. 

How can your organization navigate AI and quantum threats? Let us know on
FacebookOpens a new window , XOpens a new window , and LinkedInOpens a new
window . We’d love to hear from you!

Image Source: Shutterstock


MORE ON DIGITAL THREATS 

 * Toxic Trust: Navigating Cyber Threats on Familiar Websites
 * Guard Your Business: Preventing Accidental Insider Threats
 * Is Quantum Computing a Threat To Current Encryption Methods?
 * How to Tackle Cybersecurity Threats with a Risk-Based Approach



Cybersecurity IT Security

SHARE THIS ARTICLE:




Dean Coclin

Senior Director, Digital Trust Specialist , DigiCert

opens a new window opens a new window
opens a new window opens a new window

Dean Coclin has more than 30 years of experience in cybersecurity, software and
telecommunications. As Senior Director of Business Development at DigiCert, he
is responsible for driving the companys strategic alliances with IoT partners in
the consumer security market, and with other technology partners. Coclin is also
the previous chair of the CA/Browser forum. He holds a BSEE from George
Washington University and an MBA from Babson College. Coclin is currently
pursuing a Masters Degree in Cybersecurity Policy and Compliance.
Do you still have questions? Head over to the Spiceworks Community to find
answers.
Take me to Community


Popular Articles
Google Accounts Compromised by Hackers Without the Need for Passwords
Passwords: The End Is Coming
Experts Talk: Predicting the Cybersecurity Landscape in 2024




RECOMMENDED READS

Artificial Intelligence


ELON MUSK KICKS OFF BATTLE OF THE TECHNOCRATS, SAM ALTMAN RESPONDS

Artificial Intelligence


HOW AI PARTNERSHIPS CAN EMPOWER TRADITIONAL BANKS?

Networking


DECODING MWC BARCELONA 2024: A YEAR OF CONNECTIVITY AND TRANSFORMATION

Innovation


MEET YOUR NEW INTERN: THE RISE OF AI-POWERED DIGITAL WORKERS

Artificial Intelligence


MLOPS TOOLS COMPARED: MLFLOW VS. CLEARML—WHICH ONE IS RIGHT FOR YOU?

Artificial Intelligence


WHY PRIORITIZING HUMAN ELEMENT IS CRUCIAL FOR SMART MANUFACTURING

spiceworks
 * About
 * Contact
 * Support
 * Advertise
 * Press / Media
 * Careers
 * Spiceworld
 * Blog
 * About Editorial
 * Follow on Facebook Follow on Linkedin

 * Sitemap
 * Privacy Policy
 * Terms of Use
 * Cookie Policy
 * Guidelines
 * Accessibility Statement
 * Do Not Sell my Personal Information

 * © Copyright 2006 - 2024 Spiceworks Inc.

Go to mobile version




WE CARE ABOUT YOUR PRIVACY

If you consent, we and our 803 partners can store and access personal
information on your device to provide a more personalised browsing experience.
This is accomplished through processing personal data collected from browsing
data stored in cookies. You can provide/withdraw consent and object to
processing based on a legitimate interest at any time by clicking on the ‘Manage
Preferences’ button.Our Privacy Policy


WE AND OUR PARTNERS PROCESS DATA TO PROVIDE:

Store and/or access information on a device. Personalised advertising and
content, advertising and content measurement, audience research and services
development. List of Partners (vendors)

Reject All I Accept
Show Purposes