Главная
Study mode:
on
1
Intro
2
Research
3
Show of Hands
4
About Kelley Robinson
5
Twilio
6
Research Methodology
7
Examples
8
Customer Support
9
IVR
10
Identifying You
11
Identity Verification
12
Identity is not authentic
13
Identity theft
14
Identity theft data
15
Qualitative data
16
Netflix example
17
Amex example
18
Good things
19
Bad things
20
Social Security numbers
21
Identity information
22
What to do about this
23
SMS authentication
24
Amazon account security
25
Fragmented systems
26
email verification
27
other options
28
threat model
29
future of authentication
30
takeaways
31
Questions
Description:
Explore the challenges and best practices of contact center authentication in this 43-minute conference talk from AppSecCali 2019. Delve into Kelley Robinson's research on how companies authenticate customers over the phone, from startups to Fortune 50 organizations. Learn about the gaps in phone authentication compared to online security measures, and discover strategies to improve the experience for both customers and call center agents. Gain insights into what information should be available to agents and how to integrate authentication features into web and mobile applications. Examine real-world examples, discuss the limitations of current methods, and consider the future of authentication in customer support scenarios. Leave with actionable takeaways to enhance security and user experience in your own contact center operations.

Contact Center Authentication

OWASP Foundation
Add to list
0:00 / 0:00