2015 Global Identity Summit

Identity Discovery (Room 22/23)

Approved for: 1 CompTIA CEU for A+, Network+, Security+, and CASP; 1 GIAC CPE

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the applicant's identity, including self-reproted data from the application, corroborating proprietary data sources, and information from user behavior and other analytics.