In the summer of 2016, the National Institute of Standards and Technology (NIST) published new draft guidelines that proposed sweeping changes to traditional security models and best practices. Finalized in the summer of 2017, the new NIST guidelines upended several historical approaches to authentication. Security questions are no longer considered secure. Mandatory periodic password changes can weaken security. Special characters can make passwords harder for users to remember and easier for hackers to guess. Is the three-attempt lockout policy even necessary? Regulators defer to NIST standards. Therefore, financial institutions must prepare for shifts in authentication and security compliance by fundamentally recalibrating the balance between digital security and user experience.
- New NIST Digital Identity Guidelines – what to know and why you should care
- Why “security” (challenge) questions aren’t secure
- Why mandatory periodic password changes make passwords less secure
- Why three-attempt account lockouts are unnecessary, frustrate users, and discourage account vigilance
- How to revise password parameters for stronger security and happier end-users
- How to implement two-factor authentication (2FA) for maximum security and usability
- Browser boot-camp: understanding strengths and vulnerabilities among popular web browsers
- Securing your digital channels by taking cues from BigTech
- TAKE-AWAY TOOLKIT
- NIST Special Publication 800-63B Digital Identity Guidelines
- Directory of articles and resources on NIST implications and best practices
- Employee training log
- Quiz to measure staff learning and a separate answer key
WHO SHOULD ATTEND?
This informative session is designed for information security officers, risk officers, compliance officers, IT managers, operations managers, and anyone responsible for the evolution and security of digital banking channels.
SPEAKER: Chad Killingsworth, Jack Henry & Associates, Inc.®