Terry Nelms - Caller Authentication Using Mobile Devices
From Kathryn Gentilello on April 23rd, 2019
Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily spoofed and the answers to knowledge-based questions are often available on the Internet through historical data breaches and social media. Furthermore, mobile apps that prevent incoming spam/scam calls can fail to protect the user because the enterprise’s phone number spoofed by the caller cannot be blacklisted. This talk will focus on the challenges of caller authentication and how to use mobile devices to transfer the trust built in one channel (mobile app) to another (phone call).