What data elements are required to assist a user in resetting their password which reduces the possibility that someone else is impersonating the real user?

3.2k views2 Comments
Sort By:
Oldest
Chief Technology Officer in Software8 months ago
1. Mobile or Email validation - Send OTP on Mobile or Email only.
2. Two factor Auth
3. Security questions 
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CISO/CPO & Adjunct Law Professor in Finance (non-banking)8 months ago
Kknowledge. It is important to explain to the user the reason for the additional factor, and that information publicly available about them isn't good for security.

Content you might like

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments
VP of IT in Retail3 days ago
If you have a full Gartner license, they have a benchmarking tool that maps out to your industry.  It was useful for my needs.
701 views1 Comment
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes
720 views