Biometrics , Governance & Risk Management , Identity Governance & Administration

How to Deploy Passwordless Authentication

Axiata's Abid Adam on Keeping Authentication Frictionless
Abid Adam, group CISO and group head of privacy at Axiata

To implement passwordless authentication, organizations need to integrate multifactor authentication with biometrics, says Abid Adam, group CISO and group head of privacy at Axiata, a telecommunications conglomerate based in Malaysia.

See Also: How Automated Workflows Boost Cybersecurity

Adam stresses the importance of making authentication frictionless. "Apart from biometrics, we also have single sign-on, which provides users a seamless experience and, from a security perspective, has better control than what we had with passwords," he says.

In this video interview with Information Security Media Group, Adam also discusses:

  • The challenges of deploying passwordless authentication;
  • How open identity management is evolving;
  • How identity can cater to various risk profiles.

Adam is the Axiata Group's CISO and head of privacy, responsible for providing strategic direction, implementation, oversight and guidance for cybersecurity and privacy across the Southeast Asia region. Previously, he led the cybersecurity function and implemented transformational programs for a large multinational financial services organization.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Suparna Goswami is Associate Editor at ISMG Asia and has more than 10 years of experience in the field of journalism. She has covered a variety of beats ranging from global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine, and leading Indian newspapers like DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.