If you missed TechCon 2025 - join this interactive session and ask questions!
The use of online systems to complete high value transactions continues to expand the needs to have properly secured systems. This has incentivized the creation of standards and security profiles that prescribe the use of best practices related to the process of generation and usage of security tokens. Join us to learn what the latest developments within this space are, the adoption of these standards in Open-X initiatives and how they are enabled in IBM Verify. We will round off with an exploration of how IBM Verify offers techniques to aggregate security events using open standards, such as the emerging OpenID Shared Signals, to mitigate threats near real time and by augmenting policy information.