Before signing the application you should read the basic information on data protectio here
Basic information about Data Protection
Responsible Party ICAR VISION SYSTEMS, S.L.
Purpose Commercial research.
Recipients Data may be provided to other companies in the group and to third party companies in the technology sector.
Rights Access, rectification, cancellation, opposition, limitation of processing, data portability, and to not be the object of automated individualized decisions.
In Madrid, the second edition of the #SDCongress, el Congreso sobre Seguridad Digital 2016 [the 2016 Conference on Digital Security], took place. The conference included presentations on the latest trends in digital security for online connections and transactions, user experience, and consumer behavior.
Public and private businesses and entities from all sectors (especially from the Financial, FinTech, e-commerce, and telecommunications sectors) participated in this event. With almost 1,000 participants in attendance and more than 60 presenters, it was the most relevant conference on digital security at the national level to date.
Given its role as a business specializing in online identity verification solutions and fraud prevention, ICAR participated as a sponsor and presenter in one of the round table discussions which focused on best practices in advanced identity and access control management.
Other participants in this round table included: Alfonso Berral, Area Manager for the Directorate General of Traffic (DGT); Gregorio Haro Javaloyes, President of the Public Transportation Committee and Director of Intelligent Transport System Spain / the Infrastructure Entity of the Valencian Generalitat (EIGE); Mariano Rebollo, Head of Digital Transactions and Operations Security at Mapfre; and Mariona Campmany, CMO of ICAR, who served as the moderator of the round table.
During the session, participants discussed new identity and access management systems. These systems add value to online processes and facilitate digital transformation, especially when adapting existing offline processes to an online environment.
For example, onboarding, or at-distance contracting of products and services, is an online process increasingly being used by consumers, to the detriment of local providers. However, online processes require security minimums in order to avoid errors and fraud, such as real-time verification of client identity and authentication of identification documents.
One of most-discussed topics was the gap that still exists between the development of payment methods and the development of verification methods. Participants noted that there is also a disparity between the flexibility of some businesses and changes in consumer behavior, especially among millennials.
In addition, the discussion also focused on some of the current systems that resolve the need to verify and validate consumer identity in online transactions, such as Single Sign-On (unique authentication), two-factor authentication (standard, biometric or multifactor), or automatic systems for real-time identity verification, such as ID_Mobile.
One topic participants agreed upon was that the implementation and use of both online payment systems and automatic identity verification and authentication are no longer optional for companies, but rather have become necessary if these companies wish to avoid being left behind in the digital transformation.