Title 2 

In today's business environment, application and service providers face pressure to evolve their customers' experience and increase their retention rate. However, in this process of maximizing UX and minimizing friction, it is critical to ensure the security and protection of user identity. To do this, it is necessary to understand the threats and attacks faced by Identity and Customer Access Management systems and develop effective strategies to mitigate them.

Current Threats

Jameeka Green Aaron, CISO of Customer Identity at OKTA mentioned these data revealing important trends in the hope that it will bring light to organizations to understand the threats against CIAM:

Fraudulent registrations represent a constant and growing threat. In the first 90 days of 2022, registration fraud accounted for approximately 23% of all attempts. of attempts.

Credential attacks have reached record levels. During 2022, they accounted for 34% of global authentication event traffic.They accounted for 34% of global authentication event traffic, although most industries experienced credential attack rates of less than 10% of login events, in cases such as Retail/eCommerce they were more than 80%. the Retail/eCommerce sector were more than 80%.

Credential attacks have reached record levels. During 2022, they accounted for 34% of global authentication event traffic.They accounted for 34% of global authentication event traffic, although most industries experienced credential attack rates of less than 10% of login events, in cases such as Retail/eCommerce they were more than 80%. the Retail/eCommerce sector were more than 80%.

Credential attacks have reached record levels. During 2022, they accounted for 34% of global authentication event traffic.They accounted for 34% of global authentication event traffic, although most industries experienced credential attack rates of less than 10% of login events, in cases such as Retail/eCommerce they were more than 80%. the Retail/eCommerce sector were more than 80%.

In conclusion, these options allow you to tailor customer identity and access management as needed, without requiring valuable resources that could be spent on advancing your company's core competencies. Whether developing in-house solutions or relying on an identity-as-a-service provider, it is important to implement security measures that balance increased friction for attackers without compromising the user experience.

Meet Ricardo Shuck and Carlos Meyer from our Identity team and start the evolution your company needs!