Special Webinar Session
Wednesday, June 24, 4:00pm-5:00pm EST
STIR/SHAKEN and Beyond – A Broader Industry Approach to Call Verification, Security & Trust
Governments and industry continue to work toward broad implementation of STIR/SHAKEN and its call attestation benefits. STIR/SHAKEN can indeed provide a substantial and credible means to help verify call identity. Even still, broad acceptance of STIR/SHAKEN alone will not solve all of the issues surrounding call identification, security and trust for the enterprise. Many gaps will remain, and enterprise and contact center environments will remain vulnerable to many types of robocalls and spoofed calling attacks.
A broader architecture and set of technologies for call security and trust is required, along with an intelligent and efficient means to unify and optimize all of it. If properly orchestrated, this broader framework can powerfully lever STIR/SHAKEN across an ecosystem of other industry metadata sets, technology plugins, and industry fraud tools to deliver the most useful call identification results at the lowest cost. This approach extends STIR/SHAKEN to help complete the call verification and security puzzle in a highly affordable and scalable way for the enterprise.
Some of the questions we will answer include:
- What is the full spectrum of call trust and security issues for the enterprise? Which should I be most concerned about?
- What do I get with STIR/SHAKEN and what do I not get? What call verification and security issues remain?
- What are some of the challenges and realities to broad adoption of STIR/SHAKEN?
- What additional tools and processes are needed for the enterprise to achieve full call security and trust?
- What role can AI, Machine Learning, and Orchestration play in extending STIR/SHAKEN as part of a broader call verification framework?
- What is orchestration for call verification, how does it work, and why is it beneficial?
- How does a call verification HUB drive down the costs of enterprise call authentication, identification and security?
- What impact can per-call verification costs have on extending call trust across the enterprise?
As the Chief Technology Officer at SecureLogix, Mark Collier manages the company’s technology roadmap, works with strategic customers, performs security research, monitors for new threats, and architects the company’s security solution. He actively performs VoIP/UC security research, especially in the area of Telephony Denial of Service (TDoS), authentication/fraud, and call spoofing. He has also managed the engineering team for most of the history of SecureLogix and has directed the development of the company’s voice security products. Mr. Collier also works with the Department of Homeland Security (DHS) on multiple research projects, focused on complex TDoS attacks and other security issues in critical environments such as banks and Next Generation 911 centers.
Mr. Collier has also led multiple additional research efforts in the area of voice, VoIP, and UC security, and has developed a number of SIP attack tools as part of this research and to support the books he has written: “Hacking Exposed: VoIP” (2006) and “Hacking Exposed: UC and VoIP” (2013).