Skip to content
EspanaSec Cyber Summit

Developing Digital Resilience in Spain: Why Verified Trust Is the Next Step After Zero Trust


Course
Upgrade subscription below

Ping Identity's Carlos Scott introduces Verified Trust - the evolution of zero trust - showing how continuous identity verification and AI-resistant proofing close the gaps traditional authentication leaves open.

Zero trust assumes you cannot trust the network, but it still implicitly trusts that the authenticated identity is real. In an era of deepfakes, artificial intelligence-assisted fraud and North Korean actors clearing remote hiring processes, that assumption no longer holds. In this session, Carlos Scott of Ping Identity introduces Verified Trust as the natural evolution of zero trust - a framework that moves from implicit, authentication-based trust to explicit, continuous identity verification across the entire user life cycle.

The session will explore:

  • Why traditional authentication models leave critical entry points unprotected, and how attackers are exploiting these gaps at scale with AI-powered fraud tools;
  • How the Verified Trust framework combines identity proofing, continuous adaptive authentication and risk-based authorization to establish explicit trust between users and services, and between users themselves;
  • What practical implementation looks like across workforce and consumer use cases - from verified remote onboarding and biometric step-up authentication to self-service account recovery.
 

 

Here is the course outline:

Developing Digital Resilience in Spain: Why Verified Trust Is the Next Step After Zero Trust

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button