Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
She Said Privacy/He Said Security - Reinstating Control With Digital Identity

Reinstating Control With Digital Identity

Explicit content warning

06/30/22 • 28 min

She Said Privacy/He Said Security

David Lucatch is the CEO, President, and Chair at Liquid Avatar Technologies, a digital identity and fintech solutions company that provides verified users with services to manage, control, and benefit from their digital identity. David has over 35 years of experience inventing technology and business solutions in the international marketing arena. He spent the last 20 years developing payment technology, language, and translation services to support the infrastructure of conducting business online.

In this episode...

Many forms of identity verification are outdated, with users lacking control over their own identities. Methods like two-factor authentication can lead to hacking and a subsequent violation of the user’s privacy. What steps can you take to safeguard your consumer’s identity and gain their trust in the process?

You can start by leveraging digital identity to allow users to protect and control their identity. One way to achieve this is by utilizing biometrics as a form of authentication so consumers can regulate how and where they can share their identities. And by implementing blockchain, you can safely and seamlessly verify your user’s individual credentials to minimize the risk of identity theft.

Tune in to this episode of the She Said Privacy/He Said Security podcast as Jodi and Justin Daniels talk with David Lucatch, CEO, President, and Chair of Liquid Avatar Technologies, about how you can best secure your consumer’s identity. David explains how Liquid Avatar allows users to verify their identities, blockchain’s role in identity verification, and how Liquid Avatar leverages the three types of identity.

plus icon
bookmark

David Lucatch is the CEO, President, and Chair at Liquid Avatar Technologies, a digital identity and fintech solutions company that provides verified users with services to manage, control, and benefit from their digital identity. David has over 35 years of experience inventing technology and business solutions in the international marketing arena. He spent the last 20 years developing payment technology, language, and translation services to support the infrastructure of conducting business online.

In this episode...

Many forms of identity verification are outdated, with users lacking control over their own identities. Methods like two-factor authentication can lead to hacking and a subsequent violation of the user’s privacy. What steps can you take to safeguard your consumer’s identity and gain their trust in the process?

You can start by leveraging digital identity to allow users to protect and control their identity. One way to achieve this is by utilizing biometrics as a form of authentication so consumers can regulate how and where they can share their identities. And by implementing blockchain, you can safely and seamlessly verify your user’s individual credentials to minimize the risk of identity theft.

Tune in to this episode of the She Said Privacy/He Said Security podcast as Jodi and Justin Daniels talk with David Lucatch, CEO, President, and Chair of Liquid Avatar Technologies, about how you can best secure your consumer’s identity. David explains how Liquid Avatar allows users to verify their identities, blockchain’s role in identity verification, and how Liquid Avatar leverages the three types of identity.

Previous Episode

undefined - Implementing Virtualization for Safe and Efficient Software Testing

Implementing Virtualization for Safe and Efficient Software Testing

Amanda Gorton is the CEO and Co-founder of Corellium, a platform that helps developer and security teams build, test, and secure mobile and IoT apps supporting iOS, Android, and Linux through ARM virtualization. Amanda was previously the Co-founder of Virtual, which Citrix acquired in 2014. She holds a master's degree in Latin from Yale.

In this episode...

When testing new software and devices, it’s necessary to provide your development team with the resources needed to conduct effective tests — but many companies rely on physical devices that get lost, broken, or compromise their employees’ personal security. So what is the most productive method to run QA and security tests?

Virtualization services allow you to conduct software and device testing by creating replicas in component-based applications. This system enables you to run multiple softwares simultaneously, ensuring maximum efficiency. And with Corellium’s ARM-based virtualization, you can protect your company’s privacy by destroying virtual devices and seamlessly performing security tests during the initial stages of development.

In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Amanda Gorton, Co-founder and CEO of Corellium, to discuss using virtualization services to perform safe and effective software testing. Amanda talks about how Corellium employs virtualization for developers to test software, the privacy and security guidelines companies should consider when working with virtualization, and the steps companies are taking to solve the most pressing privacy and security challenges.

Next Episode

undefined - Regulating Air Traffic for Drone Use

Regulating Air Traffic for Drone Use

Dawn Zoldi (Colonel, United States Air Force Retired) is the Founder and CEO of P3 Tech Consulting, a company connecting people and companies passionate about advanced tech platforms with the plans, policies, programs, and information they need to succeed. She is a licensed attorney and a 28-year U.S. Air Force Veteran.

As an internationally-recognized expert in unmanned aircraft systems and advanced mobility law and policy, Dawn was listed in the eVTOL Insights 2022 Powerbook, one of the Top Women in Aerospace and Aviation to Follow on LinkedIn in 2021, and a recipient of the Woman to Watch Leadership Award for 2019. She is also an Adjunct Professor at Colorado State University-Pueblo and Embry Riddle Aeronautical University Worldwide Campus.

In this episode...

With unmanned aerial vehicles (UAV) on the rise, privacy and security is often unregulated, and drone users outsource air traffic management to a third party. So, what systems can your company put in place to protect your data and mitigate drone misuse?

As a licensed attorney and UAV specialist, Dawn Zoldi suggests implementing cybersecurity guidelines for drone hardware and operations. One way to accomplish this is to put a system in place that identifies faulty signals and seizes control over the aircraft to safely land it. With the proper constraints in place, you can effectively secure your data and connection.

In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dawn Zoldi, Founder and CEO of P3 Tech Consulting, to discuss drone regulations. She talks about the different types of drones and how each one collects data, the risks associated with outsourcing air traffic control to a third party, and how companies can implement cybersecurity solutions for drone control.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/she-said-privacyhe-said-security-406291/reinstating-control-with-digital-identity-56793712"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to reinstating control with digital identity on goodpods" style="width: 225px" /> </a>

Copy