Access Management , Blockchain & Cryptocurrency , Critical Infrastructure Security

Establishing User Authentication Using Blockchain

Prodigi CTO Edmund Situmorang on Enhancing Fraud Detection
Edmund Situmorang, CTO, Prodigi, Sinar Mas Group

Security leaders are leveraging blockchain's decentralized approach to establish user identity,as it is designed to ensure the correction of transactions through reliable sources that help to contain fraudulent transactions, says Indonesia-based Edmund Situmorang, CTO at Prodigi, Sinar Mas Group.

See Also: OnDemand | Understanding Human Behavior: Tackling Retail's ATO & Fraud Prevention Challenge

The new trend in containing transactional fraud is to integrate blockchain with AI to understand the behavioral pattern of the users, he says in an interview with Information Security Media Group.

In this interview, Situmorang discusses:

  • How to make blockchain part of your security strategy;
  • Applying Distributed Ledger Technology to protect from cyberattacks;
  • Integrating blockchain with AI in fraud detection.

Situmorang is managing director and CTO of TechConnect Academy & PRODIGI (Sinarmas Group). He has worked in the U.S. for 11 years as a programmer and strategist, and enthusiastic about technology especially in the field of artificial intelligence.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor & Conference Chair, Asia and Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.