Prove's CISO & CIO Amanda Fennell Unveils Her 2024 Cybersecurity Predictions on VMBlog


As we approach 2024, cybersecurity takes center stage, and Prove's very own Amanda Fennell, CISO and CIO shares her insights on how organizations can bolster security by prioritizing people.
Key takeaways:
Elevating Security Through IT Collaboration
- Virtual work's impact calls for a proactive security reassessment.
- Position IT as a strategic advisor by understanding department functions and vulnerabilities.
Prioritizing People for Enhanced Security
- A people-first approach ensures positive experiences for both customers and employees.
- Streamlining processes, especially in digital identity security, is paramount.
Addressing the Cyber Talent Gap in 2024
- The cybersecurity workforce shortage is at a record high.
- Fostering young talent and embracing change in recruitment are key solutions.
As we step into 2024, discover the proactive measures and innovative approaches that will define the future of cybersecurity. Read Amanda's full insights on VMBlog for a comprehensive look at the strategies that will shape the security landscape in the coming year.

Keep reading
Read the article: The Crisis of Identity, Part 1: Why Agentic Commerce Needs a KYA RoadmapAs AI agents begin transacting on behalf of humans, the lack of a unified identity standard is creating a trust crisis in agentic commerce, one that Prove’s Know Your Agent (KYA) framework aims to solve by securely linking every agent action back to a verified human.
Read the article: Why Prove Matters When Identity Data Leaks Become Critical Infrastructure FailuresAs large-scale data breaches expose billions of identity records, traditional identity verification and KYC models fail under automated fraud, making cryptographically anchored, persistent digital identity critical infrastructure.
Read the article: How Prove’s Global Fraud Policy Stops Phone-Based Fraud Others MissLearn how Prove’s Global Fraud Policy (GFP) uses an adaptive, always-on engine to detect modern phone-based threats like recycled number fraud and eSIM abuse. Discover how organizations can secure account openings and recoveries without increasing user friction.