In her first month of Numeracle, Rebekah Johnson presents KYC to the Communication Protection Coalition (created with PACE)
Read More6 days later, the second use of KYC by Numeracle in comments filed to the FCC in the matter of Advanced Methods to Target and Eliminate Unlawful Robocalls
commentsNumeracle’s KYC-based Entity Identity ManagementTM platform is deployed in its first use case by a CPaaS provider to vet, verify, and protect the communications of the identities on its platform.
Numeracle’s KYC framework deployed across a Global Data Services platform to identify trusted callers in support of industry-wide call authentication efforts to reduce fraud on the network.
Numeracle publishes an article to educate on how introducing a KYC methodology to STIR/SHAKEN is used to define attestation levels
Numeracle’s Rebekah Johnson and Finvi (previously Fonative) discuss the landmark FTC order setting a new precedent for KYC and due diligence in telecommunications on the “Know Your Customer Podcast”
Numeracle and Aegis Mobile host STIR/SHAKEN Virtual Summit Webinar: KYC’s role in shaping ongoing due diligence in support of robocall mitigation requirements
Numeracle’s Rebekah Johnson and financial industry fraud investigator, Sam Fadel, discuss lessons learned in the financial industry that can be used in telecom to apply KYC to prevent fraud
Sarah Delphey joins Numeracle as VP of Trust Solutions to enhance KYC toolsets and expand awareness of repeatable policies and procedures to the market
Numeracle releases a KYC Fundamentals Guide to assist service providers in developing procedures to know their customers and conduct meaningful customer due diligence
Numeracle hosts a panel discussion with Avantive Solutions on Establishing Trust in a Phone Call with KYC Fundamentals for Telecom at the 2022 SIP Forum STIR/SHAKEN Enterprise Summit
Numeracle releases KYC Model Standards Guide to assist service providers in developing procedures to know their customers and conduct meaningful customer due diligence
“If you want to play in this particular industry, there is a responsibility that comes with it, just like being a doctor or being a lawyer.Keep Reading
There are certain fields in certain industries where there is a moral, and ethical responsibility, and think telecom is there now. We have to bring KYC into this industry.”
— Rebekah Johnson, Founder & CEO, Numeracle
Carrying bad actor traffic due to poor Know Your Customer practices can result in heavy fines, investigations, and blocked traffic.
The good news is that you can implement Know Your Customer for your business or on behalf of those you represent, as long as you also define and uphold the mechanisms and processes you set out to meet KYC requirements. It's never too late to start, but it isn't enough to set it and forget it. Ensure you're conducting the necessary due diligence to follow your KYC procedures.
As the leader who brought Know Your Customer to communications, Rebekah has advocated for KYC on all fronts while simultaneously creating a KYC-compliant platform for Numeracle's customers and legal callers to protect calling identities.
With 10+ years of experience in risk mitigation and policy creation, Sarah is an industry expert in trust solutions and KYC. Her work in support of the delivery of compliant traffic to minimize scam/spam illegal traffic and efforts to build trusted voice solutions give her the expertise to recommend KYC best practices for identity vetting and call authentication.
As a leading telecom attorney and robocall policy expert, Keith focuses on ensuring the regulatory environment understands the threat to legal communications posed by the fight against illegal robocalls, recognizing the need for KYC and Know Your Upstream Provider processes.
Numeracle leadership hosted an expert panel at the 2023 KYC Summit hosted by the SIP Forum to discuss the practicalities of deploying a KYC framework in telecommunications to bring purpose to the STIR/SHAKEN protocol.
Our key mission? To share how very doable, possible, and necessary it is to deploy a KYC framework within your organization to vet and verify the identities of each and every entity utilizing the network.