Modern Cybersecurity Trends & Technologies

  •  TYPE: Channel   DATES: May 14 - May 17, 2019
Event Channels

Perhaps the biggest myth about cybersecurity is that it takes care of itself. Unfortunately, the history of the recent large-scale cybersecurity incidents clearly demonstrates that even the largest companies with massive budgets for security tools are not immune to attacks. Also, many employees and whole business units often see security as a nuisance that hurts their productivity and would sometimes go as far as to actively sabotage it, maintaining their own “shadow IT” tools and services.

However, the most common cause of security breaches is simple negligence stemming primarily from insufficient awareness, lack of established processes and general reluctance to be a part of corporate cybersecurity culture. Unfortunately, there is no technology that can fix these problems, and companies must invest more resources into employee training, teaching them the cybersecurity hygiene basics, explaining the risks of handling personal information and preparing them for the inevitable response to a security incident.

Even more important is for the CISOs and other high-level executives to continuously improve their own awareness of the latest trends and developments in cybersecurity.

Sessions:

Bringing you Transparent & Trustworthy Specifications, Assurance Programs and Research Funding

Date: Tuesday, May 14, 2019 Time: 09:00-13:00 Location: AMMERSEE II

'Keep up with the Kantarians as they overview Kantara Consent Receipt implementations and demo them in action, reprise Kantara UMA through Relationship Management and business models, and prepare you for privacy-focussed open call H2020 funding in your hands'

Artificial Intelligence & Machine Learning in Cybersecurity 101

Date: Tuesday, May 14, 2019 Time: 09:00-13:00 Location: BODENSEE II

AI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This workshop will introduce the various AI technologies and describe the areas where they can be applied today.   It will include real life examples of how it is being used.   It will also discuss the limitations of the current state of the art and some of the research into overcoming these.  The session...

Use of Production Data in Test Environments

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: AMMERSEE I

Use of Production Data in Test Environments
Due to the requirements in GDPR, IAM professionals can no longer accept to use production data in development and test environments, which has been a common practice for many years. The presentation will focus on the GDPR requirements regarding anonymization or pseudonymization of production data, and discuss why this is almost impossible to do in IAM projects. Testing IAM solutions and cleaning data is an integral part of the presentation. Key takeaways:...

Privacy By Design as a System Design Strategy

Security and Privacy in the “When-Not-If” Era
Beyond a mere equation between risk appetite, compliance and costs, cybersecurity is becoming a matter of good corporate governance, good ethics, and quite simply – good business. The Board, which is ultimately accountable for cyber resilience, must own it and drive it as a key pillar of any firm Environmental, Social and Governance (ESG) strategy

AI for the Future of your Business

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: AMMERSEE II

AI for the Future of your Business
AI covers a range of technologies and some of these are sufficiently mature for commercial exploitation and some are not.  This session will describe the areas where they can be applied today. It will include real life examples of how it is being used.   It will also discuss the limitations of the current state of the art and some of the research into overcoming these. 

Use Case: AI Powered Conversational Experience at the Singapore Art Museum

Panel: What are the Secrets to Successful AI?
You have AI. She has AI. It’s 2019. We’re all going to have AI powering conversational experiences with our customers. But there’s a problem. How do you make your AI stand out from your competitors’ AI?

Identity Is at the Center of Zero Trust, Not the Network

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: CHIEMSEE

Identity Is at the Center of Zero Trust, Not the Network

Panel: Placing Identity at the Center of Security Designs & Models
What does it mean to have identity at the center of your security infrastructure? At its core, it says that we have to build our solutions to always question who someone is, what they want to do. We can no longer blindly trust that just because they come from a known location those questions no longer matter. At the center of those questions is a critical concept: identity. At the center of those questions is one crucial idea: identity. Our solutions must continually validate the identity...

Privacy — Do We Actually Care?

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: AMMERSEE I

Privacy — Do We Actually Care?
This session will highlight how we rationalize or perceive data-privacy, why we care and actually don't, and what we expect from companies when it comes to our own data.  This session will explore and explain how understanding individuals’ expectation about privacy, and the principle of behavioral economics will have an enormous impact on how companies conduct business today and more importantly, tomorrow. 

LIVE Demo of an Interoperable Personal Data Receipt Ecosystem – the Kantara Initiative Privacy Control Panel System

The Identity Problem of Chatbots

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: AMMERSEE II

The Identity Problem of Chatbots
Chatbots are alternatively being hyped as a great opportunity and a great disappointment. There is a plethora of options on how to build and design chatbots and a lot of platforms where they can run. To make things even more complicated there is a lot of confusion around the lines between chatbots and artificial intelligence and how the two intersect. This talk aims to clarify the range of concepts and give you a conceptual framework that will make it much simpler to guide strategic...

Intelligent Chatbots - Different Approaches and their Use Cases
We go through different approaches to chatbots development. The presentation consists of a few Jupyter notebooks with code samples. We show and compare a few examples of neural networks architectures that can be used for chatbots. Based on our experience and presented architectures we give some advice on which architecture should be used where. Key Takeaways know the chatbots taxonomy and difference between each what is important to build an intelligent chatbot what kind of...

Panel: Chatbot Identity - Challenges and Possible Solutions
Chatbots are replacing humans in many domains from online sales assistants to online learning.  However, they can often be very stilted and mechanical in their interactions – how can we give a chatbot a more human persona?  As with all systems, using a chatbot involves a level of mutual trust and this depends upon identity.  How can the human be sure that the identity of the chatbot and how can the chatbot be sure of the identity of the human?  This panel will...

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: CHIEMSEE

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition
The complexity and sophistication of modern malware are evolving rapidly. Malwares today are able to exploit both hardware and software to infiltrate systems and tamper with data used for management. The revelation of several attacks on host machines, highlights that anything with shared resources can be attacked.  In cloud environment, data management is done by a centralised server that maintains the state of each platform. However, this is not...

Navigating NIST Sp-800-63-3 Thanks to Practical xAL Cheat Sheets
Trust. Trust is the most fundamental notion in every one of our business interactions, whatever our needs are: low or high assurance. Do you know that, by June 2019, NIST SP-800-63-3 will celebrate its second birthday? It is a framework that improved lots of points over the previous LoA scale and gained a lot of maturity thanks to implementers, researchers, and confrontations to other Trust frameworks. Still you may find it hard to find your way wherever you try to be a compliant IAL2...

Fight Cyber Risks with Risk Aware DevOps Engineers!
To keep a customer’s trust risk and security is key for Financial Enterprises like ING. At the same time we want to work Agile in an BizDevOps format, because we know it gives us the increased velocity and quality of software we need. And this way of working leads to happier and therefore more productive employees. A separate security team that has to check all software before it goes into production would be a huge bottleneck, especially if you have...

The Anatomy of an IAM Cyber Kill Chain

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: CHIEMSEE

The Anatomy of an IAM Cyber Kill Chain
In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to...

The POWER HACKER – Don’t Let the Lights Go Out – A Look Inside the MIND of a Hacker
Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes. This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to...

At the Intersection of API Security, Cybersecurity and IAM: the Next Wave of Intelligent Solutions
Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of...

Consumer Consent - The Make or Break of your PSD2 Compliance Implementation

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: AMMERSEE I

Consumer Consent - The Make or Break of your PSD2 Compliance Implementation

Panel: Consent Lifecycle Management as Necessity for Your GDPR & PSD2 Compliance
Consent Management continues to be a hot topic for many organizations, especially for those who store and process customer data. This Panel will discuss why a core requirement for being compliant with regulations like GDPR or PSD2 is a strategy for the Lifecycle of Consumer Consent and what consent management features do you need.

Can MyData Solve Post-GDPR Consent Management?

The 6 Major Ethical Issues of AI

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: AMMERSEE II

The 6 Major Ethical Issues of AI
This will provide a short introduction to ethics and why it is relevant to AI.  It will outline the ethical problems that Artificial Intelligence raises.  Ethics considerations can help to better identify beneficial applications while avoiding harmful ones.  In addition, new technologies are often viewed with suspicion and mistrust.  This can unreasonably inhibit the development of technologies that have significant beneficial potential.  It will describe six areas...

AI's Ethical Problems and Blockchain's Solutions
Blockchain is, simply put, a public list. And because AI uses a list to predict things then we can see that AI and Blockchain fit nicely together. This is lucky because AI is presenting problems Blockchain helps solve. Is it fair that Facebook control the most powerful AI system on the planet -- a system built with end-user data? Blockchain helps decentralize AI and it allows users to be compensated for their data. It also allows the monetization of open source. And that's important stuff...

Panel: Integrating Ethics into AI Research, Development, and Adoption
Digital Transformation rewuires leaders to gain a new, informed perspective on the implications of technology and security on business decisions. AI driven tools lack transparency and may lead to unexpected consequences, which makes it complex to evaluate them and requires, more than ever, interdisciplinary expertise. In this panel, we will try to initiate a conversation that we haven´t really had so far, but is critical fort he success of our bsuiness and technology strategies.

Stealing the Crown Jewels

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: ALPSEE

Stealing the Crown Jewels
Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi. This talk looks at the result from penetration testings of PAM systems at major enterprises and...

Panel: Leveraging Privileged Access Management Solutions for Enterprise
Compromising privileged accounts can lead to loss of valuable information. Therefore,  Privileged Access Management is becoming a top priority for enterprises.  Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific...

Common Sense in the World of Cloud Governance and Security

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: CHIEMSEE

Common Sense in the World of Cloud Governance and Security
Planning for security and governance is essential for building robust cloud environments! Join Microsoft Azure MVP Thomas Janetscheck for this session to learn about how to secure Azure environments and how to circle around snares. We will first focus on cloud governance, what it is and why you need it and then dive deep into Azure Security Center, an AI and ML-based solution for securing IT infrastructures in the cloud and on premises. After this session you will have a good understanding...

Panel: How Cloud Access Control Enables Innovation & Security In the Digital Age
The transformation of the digital business world requires moving forward to new technologies and shifting the focus to agile and flexible environments. As the number of digital identities rises, the need to protect and manage how personal information is collected, used and distributed is higher than ever. Security technologies such as IoT, cloud access control, user behaviour analytics, multifactor authentication, and mobile threat defence are on the rise. Obtaining the cloud is not only...

The Development of a 5G IAM Architecture

Date: Thursday, May 16, 2019 Time: 11:00-12:00 Location: ALPSEE

The Development of a 5G IAM Architecture
With the emergence of a more digitized world combined with the prospect of a broadband communication of 20 Gbps, the development of an Identity and Access Layer in 5G started with the vision of user’s identities in the center of a new value proposition. Identity as an abstraction layer in 5G bridges across domains, cross access technologies and between the network and Internet services focused on enhanced user experience as well as higher personalization of services that can only be...

Identity Across Things (and Individuals)

The T in IoT Security Stands for Human

50 Billion Identities: The Future of Humans, Corporations and Smart Things

Date: Thursday, May 16, 2019 Time: 12:00-13:00 Location: ALPSEE

50 Billion Identities: The Future of Humans, Corporations and Smart Things
By 2021, it's estimated there will be more than 25 billion IoT devices with identity. There are over 180 million businesses globally – all of these are registered with governments and have identities in financial institutions. And there are 7.6 billion humans interacting with these corporations and IoT devices in complex ways.  This talk is based on research funded by the DHS Science and Technology to explore the impact of NPE (non-person entity) identity on areas of critical...

Panel: IAM of Things
The number of IoT devices is increasing rapidly. These interconnected machines must be accessible from different networks by other machines and/or by people. Furthermore, IoT devices can be vulnerable to attacks and be the desired target on a company or home network. Considering these challenges, it is essential that the companies are deploying scalable and purpose-designed IAM solutions for these machines and that the IoT devices are designed with IAM and security capacities in mind. ...

Microservices: Why Should We Even Care?

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: ALPSEE

Microservices: Why Should We Even Care?
Microservices, like APIs a few years prior, have experienced an amazing evolution: from a fairly technical concept for designing complex applications as a collection of loosely coupled and independently deployable components organized around business capabilities, microservices have grown to become one of the hottest buzzwords in the IT industry and beyond. But what are the reasons behind this surge in popularity? In the age of digital transformation, when technologies, regulations and...

Microservices or Macro-Mess in IAM
Microservices are the next big thing. They are created in agile software development to quickly launch applications and services. Each Microservice could be considered as a single app. Within this app, the IAM is usually implemented locally. However, in an enterprise environment this can lead to a complete mess. As a result, this talk shows how to design the Microservices’ IAM to be manageable also on the macro level. Key takeaways for delegates attending your session: -  ...

Revolutionizing How We Buy, Price, and Create Value for One Another

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: CHIEMSEE

Revolutionizing How We Buy, Price, and Create Value for One Another
We present you with a comprehensive look into the future of commerce, encompassing the $5 trillion e-commerce and brick and mortar sectors. Our world will be defined by a decentralized platform in which customers will wield and monetize their personal data and behaviors. We discuss the details of how self-sovereign identity will enable dialogue between retailers and their individual customers. This "conversation" is at the core of how we will create value for one another. It will allow...

You Can’t Do PII on a Blockchain, so What Then Is It Good for in Identity?
Many viewpoints of the applicability of blockchain for consumer identity have been expressed. In particular, some express doubt about the viability of being able to reconcile GDPR’s right-to-be-forgotten with the immutable nature of blockchain. This is in fact true. However, there are still ways that blockchain can increase transaction integrity while also providing privacy-by-design leadership. Come join this session to learn about how blockchain is being used in the Canadian model...

A Macroeconomic Perspective on Blockchain
The Macro-Economic perspective of how Blockchain has potentially influenced various industries in a specific European Country. I could present various analyses that we are currently conducting, which includes and empirical analysis, cluster analysis, and a scenario analysis. With these results, it will help us to gain insight on what types of influences that Blockchain has had on the industry and potential future insights.  We are working on this study with the European Blockchain...

Disrupting the Identity Infrastructure? The Power of Microservice Paradigms to Accelerate Complex IT Solutions

Date: Thursday, May 16, 2019 Time: 15:30-16:30 Location: ALPSEE

Disrupting the Identity Infrastructure? The Power of Microservice Paradigms to Accelerate Complex IT Solutions
In today’s connected world, businesses are competing on speed and agility to meet tremendous expectations of customers. In order to achieve this level of agility, the underlying architecture needs to be dramatically different from what we know in the past. Lean, lightweight, and rapid development and deployments have taken over the way we look at software development. Microservices are able to fulfil this promise but change also the way on how Identity and Access Management is...

Agile IAM: Microservices for Delivering a Lean, Faster and Successful IAM
IAM deployments are traditionally considered complex implementations that require significant time, effort and investment on an on-going basis to match the rapidly changing business processes and operating environment of a dynamic organization. Conventional IAM deployments are largely software implementations that over a period of time become rather complicated to the extent of being unmanageable due to the amount of customizations and the business need to honour the legacy systems and...

Securing Microservices: Not as Easy as You Might Have Expected

Date: Thursday, May 16, 2019 Time: 17:00-18:00 Location: ALPSEE

Securing Microservices: Not as Easy as You Might Have Expected
Microservice architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple languages, frameworks and IT environments. However, new architectures require new tools and technologies, and those bring in new security challenges – and new skills to learn to fight off cyber-attacks efficiently. Like with any other new technology which developers, operations and security teams are only beginning to...

Securing APIs and Microservices with OAuth and OpenID Connect
Microservices present a new way of scaling API deployments, where each component is an island, performing a small but well defined task. These systems are quicker to develop and allow for a more agile way of working. As in most designs, security is not part of the original blueprint, which can lead to expensive and hard to manage security solutions. In this talk, Travis Spencer will illustrate how OAuth and OpenID Connect can be leveraged to create a unified distributed framework for...

API Security in a Microservices World
A microservice architecture brings new challenges to API Security and careful design needs to be applied at operations and development level to ensure corporate data is properly protected from unwanted access. In this session we explain what API security encompasses,  why API security needs to be considered as early as possible in the lifecycle of the microservices, how known standards such as OAuth and OpenID Connect can be leveraged to authenticate and authorize access to...

EIC Boot Camp: Identity as a Microservice: The Power of Microservice Paradigms to Accelerate Complex IT Solutions

Date: Friday, May 17, 2019 Time: 09:00-12:30 Location: ALPSEE

Microservices are a software architectural style that is gaining worldwide momentum today. Loosely coupled, highly maintainable, and allowing to be tested and deployed independently, microservices blend well with current agile DevOps methodologies. Identity & Access Management solutions delivered as microservices bring new options for your deployment model which can reduce IAM complexity while increasing scalability. This boot camp will better equip IT professionals, CIOs, CISOs, and...

Azure Infrastructure Security - Ultimate Security in the Cloud Era

Date: Friday, May 17, 2019 Time: 09:00-12:30 Location: AMMERSEE II

In today's cloud era, admins struggle to keep their IT infrastructures safe. Cloud security is a joint responsibility and what we need is a new approach! In this session, you will learn how to Securely deploy and maintain Azure infrastructure solutions, why automation is essential, what network security and encryption options you have, and how access control can prevent you from having sleepless nights. We will successfully attack an Azure environment live on stage, dive deep into...

EIC Boot Camp: Identity as a Microservice: The Power of Microservice Paradigms to Accelerate Complex IT Solutions

Date: Friday, May 17, 2019 Time: 13:30-16:00 Location: ALPSEE

Microservices are a software architectural style that is gaining worldwide momentum today. Loosely coupled, highly maintainable, and allowing to be tested and deployed independently, microservices blend well with current agile DevOps methodologies. Identity & Access Management solutions delivered as microservices bring new options for your deployment model which can reduce IAM complexity while increasing scalability. This boot camp will better equip IT professionals, CIOs, CISOs, and...

EIC Boot Camp: Cloud first in the Real World: Facilitating a Hybrid and Integrative IT Landscape that is Secure and Compliant

Date: Friday, May 17, 2019 Time: 13:30-16:00 Location: AMMERSEE I

CIOs, CISOs, Cloud architects and IT pros alike face the same challenges when moving into the cloud: They need to fulfill their business requirement and secure their infrastructure with a sustainable approach for enterprise hybrid cloud security. They have to protect public and private cloud environments together with their on-premises services. We look at the following challenges: How to develop your own tailored "Cloud First" approach? How does a company change its IT strategy...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00