European Identity & Cloud Conference 2019 Agenda

Switch to Detailed View

Please note that presentations and other event materials are only available to registered participants.
You need to log in to be able to download them.

Monday, May 13, 2019
12:00-19:00 Check-in & Registration
Room: COUNTER IN FRONT OF ALPSEE
13:00-17:00 Fido Workshop
FIDO Authentication Workshop
Marc Findon, Senior Technical Account Manager, Nok Nok Labs
John Fontana, Identity and Standards Analyst, Yubico
Derek Hanson, Senior Director - Solutions Architecture and Standards, Yubico
Bjorn Hjelm, Distinguished Engineer, Verizon
Christina Hulka, Chief of Staff, FIDO
Dr. Michael B. Jones, Identity Standards Architect, Microsoft
Dr. Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs
Alain Martin, VP Strategic Partnerships, Thales
Room: ALPSEE
19:00-22:00 AI Innovation Night
Dr. Sven von Alemann, Co-founder & CEO, rfrnz GmbH
Dr. George Beridze, AI Practice Lead / Project Manager, KuppingerCole
Matthias Canisius, Regional Director CEE, Sentinel One
Mateusz Chrobok, CEO, Digital Fingerprints
Nelson Cicchitto, Chairman and CEO, Avatier
Dr. Hans-Peter Güllich, CEO & Founder, Dydon AG
Ken Herron, CMO, UIB
Mike Kiser, Global Security Advocate, Office of the CTO, SailPoint
Declan Trezise, Director of Applied Engineering, Basis Technology
Artis Zablockis, CEO, Alpha Visum
Room: ALPSEE
Tuesday, May 14, 2019
08:00-20:00 Check-in & Registration
Room: COUNTER EXPO AREA
09:00-13:00
Blockchain ID Workshop

 

Blockchain ID: Current Status & Future Developments

 

Pamela Dingle, Microsoft
Rouven Heck, ConsenSys
Martin Kuppinger, KuppingerCole
Dr. Sridhar Muppidi, IBM Security
Markus Sabadello, Danube Tech
Andrew Tobin, Evernym
Dr. Phil Windley, Brigham Young University

 

 

OpenID Foundation Workshop

 

Insight and Influence on Important Internet Identity Standards

 

John Bradley, OpenID Foundation, Kantara
Roland Hedberg, Independent Consultant
Joseph Heenan, emobix & fintech labs
Bjorn Hjelm, Verizon
Dr. Michael B. Jones, Microsoft
Dr. Torsten Lodderstedt, YES.com AG
Eve Maler, ForgeRock
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation

 

 

Kantara Workshop

 

Bringing you Transparent & Trustworthy Specifications, Assurance Programs and Research Funding

 

Allan Foster, ForgeRock
Ian Glazer, Salesforce
Andrew Hughes, Kantara Initiative
Mark Lizar, Open Consent Group
Eve Maler, ForgeRock
Björn Sjöholm, Seadot
Keith Uber, Ubisecure
Colin Wallis, Kantara Initiative

 

 

AI – Myths, Reality and Challenges

 

Artificial Intelligence & Machine Learning in Cybersecurity 101

 

Dr. Barbara Mandl, FOSTER FORE
Mike Small, KuppingerCole
Dr. Richard Tomsett, IBM
Alex Weinert, Microsoft

 

 

 
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
Room: BODENSEE II
13:00-14:00 Lunch & Networking
Room: EXPO AREA
14:00-14:10 Welcome to EIC 2019
Jennifer Haas, Project Manager, KuppingerCole
Room: AUDITORIUM
14:10-14:30 Opening Keynote
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
14:30-14:50 "Das Sterben der Pythia" – On Humans, Artificial Intelligence and Oracles
Dr. Emilio Mordini, Chair, Responsible Technology SAS
Room: AUDITORIUM
14:50-15:10 HUMAN. DIGITAL. CULTURE - Disruption or just Progress? Impacts of Artificial Intelligence on Business and Society
Jochen Werne, Director, Bankhaus August Lenz
Room: AUDITORIUM
15:10-15:30 Why Self-Sovereign is the First and Final Way to do ID
Doc Searls, Director, ProjectVRM at Harvard’s Berkman Klein Center, Editor-in-Chief, Linux Journal
Room: AUDITORIUM
15:30-15:50 Facing the Post-GDPR Reality
Thom Langford, Founder, (TL)2 Security
Room: AUDITORIUM
15:50-16:10 Emerging Venture Capital Trends in Enterprise Cloud and Cybersecurity
Kelley Mak, Principal, Work-Bench
Room: AUDITORIUM
16:10-17:00 Coffee & Networking
Room: EXPO AREA
17:00-17:20 Open Source IAM: Strengths and Opportunities
Paul Fremantle, CTO and Co-founder, WSO2
Room: AUDITORIUM
17:20-17:40 The Global Race for AI – Is it Time to Regulate Now?
Dr. Karsten Kinast, Fellow Analyst, KuppingerCole
Room: AUDITORIUM
17:40-18:00 Turning the Web Right Side Up – Giving People What Is Theirs
Kim Cameron, Chief Architect of Identity, Microsoft
Room: AUDITORIUM
18:00-18:20 Learning to Fly – Taking Infrastructure Software to the Next Level
Jim Taylor, Head of Product Management Security and Integration, CA Technologies a Broadcom Company
Room: AUDITORIUM
18:20-18:40 Applying Microservice Design Principles to Cloud Security Management
Patrick Parker, Founder and CEO, EmpowerID
Room: AUDITORIUM
18:40-19:00 OpenID in the Digital ID Landscape: a Perspective from the Past to the Future
Nat Sakimura, Research Fellow, Nomura Research Institute
Room: AUDITORIUM
19:00-19:20 Bot, Human, Friend or Foe?
Simon Moffat, Product Management Director, ForgeRock
Room: AUDITORIUM
19:20-19:40 The Most Forgotten Thing in Identity Management
Ian Glazer, VP, Identity Product Management, Salesforce
Room: AUDITORIUM
19:40-20:00 Panel: Tower Defense, Identity Edition: Zero Trust, Machine Learning, MFA & Passwordless - How to Prevent your Customers & Employees from Falling Victim to Hackers
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Anmol Singh, Lead Analyst, KuppingerCole
John Tolbert, Lead Analyst, KuppingerCole
Alex Weinert, Program Manager, Microsoft
Room: AUDITORIUM
20:00-23:59 Bavarian Happy Hour
Room: HIRSCHALM
20:00-21:30 Women in Identity Happy Hour
Room: EIC CAFÉ
Wednesday, May 15, 2019
07:00-07:45 EIC Run 2019
Room: In front of the Infinity Hotel
08:00-19:20 Check-in & Registration
Room: COUNTER EXPO AREA
08:30-08:50 Data Driven Identity Programs – Past, Present, and Future: End-User Experience is Key
Gerald Beuchelt, CISO, LogMeIn
Room: AUDITORIUM
08:50-09:10 Customer Personalisation: Bridging CIAM and SSID
Katryna Dow, Founder & CEO, Meeco
Room: AUDITORIUM
09:10-09:30 Identity-Driven Security: The Key to Digital Privacy
Joy Chik, Corporate Vice President – Identity Division, Microsoft
Room: AUDITORIUM
09:30-09:50 AI and Identity Management: Considerations for Deployment
Ivana Bartoletti, Head of Privacy and Data Protection, Gemserv
Room: AUDITORIUM
09:50-10:10 Is Data Really The New Oil?
Christian Goy, Managing Director, Behavioral Science Lab
Room: AUDITORIUM
10:20-11:00 Coffee & Networking
Room: EXPO AREA
Privacy by Design
Moderator:
Katryna Dow, Meeco
Frank Naumann, KuppingerCole
Artificial Intelligence & Machine Learning in Cybersecurity
Moderator:
Dr. Barbara Mandl, FOSTER FORE
Mike Small, KuppingerCole
Identity for the Digital Enterprise I
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Secure Identity I
Moderator:
Dr. George Beridze, KuppingerCole
John Tolbert, KuppingerCole
Expert Stage I
Moderator:
Alexei Balaganski, KuppingerCole
Anmol Singh, KuppingerCole
11:00-12:00
Data Management, Privacy & Security Done Right

 

Use of Production Data in Test Environments

 

Claus Nørklit Roed, PwC Denmark

 

 

Privacy By Design as a System Design Strategy

 

Sagara Gunathunga, WSO2

 

 


Security and Privacy in the “When-Not-If” Era

 

Jean-Christophe Gaillard, Corix Partners

 

 

AI & ML for Cybersecurity

 

AI for the Future of your Business

 

Dr. Barbara Mandl, FOSTER FORE
Mike Small, KuppingerCole

 

 

Use Case: AI Powered Conversational Experience at the Singapore Art Museum

 

Lynn Sim, Singapore Art Museum

 

 


Panel: What are the Secrets to Successful AI?

 

Ken Herron, UIB
Mark Stephen Meadows, Botanic Technologies, Inc.
Lynn Sim, Singapore Art Museum

 

The Future of Identity for the Digital Enterprise

 

Welcome to the New World of Identity for the Digital Business

 

Martin Kuppinger, KuppingerCole

 

 

Panel: How Traditional IAM Will Change Within the next 5 Years

 

Kim Cameron, Microsoft
Thom Langford, (TL)2 Security
Patrick Parker, EmpowerID
Doc Searls, Editor-in-Chief, Linux Journal
Jochen Werne, Bankhaus August Lenz

 

Identity in the Age of Zero Trust

 

Identity Is at the Center of Zero Trust, Not the Network

 

John Tolbert, KuppingerCole

 

 

Panel: Placing Identity at the Center of Security Designs & Models

 

Richard Bird, Ping Identity
David Lee, Sailpoint
John Tolbert, KuppingerCole

 

Privileged Access Management

 

PAM Uncovered: Your Privileged Access Management Journey Starts Here

 

Joseph Carson, Thycotic

 

 

What Will be the PAM of Tomorrow?

 

Didier Cohen, WALLIX

 

 


Considerations for Securing Privileged Access to Cloud Infrastructure and SaaS at Enterprise Scale

 

Vibhuti Sinha, Saviynt

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
12:00-13:00
Privacy, Identity & Security

 

Privacy — Do We Actually Care?

 

Christian Goy, Behavioral Science Lab

 

 

LIVE Demo of an Interoperable Personal Data Receipt Ecosystem – the Kantara Initiative Privacy Control Panel System

 

Andrew Hughes, Kantara Initiative
Mark Lizar, Open Consent Group
Katherine Noall, Sphere Identity
Keith Uber, Ubisecure

 

 

AI & ML Enhanced Attacks

 

Devil's in the Details: AI, Bad Guys, & Messy Data

 

Chris Mack, Basis Technology

 

 

Outsmarting AI

 

Frederic Stallaert, ML6

 

 


Trusting Your AI

 

Dr. Richard Tomsett, IBM

 

 

Identity - Best Practice I

 

Making IAM Matter - The Hard Conversation

 

Henk Marsman, Rabobank

 

 

BYOIDaaS: Automating IAM Infrastructure & Operations

 

Jon Lehtinen, Thomson Reuters

 

 


Panel: The Transformational Next Wave of IGA in the Enterprise

 

Mike Kiser, SailPoint
Jon Lehtinen, Thomson Reuters
Henk Marsman, Rabobank
Mark Wahl, Microsoft Corporation

 

Strong & Adaptive Authentication

 

Harness Your Identity Analytics to Deliver Contextual Authentication

 

Steve Hutchinson, GE Digital

 

Panel: Transforming Secure Access to be Intelligent

 

Niklas Brask, Pointsharp AB
Steve Hutchinson, GE Digital
Dr. Torsten Lodderstedt, YES.com AG
Simon Moffat, ForgeRock
Ingo Schubert, RSA

 

Current & Future Status of IAM

 

Mission, Vision and Status of WiD

 

Pamela Dingle, Microsoft

 

Skills of an Identity Professional

 

Andrew Hindle, IDPro

 

 


Leveraging FIDO Authentication to Comply with PSD2 SCA Requirements

 

Alain Martin, Thales

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
13:00-14:30 Lunch & Networking
Room: EXPO AREA
13:00-14:30 Women in Identity Lunch
Emma Lindley, Head of Identity and Risk Solutions, Visa
Dr. Barbara Mandl, Advisor, FOSTER FORE
Dr. Angelika Steinacker, CTO for Identity & Access Management, IBM Security Europe
Room: WINTERGARDEN
Privacy Governance, Data Protection & Compliance
Moderator:
Fabian Bauer, KuppingerCole
Dr. Karsten Kinast, KuppingerCole
Artificial Intelligence & Machine Learning
Moderator:
Dr. Barbara Mandl, FOSTER FORE
Mike Small, KuppingerCole
Identity for the Digital Enterprise II
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Secure Identity II
Moderator:
Dr. George Beridze, KuppingerCole
Christopher Schütze, KuppingerCole
Expert Stage II
Moderator:
Alexei Balaganski, KuppingerCole
Anmol Singh, KuppingerCole
14:30-15:30
The Post-GDPR Reality

 

GDPR - Digital Risk and the Catalyst for Global Opportunity

 

Dana Fox, Athena Software

 

 

GDPR Compliance and IAM Services in a European Municipality

 

Panagiotis Kranidiotis, ITDT Services Ltd

 

 


Panel: Anonymisation and Pseudonymisation - What Is It and Why Does It Matter?

 

Felix Bauer, Aircloak
Dana Fox, Athena Software
Thom Langford, (TL)2 Security
Michal Wendrowski, Astec

 

AI & Conversational Interfaces, Chatbots

 

The Identity Problem of Chatbots

 

Ronald Ashri, GreenShoot Labs

 

 

Intelligent Chatbots - Different Approaches and their Use Cases

 

Dr. Karol Przystalski, Codete

 

 


Panel: Chatbot Identity - Challenges and Possible Solutions

 

Katryna Dow, Meeco
Christian Goy, Behavioral Science Lab
Mark Stephen Meadows, Botanic Technologies, Inc.
Dr. Karol Przystalski, Codete

 

Authorization as a Business Need

 

Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases

 

Gerry Gebel, Axiomatics
Gal Helemski, PlainID
Eve Maler, ForgeRock
Patrick Parker, EmpowerID

 

Implementation of Role-Based Access Control in a Mid-sized Financial Institution

 

Dimitri Chichlo, UBP

 

 


Why Prevention No Longer Works? A New Approach Using AI for Identity Management

 

Raghu Dev, BNY Mellon

 

Secure Identity Best Practice

 

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition

 

Dr. Ahmad Atamli, Mellanox Technologies

 

 

Navigating NIST Sp-800-63-3 Thanks to Practical xAL Cheat Sheets

 

Jean-François Lombardo, EXFO

 

 


Fight Cyber Risks with Risk Aware DevOps Engineers!

 

Jan-Joost Bouwman, ING
Leon Janson, ING

 

 

Access Management & Security

 

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

 

Morey J. Haber, BeyondTrust

 

 

Privileged Access Management: Operational Burden or Enabler for Protection Against Targeted Attacks?

 

Dr. Svilen Ivanov, T-Systems International GmbH, Telekom Security Division

 

 


Get the Most out of PAM: How to Make Privileged Access Management Meaningful and Effective

 

Rajesh Ganesan, ManageEngine, a division of Zoho Corp

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
15:30-16:30
Next Steps in Data Protection & Compliance

 

How to Turn Privacy and Data Protection Regulations into a Competitive and Trust-Building Advantage

 

James Aschberger, One.Thing.Less AG

 

 

The Ripple Effect of GDPR in North America: What’s Ahead of us with CCPA?

 

Jean-François Lombardo, EXFO

 

 


Spartacus as a Service (SaaS): Privacy Through Obfuscation and the Right to Be Forgotten

 

Mike Kiser, SailPoint

 

 

AI & Regulation

 

Panel: Regulatory Recommendations for AI

 

Ivana Bartoletti, Gemserv
Kim Cameron, Microsoft
Dr. Karsten Kinast, KuppingerCole
Dr. Barbara Mandl, FOSTER FORE
Joerg Resch, KuppingerCole

 

Identity - Best Practice II

 

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry

 

David Pollington, GSMA

 

 

Bring-Your-Own-Identity to the Digital Enterprise

 

Eleni Richter, EnBW

 

 


Clustering Methods Used for IAM Role Mining

 

Thomas Aagren Jensen, PwC

 

 

Mitigating Cyber Risks

 

The Anatomy of an IAM Cyber Kill Chain

 

David Lee, Sailpoint

 

 

The POWER HACKER – Don’t Let the Lights Go Out – A Look Inside the MIND of a Hacker

 

Joseph Carson, Thycotic

 

 


At the Intersection of API Security, Cybersecurity and IAM: the Next Wave of Intelligent Solutions

 

Loren Russon, Ping Identity

 

Identity Management

 

Schroedinger View on Identity: It is Consolidated and is not Consolidated

 

Dirk Wahlefeld, ITConcepts

 

 

Digital Hybriditity, or: Greetings from the Outer Rim

 

Thorsten Niebuhr, WedaCon

 

 


Why Identity Management is Broken and What Can Be Done to Fix It

 

Nelson Cicchitto, Avatier

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
16:30-17:30 Coffee & Networking
Room: EXPO AREA
17:30-18:30
Consent Management & Customer Data Protection

 

Consumer Consent - The Make or Break of your PSD2 Compliance Implementation

 

Lalaji Sureshika, WSO2

 

 

Panel: Consent Lifecycle Management as Necessity for Your GDPR & PSD2 Compliance

 

Jean-François Lombardo, EXFO
Philipp Schneidenbach, Ventum Consulting
Lalaji Sureshika, WSO2
Colin Wallis, Kantara Initiative
Dr. Sarah Wolff, Transmit Security

 


Can MyData Solve Post-GDPR Consent Management?

 

Mika Huhtamäki, Suomen Tilaajavatuu Oy

 

 

AI Ethics

 

The 6 Major Ethical Issues of AI

 

Mike Small, KuppingerCole

 

 

AI's Ethical Problems and Blockchain's Solutions

 

Mark Stephen Meadows, Botanic Technologies, Inc.

 

 


Panel: Integrating Ethics into AI Research, Development, and Adoption

 

Mark Stephen Meadows, Botanic Technologies, Inc.
Dr. Emilio Mordini, Responsible Technology SAS
Doc Searls, Editor-in-Chief, Linux Journal
Jochen Werne, Bankhaus August Lenz

 

Privileged Access Management

 

Stealing the Crown Jewels

 

Jur Huisman, Ahold Delhaize
Martin Sandren, Nixu

 

 

Panel: Leveraging Privileged Access Management Solutions for Enterprise

 

Anil Bhandari, ARCON
Didier Cohen, WALLIX
Morey J. Haber, BeyondTrust
David Lieberman, Semperis
Vibhuti Sinha, Saviynt

 

Cloud, Security & Governance

 

Common Sense in the World of Cloud Governance and Security

 

Tom Janetscheck, Devoteam | Alegri

 

 

Panel: How Cloud Access Control Enables Innovation & Security In the Digital Age

 

Nelson Cicchitto, Avatier
Paul Heaney, ProofID Ltd
Tom Janetscheck, Devoteam | Alegri
Dr. Ina Nikolova, PATECCO

 

Digital Identity, IoT & Privacy

 

Increase the Odds - How to Make your IoT Project a Business Success

 

Gerhard Zehethofer, ForgeRock

 

 

Data-Driven Compliance with Privacy Laws

 

Jens Kettler, BigID

 


IDAM Controls to Detect and Prevent insider Fraudulent Access

 

Bala Bhaskar Gurram, Wipro Limited

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
18:40-19:00 Identity + Blockchain: Next Generation IAM is Closer Than You Think
Dr. Sridhar Muppidi, IBM Fellow & CTO, IBM Security
Room: AUDITORIUM
19:00-19:20 That Robot Overlord Is in Your Kitchen. Her Name's Alexa
Mark Stephen Meadows, Founder & CEO, Botanic Technologies, Inc.
Room: AUDITORIUM
19:20-20:10 European Identity & Cloud Awards Ceremony
Alexei Balaganski, Lead Analyst, KuppingerCole
Dr. George Beridze, AI Practice Lead / Project Manager, KuppingerCole
Roland Bühler, Senior Analyst, KuppingerCole
Martin Kuppinger, Principal Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Anmol Singh, Lead Analyst, KuppingerCole
Mike Small, Information Security Management Advisor, Fellow Analyst, KuppingerCole
John Tolbert, Lead Analyst, KuppingerCole
Room: AUDITORIUM
20:10-22:00 Award Reception & Dinner
Room: EXPO AREA
Thursday, May 16, 2019
07:00-18:00 Check-in & Registration
Room: COUNTER EXPO AREA
07:20-08:20 Breakfast Session
Creative Disruption: Using AI to Re-Invent Your SOC and Getting Ready for the Future of Cybersecurity
Martin Kuppinger, Principal Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Room: EIC CAFÉ
08:20-08:40 The Future of Digital Identity is Decentral, But Not Blockchain
Maximilian Möhring, Founder / CEO, Keyp
Room: AUDITORIUM
08:40-09:00 Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms
Mike Kiser, Global Security Advocate, Office of the CTO, SailPoint
David Lee, Senior Identity Strategist, Sailpoint
Room: AUDITORIUM
09:00-09:20 SAP Customer Experience: Delivering Trusted Relationships for Your B2B Customers and Partners
Andrea Rus, Head of Go-to-Market (GTM), SAP Customer Data Cloud from Gigya
Room: AUDITORIUM
09:20-09:40 Blockchain & IAM: A Perfect Fit or a Squared Peg and a Round Hole?
Henk Marsman, Lead Product Manager IAM, Rabobank
Room: AUDITORIUM
09:40-10:00 Rightsizing IGA – One Size Does Not Fit All
Todd Peterson, Security Evangelist / Product Marketing Manager, One Identity
Room: AUDITORIUM
10:00-10:20 Will Identity and Access Ever be Liked? Or: The Journey from I&A from being a Burden to Business Enablement
Berthold Kerl, Global Head of Identity and Access, Deutsche Bank AG
Room: AUDITORIUM
10:20-11:00 Coffee & Networking
Room: EXPO AREA
Identity Standards & Architectures I
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Consumer Identity Management
Moderator:
Roland Bühler, KuppingerCole
John Tolbert, KuppingerCole
Things, Robotics & Industrial Internet
Moderator:
Richard Hill, KuppingerCole
Mike Small, KuppingerCole
Blockchain (Identity) I
Moderator:
Dr. George Beridze, KuppingerCole
Andrew Tobin, Evernym
Expert Stage III
Moderator:
Alexei Balaganski, KuppingerCole
Anmol Singh, KuppingerCole
11:00-12:00
Authentication Standards & User-Managed Access

 

Establishing an European Digital Identity Network Based on Trust and Standards

 

Dr. Dirk Woywod, Verimi

 

 

As the World Turns: Real-World Identity Relationships Driving Data Decisioning

 

Eve Maler, ForgeRock

 

 

Delivering Security & Value to the Connected Customer

 

Mobile Onboarding Using NFC and ePassports: The Final Step for a Digital Consumer Identity

 

Dr. Maarten Wegdam, InnoValor - ReadID

 

 

Panel: Consumer Identity - Delivering Value

 

Andre Boysen, DIACC / SecureKey Technologies
Steve Giovannetti, Hub City Media
Andrew Nash, CapitalOne
Katherine Noall, Sphere Identity
Lance Peterman, Merck Sharp & Dohme

 


So You Think You Can Two Factor

 

Nishant Kaushik, Uniken

 

Identity & Security of Things

 

The Development of a 5G IAM Architecture

 

Bjorn Hjelm, Verizon

 

 

Identity Across Things (and Individuals)

 

Gillan Ward, ID Crowd

 


The T in IoT Security Stands for Human

 

Tom Hofmann, EY

 

 

Blockchain for Digital Identity

 

Self-Sovereign Identity - We've Had It for Thousands of Years. so What's New?

 

Andrew Tobin, Evernym

 

An Identity Metasystem

 

Dr. Phil Windley, Brigham Young University

 


Panel: Current Developments in Blockchain Ecosystem for Digital ID

 

Rouven Heck, ConsenSys
Maximilian Möhring, Keyp
Martin Riedel, Civic
Ewan Willars, Innovate Identity
Dr. Phil Windley, Brigham Young University

 

Identity Standards

 

How to Put Identity Analytics into Action

 

Ingo Schubert, RSA

 

Open Source Identity: Building Your Own Enterprise Identity Platform

 

Scott Brady, Rock Solid Knowledge

 

 


Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program

 

Holger Weihe, One Identity

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
12:00-13:00
OAuth & OpenID Connect

 

The OpenID Connect Self-Certification Program

 

Hans Zandbelt, OpenID Foundation

 

OAuth 2.0 Security Reinforced

 

Dr. Torsten Lodderstedt, YES.com AG

 

 


Panel: Next Generation Authentication

 

Allan Foster, ForgeRock
Dr. Rolf Lindemann, Nok Nok Labs
Guido Mangiagalli, Visa
Michael Schwartz, Gluu

 

CIAM Best Practice

 

The IAM Story of Merck, Sharp & Dohme

 

Lance Peterman, Merck Sharp & Dohme

 

 

Develop a Strategic Advantage Through Identity Proofing

 

Fady Semaan, Capital One

 

 


Panel: Consumer, Business and the Real-World Challenges in CIAM

 

Katryna Dow, Meeco
Ville Niemi, Nixu Corporation
Fady Semaan, Capital One
Stuart Wilson, Pirean

 

Future Identity of Things

 

50 Billion Identities: The Future of Humans, Corporations and Smart Things

 

Heather Vescent, The Purple Tornado

 

 

Panel: IAM of Things

 

Bertrand Carlier, Wavestone
Tom Hofmann, EY
Ralf Knöringer, Atos
Robert Lapes, Capgemini
Tomi Ruotimo, Houston Inc.
Heather Vescent, The Purple Tornado

 

Decentralized Identity

 

Why Governments are Still Important Even in a Self-Sovereign Context

 

Adam Cooper, ID Crowd

 

 

Do People Really Want to Be in Charge of Their Identity?

 

John Erik Setsaas, Signicat AS

 

 


Self-Sovereign Identity: A New Dawn for Shared Ledger Technologies?

 

Ewan Willars, Innovate Identity

 

 

Cloud Management

 

The Role Of Identity in Multi-Cloud Management

 

Christina Kraus, meshcloud

 

To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes

 

David Brossard, Axiomatics AB

 

 


How A Major Retailer Successfully Performed a Divestiture

 

Michael Brengs, Optimal IdM

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
13:00-14:30 Lunch & Networking
Room: EXPO AREA
Identity Standards & Architectures II
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Customer Experience & Marketing Automation
Moderator:
Roland Bühler, KuppingerCole
John Tolbert, KuppingerCole
Microservices
Moderator:
Alexei Balaganski, KuppingerCole
Anmol Singh, KuppingerCole
Blockchain (Identity) II
Moderator:
Dr. George Beridze, KuppingerCole
Andrew Tobin, Evernym
Expert Stage Part IV
Moderator:
Richard Hill, KuppingerCole
Mike Small, KuppingerCole
14:30-15:30
Strategizing IAM

 

A Digital Society Needs a Digital ID

 

Sylvie Vandevelde, Belgian Mobile ID

 

How to Write a Good IAM Request for Proposal (RFP)

 

Claus Nørklit Roed, PwC Denmark

 

 


Using eIDAS to Drive Mass Adoption of Identity Solutions

 

Wim Coulier, eIDAS consultant

 

 

Consumer Identity & User Experience

 

Balancing User Experience, Security and Privacy in SPA Applications

 

Ravi Muthukrishnan, Visa

 

 

How to Deal with Mobile Apps in Single Sign-On Environments

 

Andre Priebe, iC Consult

 

 

Microservices and IAM

 

Microservices: Why Should We Even Care?

 

Alexei Balaganski, KuppingerCole
Anmol Singh, KuppingerCole

 

 

Microservices or Macro-Mess in IAM

 

Dr. Silvia Knittl, PwC

 

 

Beyond the Hype of Blockchain Economics

 

Revolutionizing How We Buy, Price, and Create Value for One Another

 

Samantha Zirkin, Point 93

 

 

You Can’t Do PII on a Blockchain, so What Then Is It Good for in Identity?

 

Andre Boysen, DIACC / SecureKey Technologies

 

 


A Macroeconomic Perspective on Blockchain

 

Rachelle Sellung, Fraunhofer IAO / University of Stuttgart IAT

 

 

Identity Governance & Administration

 

Best Practices as the Foundation of Agility and Innovation: IdentityPROCESS+ as an IGA Process Example

 

Dr. Alfons Jakoby, Omada
Martin Menzer, Omada

 

 

Access Certification Campaigns that Work

 

Sebastien Faivre, Brainwave GRC

 


Security and Efficiency Can and Does Co-Exist

 

Osman Erkan, Krontech Inc.

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
Room: WINTERGARTEN
15:30-16:30
Digital Identities & Government Standards

 

Digital Identity: A Prerequisite for Financial Inclusion and Good Governance? Lesotho Experiences Linking Foundational ID with Functional ID

 

Tumelo Raboletsi, Ministry of Home Affairs of Lesotho

 

Making Standards Work in the Real World – Examples from Canada and Scotland

 

Steve Pannifer, Consult Hyperion

 

 


Canada's True North Strategy for Establishing Interoperability of Third Party Networks For Identity

 

Andre Boysen, DIACC / SecureKey Technologies

 

Customer Experience - Best Practices

 

BYOID Case Study at Universities - How to Utilize Social Media Identity

 

Naohiro Fujie, Itochu Techno Solutions

 

 

Adaptive Access will Enforce both Stronger Security and Better User Experience

 

André Koot, Nixu Cybersecurity
Michiel Stoop, Philips

 

 


Intelligent Search Engine for Medical Technology Products for a Web Marketplace

 

Dr. Hans-Peter Güllich, Dydon AG

 

Microservice Architectures for IAM

 

Disrupting the Identity Infrastructure? The Power of Microservice Paradigms to Accelerate Complex IT Solutions

 

Willi Kisser, iC Consult
Dr. Heiko Klarl, iC Consult Group

 

 

Agile IAM: Microservices for Delivering a Lean, Faster and Successful IAM

 

Anmol Singh, KuppingerCole

 

 

Best Practice

 

Creating Rich, Valuable Credentials for People

 

Laura Coffey, Onfido

 

Third Party Risk Management with Decentralized Identity & Verifiable Credentials

 

Marco Cuomo, Novartis
Daniel Fritz, Novartis

 

 

The Future of Digital Identity & Trust

 

Trust is The New Frontier

 

Sven Kniest, Okta
Joshua Kroeze, Okta

 

Restoring Trust in a Digital World

 

Dan Johnson, Mastercard

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
16:30-17:00 Coffee & Networking
Room: EXPO AREA
17:00-18:00
Exploring the Digital Identity Misconceptions

 

Developing National Digital Identity Initiatives & Ecosystem in the UK - Successes, Challenges & Learnings

 

Alastair Treharne, British Government Digital Service

 

 

Panel: Myth Busting with ID Crowd and Friends

 

David Black, ID Crowd
Adam Cooper, ID Crowd
Don Thibeau, OpenID Foundation
Alastair Treharne, British Government Digital Service
Colin Wallis, Kantara Initiative
Gillan Ward, ID Crowd

 

CIAM as Key Factor in the Digital Transformation

 

Secure Customer Access: The role of ML and API Security

 

Joe Zanini, Ping Identity

 

 

Gamification: The Secret Ingredient of Successful CIAM Initiatives

 

Hugo Löwinger, PwC Europe

 


Ensuring your (C)IAM Solution is fit for Purpose

 

Paul Heaney, ProofID Ltd

 

 

Security for Microservices

 

Securing Microservices: Not as Easy as You Might Have Expected

 

Alexei Balaganski, KuppingerCole

 

 

Securing APIs and Microservices with OAuth and OpenID Connect

 

Travis Spencer, Curity

 

 


API Security in a Microservices World

 

Philippe Leothaud, 42Crunch

 

SSI & DIDs

 

Managing Self-Sovereign Identities (a Relying Party Perspective)

 

George Fletcher, Verizon Media Group

 

 

DID Resolution & DID Authentication

 

Markus Sabadello, Danube Tech

 

 

 

 

 
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
Room: CHIEMSEE
18:00-18:30 Closing Keynote & Announcement of EIC 2019s Gamification Winners
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
Friday, May 17, 2019
08:30-13:30 Check-in & Registration
Room: COUNTER HOTEL
EIC Friday Workshop 1
EIC Friday Workshop 2
EIC Friday Workshop 3 - Windows Azure Security
09:00-12:30
Microservice & Identity Boot Camp I

 

EIC Boot Camp: Identity as a Microservice: The Power of Microservice Paradigms to Accelerate Complex IT Solutions

 

Alexei Balaganski, KuppingerCole
Richard Hill, KuppingerCole
Tim Hobbs, iC Consult
Anmol Singh, KuppingerCole

 

 

Hybrid and Secure Cloud Boot Camp I

 

EIC Boot Camp: Cloud first in the Real World: Facilitating a Hybrid and Integrative IT Landscape that is Secure and Compliant

 

Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Christopher Schütze, KuppingerCole
John Tolbert, KuppingerCole

 

 

Windows Azure Security Workshop I

 

Azure Infrastructure Security - Ultimate Security in the Cloud Era

 

Tom Janetscheck, Devoteam | Alegri
Rajat Luthra, Microsoft
Rajeev Nagar, Microsoft

 

 
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
12:30-13:30 Lunch Break
Room: RESTAURANT
13:30-16:00
Microservice & Identity Boot Camp II

 

EIC Boot Camp: Identity as a Microservice: The Power of Microservice Paradigms to Accelerate Complex IT Solutions

 

Alexei Balaganski, KuppingerCole
Richard Hill, KuppingerCole
Tim Hobbs, iC Consult
Anmol Singh, KuppingerCole

 

Hybrid and Secure Cloud Boot Camp II

 

EIC Boot Camp: Cloud first in the Real World: Facilitating a Hybrid and Integrative IT Landscape that is Secure and Compliant

 

Matthias Reinwarth, KuppingerCole
Christopher Schütze, KuppingerCole
John Tolbert, KuppingerCole

 

Windows Azure Security Workshop II

 

Security Tour of Azure Active Directory Based on OAuth Grant Types

 

Hristomir Hristov, Cobuilder International

 

 

 
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00