European Identity & Cloud Conference 2020 Key Topics
Digital identities are core element of any digital transformation. Letting the customer into your enterprise to manage processes and information related to him means that you need to have a secure and adaptive system in place to manage identities and their access rights. Implementing such capabilities on a per service base is expensive, slow and risky. Setting up an Identity Fabric delivering identity services to the new digital business, will enable you to take the lead and strengthen your innovative power. EIC 2020 will help you define a step-by-step approach to migrate from your legacy IAM to a future-proof Identity Fabric.
New digital business services change the way IAM needs to be done. To be successful, strong digital identity backend that delivers all identity services required by the new digital services that are created. KC Principal Analyst Martin Kuppinger calls such backend the “Identity Fabrics”, which are more than identity API platforms, both regarding capabilities and interfaces. This shift to API-based access in consequence of the digital transformation requirements changes IAM and puts the API capabilities at the center.
There is no doubt that artificial intelligence (AI) can enhance identity and access management (IAM) and help protect IT networks from future security breaches. While IAM plays a huge role in mitigating data breaches and additional cyber risks, AI offers more efficient and accurate processes by automating and accelerating tasks. Exploring innovative solutions and ways of applying new technologies to develop novel forms of digital ID is the key to successful transformation and leadership.
Utilizing AI to defend yourself from attackers and solidify your surroundings becomes increasingly crucial. It is important to better understand where AI comes into play in the industry, what tangible results does it have and how to leverage its extensive potential. Dynamism in the infrastructure and volatile growth of IoT point out on the prominence of implementing better security solutions and approaches. From biometrics to context-based identity and artificial intelligence, IAM will continue to maintain its importance and grow in scope and scale.
Solid knowledge, awareness and strategic preparation are the basic steps toward the adoption of machine learning and AI features in your own projects and applications. Extensive and rigorous content enables you to boost your understanding and be ready to drive your company’s digital transformation. EIC will offer high impact boot camps leaving you fully equipped with a broad range of useful tools to incorporate into your own business strategy. Helping you navigate through the AI landscape to learn how to spot business opportunities and what exactly is needed for strategic adoption and implementation of artificial intelligence.
Consumer identity and access management (CIAM) has emerged in the last few years to meet evolving business requirements. Enterprises want to collect, store, and analyze data on consumers in order to create additional sales opportunities and increase brand loyalty. CIAM goes beyond traditional IAM in supporting some baseline features for analyzing customer behavior, as well as collecting consent for user data usage, and integration into CRM, connected devices, and marketing automation systems. It focuses on the connectivity with the customer when accessing all customer-facing systems, from registration and throughout the relationship. Understanding the wishes and requirements of customers and mapping them successfully in CIAM processes is the key to successful online business.
The number of non-human identities is increasing dramatically. These can be IoT devices, bots, service accounts, all interconnected within a network and using keys and certificates. The authentication procedure of machine identities is highly automated and very often the level of security is lower than for human authentication. This poses a security risk to an enterprise network and can lead to breaches and hacks, if not treated with adequate care. Therefore, it is necessary for the good enterprise IAM hygiene to cover identities of device accounts and not only those belonging to humans. Thorough understanding of the risks associated with non-human identities is essential for enabling fully secure access.
Managing digital identities and being in control of your own data, share it only when necessary and as much as necessary seems to be impossible through traditional centralized identity management models. Blockchain technology is promising to solve this challenge by providing a decentralized approach which offers more control and security to the challenge of digital identities. Blockchain makes self-sovereign identities (SSIs) possible, and concepts, as well as number of commercial products, are being offered on the market already. It remains to be seen how scalability, governance questions, and future privacy regulations affect wider adoption of blockchain technology.
Data is the core asset of the digital enterprise and is essential for its’ growth. But the digitalization brings with itself new challenges, like novel cyber threats. The number and variety of cyber-attacks is increasing rapidly. Thousands of ransomware incidents occur daily costing companies and government entities billions of dollars. It is essential for the digital enterprise and its leadership to define an effective cybersecurity strategy and know the limits of existing cybersecurity defenses. Only then the companies can enable frictionless customer experience, develop new products and avoid unnecessary risks.
Enterprises are utilizing cloud capabilities in order to reduce their costs, bring speed, scalability and accuracy to their business solutions. For companies moving to a cloud strategy, having a roadmap is essential and the move must be aligned with the overall business strategy. Despite the above-mentioned potential benefits, user experience, specific cost, governance and security must be considered. Asking the right questions and having a clear direction will ensure that your business gains maximum benefit from the move.
Most enterprises are utilizing both public and on-premise cloud infrastructures. They get the benefit of both worlds which allows companies to scale and consolidate their business. But challenges remain such as migration, integration, security and effective management. Furthermore, edge computing can allow for deployment of complex techniques such as machine learning and combine novel data processing capabilities with performing rapid data analysis on the cloud. Moving and maintaining this complex architecture requires thorough checks of security, regulatory and internal requirements. Having a clear understanding of those is central to success of today’s digital enterprise.
Deploying robotic process automation (RPA) instead of humans to perform automated tasks is hugely beneficial and cost effective, however, associated with severe security challenges. While the significance of RPA on identity governance will increase in the future, we have to ask ourselves: How can we mitigate access related risks? Can we rely on standard identity and access management (IAM) capabilities of identity governance and administration (IGA) and privileged access management (PAM)? Balancing new opportunities such as RPA with security risks is the main challenge for every company willing to achieve a new level of operational efficiency.