Connected World

  •  TYPE: Track   DATES: May 06 - May 07, 2015
Conference Tracks

In a connected world, with billions of devices going online and creating sensitive information, there is only one way to solve the privacy issue: empowering the user. EIC is the only information security related event where User Managed Identity & Access and Life Management concepts are proposed as a sine qua non element of any digital business. In this track, you will meet with the user empowerment vanguard and find out, how this concept will change the way you think about digital business.

Moderators:

Tracks:

User Managed Identity & Access

Sessions:

Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols

Date: Wednesday, May 06, 2015 Time: 11:00-12:00 Location: AMMERSEE II

Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols
The lack of control over the flow of personally identifiable data is becoming the most serious inhibitor for the digital economy, further strenghtening the need for standards, technologies and frameworks for secure and transparent data sharing methods. In this session we will move together through the existing building blocks for empowering the user to take full control over his data and create an image on how they fit together.

Extending the Power of Consent with User-Managed Access and OpenUMA
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized...

Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise
Consumer identity marches to the beat of a different drum. It does its own thing regardless of enterprise norms and expectations. So how do you solve a problem like consumer identity? This session take an insightful look at the changing identity landscape and explores the widening gap between consumer and enterprise identity. It talks about the challenges we face as we try to bridge the gap between the carefully controlled enterprise and the complexity of consumers.

Idemix: Secure, Attribute-Based Authentication

Date: Wednesday, May 06, 2015 Time: 12:00-13:00 Location: AMMERSEE II

Idemix: Secure, Attribute-Based Authentication
Identity mixer allows users to authenticate without identifying themselves by revealing only the required attributes. In this talk, we will present the different features of identity mixer, and give an overview on the possible cryptographic realisations of these features.

uProve: The Pricipal of Minimal Disclosure at Work
U-Prove is a cryptographic technology that allows users to take control over their data and minimally disclose certified information about themselves when interacting with online resource providers. U-Prove provides a superset of the security features of Public Key Infrastructure (PKI), and also provide strong privacy protections by offering superior user control and preventing unwanted user tracking. In his presentation, Ronny Bjones from Microsoft will describe uProve and talk about the...

Qiy Scheme: Trusted Exchange of Personal Information

User Managed Identity & Access

Sessions:

Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform

Date: Wednesday, May 06, 2015 Time: 14:30-15:30 Location: AMMERSEE II

Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
For the most part, OAuth 2.0 and other REST-based protocols for identity transactions are ratified and ready to use.  But how can they be combined to solve the actual business problem of operating in an identity infrastructure?    This session will cover the top 20 patterns of interaction for SSO, mobile, API, and provisioning use cases, showing how a practical combination of clients and scopes can result in a tightly secured identity architecture that leverages...

OpenID Connect Certification
The OpenID Connect protocol has quickly gained widespread adoption, enabling easy-to-use login and API access for both Web and native applications.  During its development, extensive interoperability testing was performed on a voluntary basis to ensure that different implementations would actually work together.  Now that the OpenID Connect protocol is final, the OpenID Foundation is working to ensure even better interoperation between implementations by creating a...

The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0
We need a modern, mobile first and API friendly security stack for building the current and next generation of applications and services. This includes authentication, authorization and delegated API access. OpenID Connect and OAuth2 provide an unprecedented alignment in providing one unified solution for the above problems and have reached excellent true cross-platform and –vendor adoption in very short time. This talk walks you through the mechanics of the protocols and how they...

Securing Sensitive Data While Enhancing Privacy

Date: Wednesday, May 06, 2015 Time: 15:30-16:30 Location: AMMERSEE II

Securing Sensitive Data While Enhancing Privacy
This session will begin with an outline of the common technical elements of privacy regulations. The speakers will provide a high level overview of the OASIS SAML and XACML standards to elucidate how they're used to secure sensitive data, such as government data and intellectual property. The group will describe how standards-based technologies are solving privacy issues through current use cases. The audience will hear about the U.S. Department of Homeland Security's objectives to improve...

Identity Strategy for Innovation

Date: Wednesday, May 06, 2015 Time: 17:30-18:30 Location: AMMERSEE II

Identity Strategy for Innovation

Facing The Future: Identity Opportunities for Telco Operators
With the advent of 4G/LTE, mobile operators are facing challenges and opportunities that will shape the future direction of communications for at least the next five to ten years.  Faced with the erosion of revenues from the rapid encroachment of the so-called OTT (over the top) players, such as Apple, Google and many others, into their traditional market strongholds, operators are coming to the increasing realisation that data – ‘big data’ – represents their...

User Managed Identity & Access

Sessions:

Life Management in Finance & Insurance Industry

Date: Thursday, May 07, 2015 Time: 11:00-12:00 Location: AMMERSEE II

Life Management in Finance & Insurance Industry
European Union legislation like PSD2 and the proposed new Data Protection Regulation have a serious impact on financial business. Should we pretend business as usual or change the way the finance & insurance industry interacts with their customers. The "privacy by design” approach of Trust Frameworks might be a solution. Simplicity; reducing complexity User-friendliness      Bring the customer ‘in control’

Life Management Use Cases & Business Models

Date: Thursday, May 07, 2015 Time: 12:00-13:00 Location: AMMERSEE II

Life Management Use Cases & Business Models
Enabling individuals, citizens, consumers to take control of their data with the opportunity to "exchange" it for shared value, will be one of the most significant shifts in business models in the decade ahead. What are the opportunities for individuals, government, business, health, education and consumer brands? What does disruption look like? What opportunities are there for new business models?

Empowering the Consumer for Digital Business and the Identity Economy
The transformation of business models into digital and the creation of new, natively digital business models, is requiring a new quality of interaction between individuals, businesses, governments and other institutions. Digital Business needs personal information of the consumer and therefore only can be successfull, if the consumer is able to have full control over what to share with whom. In this session, we will have a look at the market readiness for "privacy-by-design"...

Securing Operational Technology (OT) and the Internet of Things (IoT)

Sessions:

Security and the Internet of Everything and Everyone

Date: Thursday, May 07, 2015 Time: 14:30-15:30 Location: AMMERSEE II

Security and the Internet of Everything and Everyone
The vision for an Internet of Everything and Everyone (IoEE) is for more than just an Internet of Things. It provides opportunities for organizations to get closer to their customers and to provide products and services that are more closely aligned to their needs. It provides the potential to enhance the quality of life for individuals, through better access to information and more control over their environment. It makes possible more efficient use of infrastructure by more precise control...

IoT Privacy Risks, Legislation and Solutions
In this session the panel will look at how the IoT is changing the privacy landscape.  People are using devices without being aware of the amount of data that these devices are collecting or the potential uses to which this data will be put.  At the same time the legislation around privacy is being strengthened and how will this impact on the processing of this data.  How will the OASIS Privacy Management Reference Model and Methodology (PMRM) help to implement the policies...

Putting Identity at the Center of IoT- Kantara IDoT Strategic Review

Date: Thursday, May 07, 2015 Time: 15:30-16:30 Location: AMMERSEE II

Putting Identity at the Center of IoT- Kantara IDoT Strategic Review
The whole world is talking about the business opportunities that the Internet of Things (IoT) will enable. Industry analysts predict that IoT product and service suppliers will generate growing revenue exceeding $300 billion in 2020. While others forecasts that the worldwide market for IoT solutions will grow to $7.1 trillion in 2020. With numbers in the billions and trillions it’s no surprise that the enterprise is paying more and more attention. This landscape of promise also brings...

Process Control, Production IT and Operational Technology - No Go Areas for IDM?
IDM usually covers classical office IT. IDM controls who is allowed to do things, who is responsible, who is inside and who stays outside. In areas of operational technologies (OT) and process control we find similar questions. This presentation will take a closer look at typical usecases and practical patterns in OT-Areas. Motivation and starting point: Why should IDM cope with OT? When is the right time to get involved? Decoupling, robustness and decentralization: Some...

Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT

Date: Thursday, May 07, 2015 Time: 17:00-18:00 Location: AMMERSEE II

Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT
Organizations, both commercial and non-commercial, are eager to explore the new opportunities afforded by the Internet of Things. Applications range from the apparently trivial, such as Internet-connected toothbrushes, all the way through to critical infrastructure such as power grids. The designers and operators of such solutions may not be aware of the risks that they are exposing themselves to, and lack the tools and processes to protect them properly. In this panel we will discuss:...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Partners

The European Identity & Cloud Conference 2015 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00