Enabling the Digital Transformation: Identity & Security for Everyone and Everything, Everywhere

  •  TYPE: Track   DATES: May 11 - May 12, 2016
Conference Tracks

The Digital Transformation is not only about new products, services, and business models. It is neither a singular event or a one-time transformation. Digital Transformation means transforming into agile enterprises where business processes, partnerships, customer relations, services, and products are ever-changing and innovation happens at high speed. This imposes new security challenges, by smart manufacturing (Industry 4.0), connected things and myriads of data, and more identities to deal with than ever before. It is about a new way of managing identities and their access in complex relationships. Doing security and privacy right builds the foundation for agility – without it, business will fail. Connecting means convergence of business IT, operational technology, connected things. IAM is the central element for security of these connected environments, in which attack surfaces multiply.

Topics in this track:

  • New Security challenges in OT, Industry 4.0 and IoT
  • Connecting means transforming: One Security for all – business, manufacturing, connected things
  • Why Privacy and Security by Design make you agile in the Digital Transformation
  • Beyond physical/logical convergence – not only authentication, but integrated processes

Moderators:

Tracks:

Blockchain Identity & Security

Sessions:

Blockchain, Identity, Cybersecurity: Revisiting Risk Management in a Post-Privacy Age of Trustless Distributed Systems

Date: Wednesday, May 11, 2016 Time: 11:00-12:00 Location: CHIEMSEE

Blockchain, Identity, Cybersecurity: Revisiting Risk Management in a Post-Privacy Age of Trustless Distributed Systems
Unlike other technological revolutions, this horizontal, peer-to-peer nature of the blockchain will have a direct impact on non-technological governance and societal factors. How is trust established without trusted third parties? Although it is not possible to offer a prediction of how distributed ledger technology with change society, the assertion that new and publically-accessible technology such as the internet, file sharing and social networks would empower individuals and lead to a...

Blockchain – a New Compliance Paradigm?
One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Permissioned vs. Permissionless, Private vs. Public, Decentralized vs. Distributed - Comparing Blockchain Concepts and their Governance Models

Date: Wednesday, May 11, 2016 Time: 12:00-13:00 Location: CHIEMSEE

Permissioned vs. Permissionless, Private vs. Public, Decentralized vs. Distributed - Comparing Blockchain Concepts and their Governance Models

Blockchain Identity
In this session you will learn how blockchain is relevant for internal and external users, how it can interface with existing systems, and how it allows users to truly own their identities (and the implications).

Blockchain Use Cases

Sessions:

Blockchains Beyond the Hype: Overcoming the Current Limitation and Identifying the Real Value

Date: Wednesday, May 11, 2016 Time: 14:30-15:30 Location: CHIEMSEE

Blockchains Beyond the Hype: Overcoming the Current Limitation and Identifying the Real Value
For the last few months, every day there has been a new announcement of a major corporate (successfully ?) trialing blockchain technology in a Proof-of-Concept. For anyone outside of the blockchain space and hype, it has become difficult to discern the signal from the noise. We will give a brief introduction into the true technical innovation of these open multi-user platforms and present several use cases where businesses can benefit: From IT security to data privacy to IoT.

How to Make the Blockchain a Reality
Join this exciting panel on blockchain to learn how technology can disrupt the financial industry as well as any supply-chain and other transaction oriented busienss models, creating new growth potentials through competitive advantages, reduced cost and improved service quality. Blockchain is not yet ready to support industrial use cases. In this panel session we will discuss the requirements across industries and how to improve and accelerate the maturity of this shared ledger technology...

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World

Date: Wednesday, May 11, 2016 Time: 15:30-16:30 Location: CHIEMSEE

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World
Recent research estimates that there are 1.5 billion individuals who do not have any means to prove their legal identity. Failing states lacking to perform even the most basic administrative tasks, supressed ethnic groups, and of course all those who have to flee their home due to conflicts or disasters. New thinking is required to make identification available to all humans, and to help refugees and displaced people to cross borders and to apply for asylum. In this panel discussion, we...

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity

Date: Wednesday, May 11, 2016 Time: 17:30-18:30 Location: CHIEMSEE

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity
During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we will build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things, identity and the need for privacy "collide". Has blockchain been the missing link to put the "platform" thought away from "Life Management Platforms" to make it a universally available...

Consumer Identity

Sessions:

IAM + Big Data + Privacy by Design = Consumer Identity?

Date: Thursday, May 12, 2016 Time: 11:00-12:00 Location: CHIEMSEE

IAM + Big Data + Privacy by Design = Consumer Identity?
Imagine an ideal world where you own your digital identity. It exists in one place, is globally accessible, private by default and simple to maintain. You may want to show parts of it to others, but the choice is yours. Vendors dealing with you would never get into conflict with ever-tightening privacy regulations. They wouldn´t necessarily need to know  who you are, as long as there is a relationship in place which allows the vendor to know your needs. ...

Customer Identity Management: What makes the Difference?
Over the last few years there has been a shift from internal employee focused (B2E) IAM installations towards partner and customer focused (B2C) external facing IAM systems. This means that the job market is shifting and many IAM practitioners are taking on roles in the B2C space. If you are an experienced B2E manager that has been given the job of running a B2C IAM program what should you think about? What are the main differences between B2E and B2C? Key Takeaways: The key...

IDaaS needs another S for Security

Date: Thursday, May 12, 2016 Time: 12:00-13:00 Location: CHIEMSEE

IDaaS needs another S for Security
The Identity-as-a-Service solutions of today are helping many businesses address the password management problem, enabling a seamless experience for end users, and delivering IT efficiencies. But as more and more enterprises put Cloud at the center of their enterprise IT, is that enough? Join this session to learn about the security challenges of a SaaS-first world, and the transformation needed in Identity-as-a-Service to address these challenges.

BYOI (Bring Your Own Identity): Me, Things and the Relationship between. The Claim for a Frictionless Security World
Frictionless IT is a simple term to understand, it's about an IT ecosystem focused on give the end user a continuous user experience where there’s not friction, hence the term, while using different devices, application, programs, networks or at higher level any on premise/cloud environment. It's an IT that just work anywhere, anytime with any device for any user. Embracing a journey toward a frictionless IT ecosystem need to embrace an equivalent and inclusive journey toward a...

Internet of Things & Industry 4.0

Sessions:

Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?

Date: Thursday, May 12, 2016 Time: 14:30-15:30 Location: CHIEMSEE

Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both...

From Suppliers to Consumers: Issues of Liability in Industry 4.0
What do we mean by ‘Industry 4.0’ and what is the role of the Internet of Things? In a ‘smart manufacturing’ world, machines and devices communicate with each other and exchange huge amounts of data in real time to manage the industrial production process to create more complex, flexible and customised products. What happens when something in the connected supply chain goes wrong and causes physical damage? Who is liable for the consequences or any potential faults in...

IPv6 - a Security Perspective

Date: Thursday, May 12, 2016 Time: 15:30-16:30 Location: CHIEMSEE

IPv6 - a Security Perspective
The Internet of Things forces the conversion to IPv6. Several carriers have run out of IPv4 addresses. IPv6 is advertised as more secure and more versatile. But there are some new security risks that did not exist in IPv4. And there are some wrong perceptions as well. After a short general introduction of IPv6 basics, the presentation will focus on new risks that did not exist in IPv4. Finally there is guidance on how to securely migrate into the IPv6 world.

How to plan IT-Security in transforming towards an Industry 4.0 Enterprise? By getting the full Executive Management involved!
Transforming a factory into a true “Smart Factory” implies fundamental changes, not only at a technical level but also in business processes and relationships with suppliers and customers. These introduce many new risks related to IT-Security, including Cyber espionage and Cyber sabotage, potentially leading to personal injury or environmental harm. Understanding and pro-actively managing these risks requires the early involvement of all Executive Management functions, from...

Orchestrating Identities across People, Systems and Things: Who Will be the Conductor of the Identity Orchestra?

Date: Thursday, May 12, 2016 Time: 17:00-18:00 Location: CHIEMSEE

Orchestrating Identities across People, Systems and Things: Who Will be the Conductor of the Identity Orchestra?
During the early days of identity in the Internet of Things, identity represented a singular thing. Today, identity has evolved into a more complex arrangement. We must now evolve our thinking. Identity is no longer about one person, system or thing. It involves the interaction between and orchestration of people, systems, things, devices - all of which have their own identities. It is ultimately a “symphony”. In order for any orchestra to achieve greatness, there must be a...

The Future of Digital Identity in the Age of the Internet of Things
In this session we will discuss how we see Identity in the context of Digital interactions. Identity is not only associated to users but also to devices, things and services and moreover the relationships between all these entities can also convey important information when interacting between them. Digital Identity can be also an enabler to bring value to every interaction with customers and citizens when they access services provided by organizations. Services can be offered through...

Industrial IoT Security, Device to Enterprise and Across The Lifecycle
IoT security is the major challenge for industry. The issues associated with the delivery of trust, secure authentication, and integration of devices are know but solutions are scarce. We explore the ways security can be extended from devices to the Enterprise. In addition the needs of IoT security differ markedly from traditional smart card or mobile handset devices given the long lifecycle associated with devices in critical infrastructure, transportation, industrial and building...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 - 13, 2016 Munich, Germany

Partners

The European Identity & Cloud Conference 2016 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00