Conference Track 3

  •  TYPE: Track   DATES: May 10 - May 11, 2017
Conference Tracks

Authentication Trends and Standards - I

Authentication Trends and Standards - II

Information-Centric Cybersecurity

APIs & Identities for the Business-as-a-Platform

Tracks:

Authentication Trends and Standards - I

Sessions:

Balancing Between Friction and Privacy: Authentication Trends 2017 and Beyond

Date: Wednesday, May 10, 2017 Time: 11:00-12:00 Location: AMMERSEE II

Balancing Between Friction and Privacy: Authentication Trends 2017 and Beyond

Gooey on the Inside: Common Failures in Authentication Centric Security Architectures
In this session we will discuss the common pitfall of an authentication-centric security architecture and will discuss how to take a governance-based approach to the control and oversight of authentication systems. In his introductory talk, Sailpoint CISO Darran Rolls will make a clear case for putting governance at the center of the security architecture and will discuss emerging best practices for the governance of dynamic authentication and authorization systems in complex enterprise...

Bayer’s Identity and Access Management Journey

Date: Wednesday, May 10, 2017 Time: 12:00-13:00 Location: AMMERSEE II

Bayer’s Identity and Access Management Journey
Stephanie and Felix will outline Bayer’s IAM journey over the last years and their perspective for up-coming challenges. They will showcase Bayer’s IAM approach to build a global and comprehensive process and technology platform which allows for efficient automated ID life cycle processes as foundation for financial and IT risk management and Bayer’s IAM strategy to enable new digital business models. They will demonstrate that this platform is one key success factor for...

Successful Delivery of IAM Programs in a Large Scale Environment
IAM initiatives touch every pillar of the organization, and brings with it, an enormous amount of change management and risk. If you’re not careful in your execution, your IAM program is likely to interrupt your business rather than enable it. Let me share my recent Nestlé experience, including best practices and lessons learned from deploying a global solution in large and complex environment.

Authentication Trends and Standards - II

Sessions:

Results from a Recent KuppingerCole Leadership Compass: Adaptive Authentication

Date: Wednesday, May 10, 2017 Time: 14:30-15:30 Location: AMMERSEE II

Results from a Recent KuppingerCole Leadership Compass: Adaptive Authentication
Identity and Access Management (IAM) systems have continued to evolve significantly over the last two decades. Increasing security and improving usability have both been contributing factors to this evolution. Data owners and IT architects have pushed for better ways to authenticate and authorize users, based on changing risks and newer technologies. Businesses have lobbied for these security checks to become less obtrusive and provide a better user experience (UX). One of these such...

Killing the Password Once Again: Will the strong authentication providers finally succeed?
With all the attempts for killing the password over the past years, the question remains: Will it ever happen? Passwords and other weak means of authentication such as PIN numbers are still the by far most widely used way to authenticate. On the other hand, we observe an uptake for strong(er) authentication, be it the built-in biometrics in mobile devices, be it cloud-based MFA, or be it easy-to-use and rather cheap tokens. Thus, the question is: Are we already reaching the "break-even" for...

Using FIDO to implement the W3C Verifiable Claims Model

Date: Wednesday, May 10, 2017 Time: 15:30-16:30 Location: AMMERSEE II

Using FIDO to implement the W3C Verifiable Claims Model
Today’s federated identity management infrastructures suffer from a number of problems, in particular with regard to the privacy of users. First, many Identity Providers (IdPs) are not willing to release the user attributes that Service Providers (SPs) require in order to provide the fine grained authorization they need. This necessitates the pulling of user identity attributes from other Attribute Authorities (AAs). In order to solve this 'attribute aggregation' problem, the...

Strong Authentication using Keys on your Devices Controlled by You
The W3C Web Authentication enables web applications to sign in using stronger methods than passwords – using authenticators that utilize private keys held on your devices that are used with user permission, typically by employing a user “gesture” such as a biometric or PIN. This can also be used with the FIDO 2.0 Client To Authenticator Protocol (CTAP) protocol, which enables remote authenticators, such as those on phones, to be used when signing in.

Token Binding Standards and Applications
The IETF Token Binding standards enable data structures to be bound to a particular TLS channel – preventing them from being stolen and reused in unintended places. Data structures that can be Token Bound include browser cookies, ID Tokens, Access Tokens, and Refresh Tokens. This presentation will discuss the Token Binding mechanisms, the kinds of threats they mitigate, and the current deployment status.

IaaS Cloud Services for the Paranoid

Date: Wednesday, May 10, 2017 Time: 17:30-18:30 Location: AMMERSEE II

IaaS Cloud Services for the Paranoid
Many companies today are purchasing IaaS as an extension or replacement of their internal data centers and the Infrastructure team is given the task of offering the internal customers a PaaS for their hosted applications. The question of how to secure the data remains uppermost in the minds of CISOs and now even CIOs. For the security professional - it gives a green field in which to architect the utopia of The Perfect Design. When coupled with Operational reality, a more realistic, scalable...

Privilege Management @ BASF

Information-Centric Cybersecurity

Sessions:

Data Protection Thrives on a Comprehensive Approach to Security

Date: Thursday, May 11, 2017 Time: 11:00-12:00 Location: BODENSEE II

Data Protection Thrives on a Comprehensive Approach to Security

Encryption Politics: Where does it Stand?
This intervention offers an analysis of the current politics around encryption and related implications. Encryption is a key element of the existing and emerging communications networks and infrastructures and crucial for enactment of privacy-by-design principles. While many might know that the current crypto-tensions are re-iterating the so-called crypto-wars of the 1990s, the issue goes much further back in the history: there were bans on the use of the “coded language” already...

The ID-Pro Body of Knowledge: Taxonomy Draft
During the last European Identity and Cloud Conference in Munich on 11 May 2016, Kantara unveiled an industry-wide drive to create a non-profit, open professional association to represent and certify digital identity professionals. Since then, more than 380 individuals have signed the 'pledge' to support the initiative. During the past few months, a Kantara Discussion Group has actively developing various aspects of the association in several project streams. One of these project streams...

Overcoming Challenges Related to the Implementation of Data-Centric File Protection Solutions.

Date: Thursday, May 11, 2017 Time: 12:00-13:00 Location: BODENSEE II

Overcoming Challenges Related to the Implementation of Data-Centric File Protection Solutions.
Implementing efficient Document Protection Solutions Over the last four years UBS has designed, implemented and successfully deployed a global Data Classification & Protection solution called DRM (Digital Rights Management). This challenging and work intense program has provided a number of observations and recommendations for implementing efficient document protection solutions, which will be summarized and shared with the audience. The focus of this session is on the classification...

How an Innovation Leader Protects its Intellectual Property with DRM
As a global, independent family-owned company in Germany, FESTO has become the performance leader in its industry over the last 50 years, thanks to its innovations in all areas of factory and process automation technology. To develop and deliver this innovations, the protection of the intellectual property is one of the major goals within the company. To do so, Digital Rights Management (DRM) was implemented many years ago and is constantly improved and adapted to current and future needs....

APIs & Identities for the Business-as-a-Platform

Sessions:

Reaching Beyond PSD2: BaaS as a Critical Business Advantage

Date: Thursday, May 11, 2017 Time: 14:30-15:30 Location: BODENSEE II

Reaching Beyond PSD2: BaaS as a Critical Business Advantage

Bank as a Platform: Exploring a new Role in the Age of Technology
The financial industry is changing faster than ever. The introduction of PSD2 has proved to be a tipping point for API technology entering the financial services industry. Exponential technologies such as blockchain and artificial intelligence are redefining business models. How can banks stay relevant in a fast-paced and technology driven world? Learn how ABN AMRO is embracing technology and exploring new business models in banking.

API Management and API Security

Date: Thursday, May 11, 2017 Time: 15:30-16:30 Location: BODENSEE II

API Management and API Security
API Management and API Security are a must today. Be it specific requirements such as PSD II or the demand for rapidly creating new applications in the context of bimodal IT and Digital Transformation, organizations must open up APIs and manage and secure these adequately. We will look at the requirements and solutions for modern API Management and API Security. In this session, participants will look at the Top 5 requirements for API Management/Security solutions and discuss the...

API Security & Innovation in the Light of Mobile Apps and PSD2
Over the last few years businesses have had an increasing number of reasons to deliver public APIs. From monetization of existing organizational data assets and services to attempting digital transformation. By opening new product delivery channels such as Mobile App’s using APIs, many businesses are becoming API platforms. This trend that has fostered the API economy. With new opportunities come new threats. Entering the API economy means opening your internal infrastructure to the...

Using API Security Technology for GDPR and PSD2 Identity and Privacy Compliance

Date: Thursday, May 11, 2017 Time: 17:00-18:00 Location: BODENSEE II

Using API Security Technology for GDPR and PSD2 Identity and Privacy Compliance

AI, Blockchain & Self Sovereign Identity: Providing Identity to Unbanked People in Developing Countries

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2017

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 09 - 12, 2017 Munich, Germany

Partners

The European Identity & Cloud Conference 2017 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00