Conference Track 1

  •  TYPE: Track   DATES: May 16 - May 17, 2018
Conference Tracks


GDPR - Compliance Now


GDPR Track Intro

Date: Wednesday, May 16, 2018 Time: 11:00-12:00 Location: AMMERSEE I

GDPR Track Intro

GDPR: From Law Book to Policies over Technical Security Solutions
The EU General Data Protection Regulation (GDPR) represents a major challenge in data privacy for most organizations in Europe as well as abroad. It is a multidisciplinary subject and therefore it is difficulty to appreciate the right approach due to the fact that requirements and effects of the regulation will impact various disciplines. Juan Carlos Lopez Ruggiero, CSO for DXC Technology and counsellor at the EU Commission, will share with us some impressions about a practical approach...

Going Viral with Customer Consent
Based on actual use cases and innovative customer journeys, you will see how digital identity can be leveraged to create true customer engagement in the era of open banking and GDPR. Key Takeaways: Customer consent is a strategic marketing instrument CIAM is the key to serving your customer base, and beyond A stepped - mobile - approach leads to seamless onboarding of prospects

GDPR as an Enabler for Strong New Business Models - A Real-Life View on Existing Projects

Date: Wednesday, May 16, 2018 Time: 12:00-13:00 Location: AMMERSEE I

GDPR as an Enabler for Strong New Business Models - A Real-Life View on Existing Projects

Panel: The State of the Self-Sovereign Internet

GDPR - Compliance Now


Is Blockchain The Solution for Our Privacy Issue?

Date: Wednesday, May 16, 2018 Time: 14:30-15:30 Location: AMMERSEE I

Is Blockchain The Solution for Our Privacy Issue?

Balancing between European Regulatory Framework and Blockchain Technology
Managing identities of one of the most prominent financial capitals in Europe -Luxembourg, LuxTrust undertakes high responsibility towards both consumers and corporations. Today, when personal data is increasing under threat, Identity providers are looking to extend their organizational boundaries and capabilities via distributed security mechanisms. When already managing a significant number of personal and corporate identities to provide high security and compliance for financial...

Privacy 2.0

Date: Wednesday, May 16, 2018 Time: 15:30-16:30 Location: AMMERSEE I

Privacy 2.0
The privacy notices and rights information, or lack of it, comprise what is becoming the public profile of an organization's privacy transparency or Public Privacy 1.0. The GDPR, coming into force on May 25th 2018, is the Y2K of privacy transparency, as services ‘data controllers and processors’ need to be transparent over data processing or risk being liable for non compliance, less trustworthy and less competitive. This presentation proposed to cover Privacy Transparency &...

How GDPR Enables More sharing of Personal Data, Not Less
The GDPR takes away ownership and control of personal data from businesses and gives it back to consumers, where it belongs. Siloed personal data under our existing and outdated model benefits no-one, not those who create it, or those who would like access to it for innovation. But returning that data to the consumer for them to own and control opens up a whole new world of fully consented and GDPR-compliant sharing, where innovation across all industries can flourish from the mass of...

Is now the Time for Personal Data Stores?
The concept of a personal data store, as a means of providing the individual with control over their personal data, has existed for many years but to date there has been no significant adoption of such solutions. Personal data stores are starting to feature prominently in leading self-sovereign and consumer centric digital identity initiatives. So what has changed? This presentation will define what a personal data store is (and importantly what it is not), discuss the value personal data...

How to Tackle the GDPR: A Typical Privacy & Security Roadmap

Date: Wednesday, May 16, 2018 Time: 17:30-18:30 Location: AMMERSEE I

How to Tackle the GDPR: A Typical Privacy & Security Roadmap
As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function...

Privacy-by-Design in Federated Identity Management
Federated Identity Management (FIM), while solving important scalability, security and privacy problems of remote entity authentication, introduces new privacy risks. By virtue of sharing identities with many systems, the improved data quality of subjects may increase the possibilities of linking private data sets; moreover, new opportunities for user profiling are being introduced. However, FIM models to mitigate these risks have been proposed. In this presentation we elaborate privacy by...

Leveraging UMA's Power for Compliance and User Control
In the face of not just GDPR, but many nations' new mandates for consumer data rights, organizations with a variety of business models face what may be their most serious dilemma of the information age: how can we deal in personal data safely? Proponents of the User-Managed Access vision would say the only way is to offer individuals "context, control, choice, and respect". This session will explore new UMA work that maps the flow of on-the-wire technical artifacts to legal devices such as...

GDPR, PSD2, SOX : Remaining Compliant in Challenging Times


Remaining Compliant in Challenging Times: An Introduction

Date: Thursday, May 17, 2018 Time: 11:00-12:00 Location: AMMERSEE I

Remaining Compliant in Challenging Times: An Introduction

Continuous Compliance Through Data Analytics and Automation
For every bank, pharmaceutical or manufacturer, for every highly-regulated company IAM is a crucial part of regulatory compliance. Just think regulations such as SOX or the upcoming GDPR. The resulting management processes involve many people throughout the organization, including line managers, application owners, compliance managers and risk managers. However, from many of our customers we hear that while these people often perfectly understand what to pay attention to on the level...

Panel: Continuous Compliance

Implementing IAM for GDPR

Date: Thursday, May 17, 2018 Time: 12:00-13:00 Location: AMMERSEE I

Implementing IAM for GDPR
IAM is a cornerstone in GDPR implementations, but both GDPR and IAM implementations are far from easy. Together, they are even more complex. In order to reap the benefits, you need to overlay two projects: building your IAM and creating your compliance program. These projects are very different in nature and owned by essentially very different people – legal and security, and may already in the beginning lack a common language. In a successful cross-professional GDPR+IAM project,...

Fully Automated KYC Process and its Challenge in the Light of GDRP and New Regulations
1. Introduction- why do we need a KYC process  how we can prevent the breach, describe KYC process, quickly describe KYC process in regulatory and non-regulatory services,  downside of manual KYC processes (insecure method of authentication, storing personal data) 2. How the KYC process can be automated different ways of the automated KYC processes security features of the automated KYC process 3. How the personal data is protected in the light...

eIDAS In Practice - From Regulation to Implementation
eIDAS is identity federation within a trust framework on an unprecedented scale. In 2018 member states of the European Union will be required to recognise the eID's of other member states under the eIDAS Regulation. Connectis is leading the transition towards a Digital Single Market through various successful projects, co-financed by the European Union's Connecting Europe Facility. Connectis already aided around 100 Dutch municipalities open up hundreds of services to citizens from other...

GDPR at Work: Managing Consumer Identities


Date: Thursday, May 17, 2018 Time: 14:30-15:30 Location: AMMERSEE I

GDPR, Blockchain & The Right to be Forgotten
A World without Identity and Access Management systems is unimaginable in our time. Just as in corporate environments, customer environments are highly depended on identity providers like Google or Facebook. But topics like access management are especially important in corporate environments. The main concept though is still trust. People have to trust that a main server for an IAM system is highly available, they have to trust their IT admins to not mess around with their data, and they...

Panel: How to Interact with your Customer without Comprising Privacy
Building an identity and access management strategy is a key factor to comply with the GDPR, to manage customer identities and to help improve the business’s view of its customer and its relationship with them. There are some more challenges for companies which will be adopting and implementing GDPR privacy guidelines: They should improve data management practices, data quality and privacy governance. They should be responsible for establishment, control, and governance of...

Consent - What Does it Mean in a Digital World?

Date: Thursday, May 17, 2018 Time: 15:30-16:30 Location: AMMERSEE I

Consent - What Does it Mean in a Digital World?
The purpose of this talk will be to explore the ideologies of consent in a digital context, about when should Forgiveness or Approval be used as an appropriate consent method. Specifically, when a third party needs permission to use/ has used your data and what this means for company cultures and values. The talk will also look at how a layered consent model is needed and what that means for customer experiance Key Takeaways: what consent means in a digital world they type of...

Consent Management Solutions - Best Current Practices
Privacy and data protection laws allow for collection and processing of an individual’s personal information given proper notice and consent. Consent to process data is a powerful justification in regulations such as GDPR: it can be used to enrich the user experience and remove doubt about intent. However, there is currently no broadly-accepted standard for management of consent in online systems. The Kantara Initiative Consent Management Solutions Work Group is gathering current...

Panel: How to decide between Consent and Contract as a Lawful basis for Processing under GDPR
This panel session will bring together legal and technical experts, together with digital business representatives to discuss the changes in guidance pointing towards Contract and away from Consent. The panel will discuss various use case examples that support the use of Contract vs the use of Consent as lawful bases for processing personal data. The panel will then discuss the range of tools and options available to implement them. Key Takeaways: The pros and cons of Contract vs...

Bridging Blockchain Identity & eIDAS Infrastructures

Date: Thursday, May 17, 2018 Time: 17:00-18:00 Location: AMMERSEE I

Bridging Blockchain Identity & eIDAS Infrastructures
Self sovereign decentralised identities with verified claims on blockchain are slowly becoming reality. On the other hand, the concept of decentralised identities has been around for a while and in EU we already have frameworks and some existing technologies with capabilities to support this concept. Taking this into consideration, it appears that at least in EU we can accelerate the real world traction of SSIDs with blockchain-based proofs by bridging already deployed eIDAS compatible...

CIAM 2.0
There are currently two strong winds blowing through the Consumer Identity world as we know it. One is clearly stronger privacy and data protection laws, GDPR in Europe being a good example of it. Such an important topic has already influenced the capabilities CIAM systems need to have and introduced the new topic of Consent management. The other strong wind is clearly Digital Transformation. With many companies integrating digital technology into all areas of their business, this...

Closing Remarks

Stay Connected

Munich, Germany


European Identity & Cloud Conference 2018

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 15 - 18, 2018 Munich, Germany


The European Identity & Cloud Conference 2018 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00