Conference Track 2

  •  TYPE: Track   DATES: May 16 - May 17, 2018
Conference Tracks

Tracks:

Consumer Identity Management (CIAM): Creating the Foundations

Sessions:

EIC 18 Elephant Round on Standards Trends & Developments

Date: Wednesday, May 16, 2018 Time: 11:00-12:00 Location: AMMERSEE II

EIC 18 Elephant Round on Standards Trends & Developments
This session will provide you with insight on current global standardisation trends around identity and privacy. A short series of brief overviews will be followed by an extended panel session.  Andrew Hughes: Fresh Insights - Identity and Privacy Standards Work at ISO A short orverview on what ISO is doing in the area of Identity and Privacy. Most conference presentations about open standards cover technology and protocol interoperability standards. Believe it or not,...

Experts Interview: Broadening IAM to CIAM - The Business Aspects

Date: Wednesday, May 16, 2018 Time: 12:00-13:00 Location: AMMERSEE II

Experts Interview: Broadening IAM to CIAM - The Business Aspects
While the drivers of Employee IAM are more about operational excellence, regulatory compliance, and cybersecurity, CIAM has far more business impact. In today's connected business, the consumer and customer identities are at the centre. Managing these and their access builds the foundation for successful customer interaction. In this interview-style panel, 1st-hour experts Maarten Stultjens from iWelcome and Jason Rose from Gigya will discuss where CIAM is today and where they expect it to...

Saving the Marketing World with CIAM: One Identity at a Time
Modern Customer IAM architectures are expected to be the jack of all trades: They are supposed to streamline the customer acquisition process for Sales, provide a consistent user experience across all channels for end users, deliver extensive analytics for Marketing and Customer Service, and integrate seamlessly with a variety of enterprise applications such as CRM and Sales and online touch-points - all while upholding the classic goals of strong authentication and authorization in the...

Consumer Identity Management (CIAM): The Future

Sessions:

Making CIAM real in Logistics

Date: Wednesday, May 16, 2018 Time: 14:30-15:30 Location: AMMERSEE II

Making CIAM real in Logistics
Data sharing is the strategic direction when it comes to advancing the logistics sector in the field of better supply chain visibility and predictability while improving operational en financial efficiency. iSHARE takes a radically different approach by creating a multilateral trust network (legal, functional, operational and technical agreements) in which data sources and data platforms can authorise each other on granular level for access. In this way parties can share data in an easy,...

Defending Your CIAM from Current Threats
Learn best practices from the Azure AD Identity Protection team on how to use the latest defenses to secure your organization against the latest threats. This will be focused on policy recommendations and a structured approach with classes of technology. The recommendations are based on experience defending billions of users across 100s of millions of organizations against attacks of all types.

Why C-IAM Projects Fail - Five Most Common Obstacles
Marketing driven C-IAM projects are asked to go live within few weeks. Does that really work? There are several root causes for failures: Missing strategy, technology agnostic stakeholders, legacy back end systems, portals without support of standards and too many silos for user data. Let´s compare reality and expectations to find a conclusion for future steps.

Practical Approaches to (Customer) Identity Governance through AI

Date: Wednesday, May 16, 2018 Time: 15:30-16:30 Location: AMMERSEE II

Practical Approaches to (Customer) Identity Governance through AI
AI is a broader term to define a set of technologies that are becoming part of our application. In Identity and with special regards to governance the need of digital assistants (bots) and of Machine Learning (ML) algorithm that improve our employee performance and increase our security controls is absolutely a need. Through a set of practical use cases, we will look at how ML, NLP (Natural Language Processing), automated assistants may help our employees in their daily tasks but also how...

Know Your (Digital) Customer in the Identity Theft Era
As businesses evolve to support a complete digital experience, a challenge has emerged to one of the most basic questions of doing business: How can I truly trust I know my customer?. In the world of data breaches and identity theft, legacy programs of identity proofing and authentication do not instill a high level of confidence in the end user’s claims to allow establishing digital identity trust. New technologies and approaches are needed to assess the risk of digital identities...

Identity Repair as an Integral Part of the Ecosystem
Identity theft costs tens of billions of Euros every year and continues to rise. Account takeovers are also rising at an astonishing rate, increasing by 300% in the US between 2016 and 2017. The impact of this fraudulent activity has a profound impact on the lives of consumers affecting their credit rating, reputation, and finances, as well as having emotional and potentially psychological consequences. The ability to repair an identity online will be an increasingly important tool for...

How to manage Customer Identities – a Real World Example

Date: Wednesday, May 16, 2018 Time: 17:30-18:30 Location: AMMERSEE II

How to manage Customer Identities – a Real World Example
This real world implementation example describes the technical concept to build a CIAM implementation on a role based access control IAM tool. As for most data driven companies, IT backends provide data access for employees based on a granted role. In contrast, customer access rights need to be limited to their small data slice, based on their company, and their respective role in their company, or their individual data. It seems to be a good idea to reuse the same IAM tool for keeping...

Best Practice: S-Group

Consumer Identity III

Sessions:

Identity Systems at Scale: The Value of Standards, Certification, Trust Frameworks & Registration

Date: Thursday, May 17, 2018 Time: 11:00-12:00 Location: AMMERSEE II

Identity Systems at Scale: The Value of Standards, Certification, Trust Frameworks & Registration
Open standards like HTTP, OAuth, and OpenID Connect allow competing organizations to add value to their services, platforms, and products by ensuring interoperability across commercial, banking and government ecosystems. Open standards can be a powerful tool set for developers. But identity systems require rules that address liability as well as ensure technical conformance. This presentation is a pragmatic look at ensuring conformance to open standards via self-certification using the...

When Standards don't Suffice
Implementing or moving to standards is rarely a straight forward effort; rather, the specific use cases of an organization require often more than current standards address. In the face of this gap, it's important to have a process for evaluating when and how to extend existing standards. In this talk we will cover this process in the context of real life examples. Key Takeaways: process to evaluate a use case's applicability to existing standards method/principles for...

Improving Security and User Experience Using Open Standards

Inferring User Identity

Date: Thursday, May 17, 2018 Time: 12:00-13:00 Location: AMMERSEE II

Inferring User Identity
The outdated myth that a single human being controls a single account on your Internet service is no longer adequate to understand who is using your system for which purpose. We model identity in three tiers. The "group" tier includes households, families, companies, and other social circles of people who are connected in some way. The "human being" tier is our best-guess, frequently-changing approximation of the human being that may be using our system at the moment. The "account" tier is...

Adopting BYOID through CIAM Technologies
By recent identity flood, end-users in organizations do not wish to have additional identities(especially username and password) for their companies or universities anymore. This makes them to reduce their end-user satisfactions and royalities and sometimes make them to use shadow IT which may have security risk for the organizations. In addition, for many organizations e-mail is not suitable communicating tool anymore especially for younger age, because they are used to use social...

The Future: Identity, Privacy, AI, Blockchain

Sessions:

Frictionless privacy in the age of AI

Date: Thursday, May 17, 2018 Time: 14:30-15:30 Location: AMMERSEE II

Frictionless privacy in the age of AI
Privacy is always been a controversial topic in human history, its definitions and its boundaries have always been influenced by external factors. We tend to define privacy as the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals but share common themes. When something is private to a person, it usually means that...

Privacy Challenges with Conversational Interfaces
Technologies, such as chat bots, artificial intelligence and data mining enable personalized customer journeys: But how to achieve a balance between customer profiling and data protection? Since marketing automation systems are used by more and more companies, most marketeers are keen on extensively collecting prospect and customer oriented data: A perfect basis for measurement and optimization of marketing success. Conversational interfaces, such as chat bots, tempt users to reveal...

Informational Self-Determination in a Post Facebook/Cambridge Analytica Era

Date: Thursday, May 17, 2018 Time: 15:30-16:30 Location: AMMERSEE II

Informational Self-Determination in a Post Facebook/Cambridge Analytica Era
Nat Sakimura from Nomura Research contributed his following viewpoint which will be discussed in this session: The hype and hysteria around blockchain, blockchain identity and Facebook/Cambridge Analytica scandal have been quite interesting to watch. It did and is still showing a lot about people's understanding of the space, which is actually a bit different than what I think. For example, people think that they own their data and ought to have sovereignty over their data and some...

Are we on the Brink of an Identity Revolution?

Date: Thursday, May 17, 2018 Time: 17:00-18:00 Location: AMMERSEE II

Are we on the Brink of an Identity Revolution?
Are we on the brink of a revolution that will fundamentally change society and the way we live and work? The Identiverse is a big and scary place, and according to Professor Klaus Schwab of the World Economic Forum it will get bigger and scarier. He calls this brave new world The Fourth Industrial Revolution (4IR). In Germany it is known as Industry 4.0 and in Japan they are considering the world beyond, and they call it Society 5.0. In this new world emerging technologies will fuse...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2018

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 15 - 18, 2018 Munich, Germany

Partners

The European Identity & Cloud Conference 2018 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00