Conference Track 4

  •  TYPE: Track   DATES: May 16 - May 17, 2018
Conference Tracks

Tracks:

Blockchain I

Sessions:

Decentralized Identity for the Enterprise

Date: Wednesday, May 16, 2018 Time: 11:00-12:00 Location: CHIEMSEE

Decentralized Identity for the Enterprise
Your Enterprise IAM is resilient to the Blockchain hype? No, it isn’t. Imagine a world where employees bring their own Blockchain ID – that is where BYOI becomes a reality. Imagine a world where the work contract is related to a Blockchain ID and what that would mean for you joiner, mover, and leaver processes. Imagine a world where managing access can be automated based on smart contracts. There are plenty options. Most of them still uncovered. But once you start looking at what...

Simple Solutions for Complex Challenges with Sovrin & Corda
Some major challenges have been bugging businesses in the digital age. How to digitally master organizational relationships, how to enable more efficient and scalable digital interactions. Project Mercury is a Finnish ecosystem project which solved some of these challenges with the latest distributed technologies: Sovrin & Corda. In this session we will see a demo and dig deeper into how we in practice demonstrated creation of digital organization identifiers, decentralized digital...

The Sovrin Experience: a Trust Service Provider Perspective
InfoCert’s core offering, as an EU Trust Service Provider -TSP, includes qualified certificates, time stamps, digital preservation, electronic delivery and identity management services – the kind of „centralized“ trust services many expect the blockchain to supplant. This is not necessarily the case: Sovrin provides a bright example of a distributed infrastructure which enables an ecosystem of Trusted Records issuers and consumers. Following this vision, InfoCert...

Multi-sourced Identity and the Sovrin Identity Model

Blockchain ID, Privacy and Security

Date: Wednesday, May 16, 2018 Time: 12:00-13:00 Location: CHIEMSEE

Blockchain ID, Privacy and Security
Digital Identity is the critical foundation for most transactions in business and social contexts. Blockchain based identity systems seem to better address requirements such as scaleability, reliability and governance when it comes to billions of users in the digital world. Distributing trust is a new way of managing digital IDs. It enables humans to gain control over the usage of personally identifiably information (PII) which relates to them. In this Session, we will find out wether and...

Legal Implications of Self-Sovereign Identity on Liability, GDPR and Trust Frameworks

Blockchain II

Sessions:

Embracing Self Sovereign Identity for Albertans

Date: Wednesday, May 16, 2018 Time: 14:30-15:30 Location: CHIEMSEE

Embracing Self Sovereign Identity for Albertans
ATB Financial operates as a financial institution in the province of Alberta, Canada. We have a long heritage of serving Albertans, and with our vision of being more than a bank, we see enabling access to a true self sovereign identity (SSI) as a transformative opportunity to impact their lives. In 2017 we took the first few steps in this journey, and through 2018 we’re moving closer to the reality of creating an ecosystem where Albertans and create and embraces their SSI through a...

Blockchain 2 - Self-Sovereign Identity Management Meets Distributed Transaction Management
Timo Hotti will talk about the combination of decentralized transaction management and self-sovereign identity management to produce truly decentralized digital services. As a concrete use case, he will discuss the prospect of creating and using digital corporate identities using the combination of a Corda transaction management network and a Sovrin identity management network. He will also discuss some viewpoints about how the “My Data” approach to data management may in the...

The World's First Digital Self Sovereign Identity for Doctors: Where Trust Meets Trust.

A Universal Resolver for Decentralized Identifiers (DIDs)

Date: Wednesday, May 16, 2018 Time: 15:30-16:30 Location: CHIEMSEE

A Universal Resolver for Decentralized Identifiers (DIDs)
Decentralized Identifiers (DIDs) are an important innovation in the emerging blockchain-based / self-sovereign identity community. Identifiers such as names and numbers have always been the basis for any identity and communications systems, and while historically identifiers have been issued and maintained by central authorities, blockchains and other technologies today provide the ability for individuals, organizations, and things to register identifiers in a self-sovereign way, i.e....

Lessons Learned from Integrating with Blockchain Identity Providers
Distributed ledgers and self-sovereign identity are a match made in heaven, and there are many products out there already that implement this concept readily available to developers and consumers alike. After integrating with some of these providers, both manually and using client libraries, it’s clear that there’s a high variance in implementation quality, but at the same time some commonality in design decisions. In this talk, we’re going to take a look at some of...

A Blockchain Approach to Digital Identity: Building an Ecosystem

Date: Wednesday, May 16, 2018 Time: 17:30-18:30 Location: CHIEMSEE

A Blockchain Approach to Digital Identity: Building an Ecosystem
SecureKey is working closely with a consortium of leading Canadian organizations, including financial institutions, telcos, credit unions, government agencies and many more, to create a digital identity ecosystem that will change the way consumers validate their identity online. The ecosystem will put consumers back in control of their own identities and allow them to selectively and securely share their information. Consumers will be able to leverage their existing relationships with...

The Canadian Approach to Blockchain ID

Authentication

Sessions:

The future of Strong Authentication

Date: Thursday, May 17, 2018 Time: 11:00-12:00 Location: CHIEMSEE

The future of Strong Authentication
So far, most applications still rely on passwords, but there is a growing need for strong authentication to protect against identity theft. As of January 13th, 2018, the Second Payment Services Directive (PSD2) requires every payment service provider to implement strong customer authentication (SCA) based on two or more elements which are categorised as knowledge, possession and inherence and shall result in the generation of an authentication code (PSD2, Article 4). In the area of...

Balancing User Experience and Cybersecurity in Healthcare: FIDO based Strong Consumer Authentication
Faced with mounting threats associated with consumer healthcare fraud, Aetna embarked on a journey to transform consumer authentication built upon FIDO standards and risk-based consumer authentication. During this talk we will discuss: Pitfalls of binary authentication & American healthcare consumer fraud trends Risk-based authentication Biometric-based authentication leveraging FIDO Using security to improve user experience and access to care

Thinking Outside-In: Providing Easy Access for your Customers and Employees

Date: Thursday, May 17, 2018 Time: 12:00-13:00 Location: CHIEMSEE

Thinking Outside-In: Providing Easy Access for your Customers and Employees
Most businesses today still think Inside-Out when it comes to authentication and to enabling access. While this might work for employees, it is not ideal for dealing with customers and consumers. Today, people expect smooth and convenient access. They don’t want to be pushed into lengthy registration processes. They don’t want to remember usernames & passwords anymore. They don’t want to use cumbersome methods for strong authentication....

Deprecating the Password: A Progress Report
If you ask almost anyone you meet if they have too many passwords, if they have trouble remembering their passwords, or if they are reusing the same passwords in multiple places, you’re likely to get an ear-full. People intuitively know that there has to be something better than having to have a password for everything they do! The good news is that passwords are being used for fewer and fewer identity interactions. They are being replaced by biometrics (sign into your phone, your...

Authentication, Authorization, API Management

Sessions:

Of Fishes and Devices: How Critical Risk Insight Makes MFA Adaptive, Enjoyable, and Secure

Date: Thursday, May 17, 2018 Time: 14:30-15:30 Location: CHIEMSEE

Of Fishes and Devices: How Critical Risk Insight Makes MFA Adaptive, Enjoyable, and Secure
Mobile multifactor authentication (MFA) holds tremendous promise for solving urgent security and regulatory problems. It can deliver the "strong customer authentication" (SCA) required by PSD2 and other standards, and it can remove the fear of account takeover that hovers over all of us, courtesy of the 5 billion credentials accessible to hackers and fraudsters on the Dark Web. It can also drive outstanding user experiences. But it's often missing the digital glue that can make it truly...

Best Practices for Integrating Mobile Authentication to Consumer Services
Mobile authentication in consumer services can provide real business benefits through improved security, usability and interoperability. There are several use cases that business may solve through the deployment of a mobile authentication solution: Improved KYC through the utilization of a secure enrollment mechanism with government, telecom operator or financial institution issued eIDs. Building a mobile application ecosystem of third party mobile applications through the...

Behavioral Biometrics to adress the PSD2/SCA Requirements

Date: Thursday, May 17, 2018 Time: 15:30-16:30 Location: CHIEMSEE

Behavioral Biometrics to adress the PSD2/SCA Requirements
With PSD2, the requirements for strong authentication is increasing, and unless something is done, this will be really frustrating for the users. Also, strong authentcation by itself, does not really prove who is authentication. This presentation will show behavior biometrics and other methos of providing both strong and easy to use authentication for end users. Key Takeaways: The PSD2/SCA requirements Dynamic biometrics Mobile device trust score

Applications on the Edge of the OAuth Standards Wave

The Value of Adding Policy Management in API Security Gateways for Implementing ABAC

Date: Thursday, May 17, 2018 Time: 17:00-18:00 Location: CHIEMSEE

The Value of Adding Policy Management in API Security Gateways for Implementing ABAC
Attribute Based Access Control is the next step for implementing fine grained authorizations in federated identity environments. ABAC enabled application landscapes need to implement authorization management for application and service consumers who are unknown to the organization. In order to make this possible, other means of access control have to be implemented. Role based access through provisioning engines is no longer feadsile, access by users from different Identity providers and...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2018

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 15 - 18, 2018 Munich, Germany

Partners

The European Identity & Cloud Conference 2018 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00