Artificial Intelligence, Machine Learning, Consumer Identity & Customer Experience

  •  TYPE: Track   DATES: May 15 - May 16, 2019
Conference Tracks

Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. 

Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for machine-based automation. To do so, we have had to become more and more focused, sophisticated and somehow limited to narrow knowledge domains, trying to do one single thing as good as it can be done. With AI entering the equation, this task will be taken away from us, eventually causing some kind of relief in an omnipresent cybersecurity skills shortage.  

Managing customer information in a digitally changing economy with many business partners in need of access is one of today's biggest challenges and will continue to evolve rapidly. Understanding the wishes and requirements of customers and mapping them successfully in CIAM processes is the key to successful online business. Customers have a constantly growing selection of online service providers; your CIAM is one of the decisive points with which you can drive your customers to choose your business and achieve a lasting customer loyalty for your company.

Customer Experience (CX) is the central starting point when it comes to the strategic definition of your Management. Managing millions of identities and handling several millions of interactions per day is a technical challenge that changes every day. However, ease of use, efficiency, and joy of use by the customer are indispensable prerequisites. At the same time, it is mandatory that every consumer can have controlled access to his data.

Marketing automation is software and strategy at the same time that allows companies to nurture prospects with highly personalized, useful content that helps convert prospects to customers and turn customers into satisfied customers. This type of marketing typically generates significant new revenue for companies and provides an excellent return on the investment required. The term “marketing automation” has become a buzz-word even in the It focused business. Marketing automation can be a fantastic tool to help a company to nurture their leads across multiple channels, prioritize the right leads to engaging with.

Moderators:

Tracks:

Artificial Intelligence & Machine Learning in Cybersecurity

Sessions:

AI for the Future of your Business

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: AMMERSEE II

AI for the Future of your Business
AI covers a range of technologies and some of these are sufficiently mature for commercial exploitation and some are not.  This session will describe the areas where they can be applied today. It will include real life examples of how it is being used.   It will also discuss the limitations of the current state of the art and some of the research into overcoming these. 

Use Case: AI Powered Conversational Experience at the Singapore Art Museum

Panel: What are the Secrets to Successful AI?
You have AI. She has AI. It’s 2019. We’re all going to have AI powering conversational experiences with our customers. But there’s a problem. How do you make your AI stand out from your competitors’ AI?

Devil's in the Details: AI, Bad Guys, & Messy Data

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: AMMERSEE II

Devil's in the Details: AI, Bad Guys, & Messy Data

Outsmarting AI
One can think of many arguments of why machine learning (ML) is a game changer in the field of cybersecurity. In fact, today, many ML applications already exist to protect our systems from attacks in more intelligent ways than before. However, have you considered that your own ML model can be the direct target of attacks? This talk elaborates on the topic of adversarial attacks in ML; How they work and how you can defend against them.  Key takeaways: Know how your ML...

Trusting Your AI
The huge promise offered by AI, and particularly machine learning, has led to an explosion in uptake of AI methods applied to a wide variety of business problems. However, machine learning and the data to which it is applied can be extremely complex, resulting in opaque systems that are not understood by their creators and not trusted by their users. In this talk, I will discuss approaches that can improve trust in AI systems, focussing in particular on explainability (how and why did the...

Artificial Intelligence & Machine Learning

Sessions:

The Identity Problem of Chatbots

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: AMMERSEE II

The Identity Problem of Chatbots
Chatbots are alternatively being hyped as a great opportunity and a great disappointment. There is a plethora of options on how to build and design chatbots and a lot of platforms where they can run. To make things even more complicated there is a lot of confusion around the lines between chatbots and artificial intelligence and how the two intersect. This talk aims to clarify the range of concepts and give you a conceptual framework that will make it much simpler to guide strategic...

Intelligent Chatbots - Different Approaches and their Use Cases
We go through different approaches to chatbots development. The presentation consists of a few Jupyter notebooks with code samples. We show and compare a few examples of neural networks architectures that can be used for chatbots. Based on our experience and presented architectures we give some advice on which architecture should be used where. Key Takeaways know the chatbots taxonomy and difference between each what is important to build an intelligent chatbot what kind of...

Panel: Chatbot Identity - Challenges and Possible Solutions
Chatbots are replacing humans in many domains from online sales assistants to online learning.  However, they can often be very stilted and mechanical in their interactions – how can we give a chatbot a more human persona?  As with all systems, using a chatbot involves a level of mutual trust and this depends upon identity.  How can the human be sure that the identity of the chatbot and how can the chatbot be sure of the identity of the human?  This panel will...

Panel: Regulatory Recommendations for AI

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: AMMERSEE II

Panel: Regulatory Recommendations for AI
in a recent Forbes Article ( Link ), Ivana Bartoletti described "10 regulatory recommendations for AI" the Women Leading in AI organization led by her has defined. In this session, Ivana will introduce you into the concept of this proposed regulation and how it can help us to keep AI benefits high and risks low. After Ivana´s introduction, she will discuss together with Dr. karsten Kinast and more panelists the practicability of these recommendations and how the could be globally...

The 6 Major Ethical Issues of AI

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: AMMERSEE II

The 6 Major Ethical Issues of AI
This will provide a short introduction to ethics and why it is relevant to AI.  It will outline the ethical problems that Artificial Intelligence raises.  Ethics considerations can help to better identify beneficial applications while avoiding harmful ones.  In addition, new technologies are often viewed with suspicion and mistrust.  This can unreasonably inhibit the development of technologies that have significant beneficial potential.  It will describe six areas...

AI's Ethical Problems and Blockchain's Solutions
Blockchain is, simply put, a public list. And because AI uses a list to predict things then we can see that AI and Blockchain fit nicely together. This is lucky because AI is presenting problems Blockchain helps solve. Is it fair that Facebook control the most powerful AI system on the planet -- a system built with end-user data? Blockchain helps decentralize AI and it allows users to be compensated for their data. It also allows the monetization of open source. And that's important stuff...

Panel: Integrating Ethics into AI Research, Development, and Adoption
Digital Transformation rewuires leaders to gain a new, informed perspective on the implications of technology and security on business decisions. AI driven tools lack transparency and may lead to unexpected consequences, which makes it complex to evaluate them and requires, more than ever, interdisciplinary expertise. In this panel, we will try to initiate a conversation that we haven´t really had so far, but is critical fort he success of our bsuiness and technology strategies.

Consumer Identity Management

Sessions:

Mobile Onboarding Using NFC and ePassports: The Final Step for a Digital Consumer Identity

Date: Thursday, May 16, 2019 Time: 11:00-12:00 Location: AMMERSEE II

Mobile Onboarding Using NFC and ePassports: The Final Step for a Digital Consumer Identity
Identity documents are increasingly used to verify someone’s identity online, e.g., to implement a Know Your Customer in the banking sector. Over the last year several European banks started leveraging the NFC capability of smartphones for this, including Rabobank, ING and DNB, as did the UK Home Office for the EU Settlement Scheme. Users hold their own smartphone to their ePassport to read and verify the embedded contactless RFID chip. Maarten will provide his view on why...

Panel: Consumer Identity - Delivering Value
There are new ways emerging to simplify customer journeys. These include increased security, thanks to blockchain and distributed technologies. These global technologies are of high value for underpinning cross-border commerce. What this means for consumers is that their personal identity management can now mirror their global connected digital lives. For businesses to take advantage of the new consumer identities, radical changes in customer on-boarding are needed. UX has...

So You Think You Can Two Factor
6 years. It took 6 long years, ever since the Mat Honan hack opened everyone’s eyes to the need for two factor authentication, for us to reach the point where every major company added two-factor as their solution to block account hacks. Yet the news is still full of stories about account takeovers and data breaches. What happened? Why did 2FA, as the geeks call it, not prove to be the one-stop security fix it was promised to be? The answer lies in understanding what it...

The IAM Story of Merck, Sharp & Dohme

Date: Thursday, May 16, 2019 Time: 12:00-13:00 Location: AMMERSEE II

The IAM Story of Merck, Sharp & Dohme

Develop a Strategic Advantage Through Identity Proofing
Fraudulent transactions result in lost revenue and can expose an organization to legal fines and regulatory non-compliance. In this landscape managing customer registration and enrollment rates against fraud risk requires intelligent verification tools that are adaptive to business needs. This talk covers logic to rethink digital identity, a business case for developing an identity proofing function in your IAM stack and the best practices to develop a modern identity proofing...

Panel: Consumer, Business and the Real-World Challenges in CIAM

Customer Experience & Marketing Automation

Sessions:

Balancing User Experience, Security and Privacy in SPA Applications

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: AMMERSEE II

Balancing User Experience, Security and Privacy in SPA Applications
Single Page Applications that are consumer and business facing have seen unprecedented growth. This session will cover different aspects of SPA that enhance user experience and touch upon areas which cross cuts security to spur thinking around one of the hardest problems of balancing user experience with security.

How to Deal with Mobile Apps in Single Sign-On Environments
When it comes to integrating mobile apps into a single sign-on environment, there are often conflicting interests between designers, IT security, and what the end user really wants. What is the impact of a given Login procedure to security and usability? And which approaches are proven to be functional and secure? What reasonable compromise can satisfy ease-of-use and security requirements? Key takeaways: Learn how large-scale enterprises deal with these conflicts. - How to resolve the...

BYOID Case Study at Universities - How to Utilize Social Media Identity

Date: Thursday, May 16, 2019 Time: 15:30-16:30 Location: AMMERSEE II

BYOID Case Study at Universities - How to Utilize Social Media Identity
In recent years, the types of Identities that universities have to manage, such as parents and vendors in addition to students and faculty members, are increasing. And the it will be difficult to manage these various types of identities anymore with traditional in-house ID management systems. In this session, I will introduce our customer's case of modern ID management and communication improvement utilizing the social network and BYOID. Also I will introduce about their...

Adaptive Access will Enforce both Stronger Security and Better User Experience

Intelligent Search Engine for Medical Technology Products for a Web Marketplace

Secure Customer Access: The role of ML and API Security

Date: Thursday, May 16, 2019 Time: 17:00-18:00 Location: AMMERSEE II

Secure Customer Access: The role of ML and API Security

Gamification: The Secret Ingredient of Successful CIAM Initiatives
As most EIC2019 participants will agree: consumer identity and access management (CIAM) is a key success factor in digital transformations. Still, so many CIAM initiatives never see the light of day. And when they do, success is all but guaranteed.  During this session, we will share key insights into how we use ‘The Identity Game’ to accelerate CIAM project initiation and execution leveraging the power of gamification for a.o. stakeholder engagement, business casing and...

Ensuring your (C)IAM Solution is fit for Purpose

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00