Identity Management, IoT & Microservices

  •  TYPE: Track   DATES: May 15 - May 16, 2019
Conference Tracks

Nowadays, gaining access to almost every type of service requires a cumbersome login and authentication procedures. 
On the other side of the 'fence', enterprises are having a hard time managing these processes. The enterprise environment poses additional layers of complications when having to deal with various parties like employees, consumers, and the multitude of devices, which all need to be identified and authenticated. Dealing with these challenges requires a precise and well scalable identity and access management platform. Various new technologies, like blockchain, look promising but the reality is still different. This track will be dedicated to the strategies and implementation ways of identity management for the digital business.

In the last decade, the number of devices connected to the internet has increased sharply. More than 50 billion interconnected devices will be used by 2022. With the rising interconnectivity, the IoT and Industrial IoT devices require their own identity which can prove challenging for current IAM solutions implemented in enterprises. Not only connections between a user and the device but also among the devices themselves will have to be securely managed. Building frameworks where user-device, device-user, and device-device interactions will be treated in a similar manner, will be necessary. Could Blockchain be a solution?

Integrating Robotic Process Automation can significantly reduce costs of IAM and improve its efficiency and could be an answer to managing a huge number of identities of ever increasing 'things' on the internet. Data Privacy, security, scalability and effectiveness remain a concern.

The way how agile digital businesses are designing and delivering value through apps and services to their customers is more and more shifting to a microservices architecture pattern perfectly suited to public and private clouds. Creating new applications as a collection of small granular services instead of a monolithic software block means that they can be developed quickly and that they reflect a decentralized approach which anyway has become a trend in many security and transaction related domains.  

Microservices enable organizations to quickly respond to disruptive attacks from lean competitors on the business side, and to new risks on the cybersecurity side.



Identity for the Digital Enterprise I


Welcome to the New World of Identity for the Digital Business

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: ALPSEE

Welcome to the New World of Identity for the Digital Business
Identity is the heart of the digital enterprise and the digital economy as a whole. Social Networks, music streaming, online banking, shopping, education and (increasingly) healthcare - without a login, you will be excluded from digital life. Bring-your-own-identity (BYOID) services, blockchain based self sovereign identity (SSI), social login, post password technolgies such as FIDO - an increasing number of promising concepts, technologies and standards are trying to bridge the gap between...

Panel: How Traditional IAM Will Change Within the next 5 Years
Will traditional Identity and Access Management solutions be relevant in the next 5 years? With the increase of cyber attacks & breaches as well as the rising number of IoT devices, IAM approaches will need to adapt to the growing challenges in the increasingly interconnected world. Using advanced technologies such as Artificial Intelligence and Machine Learning as well as leveraging big data will be necessary. Companies might need to re-evaluate their thinking and approach the customer...

Making IAM Matter - The Hard Conversation

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: ALPSEE

Making IAM Matter - The Hard Conversation
All too often IAM efforts are driven by technology, lead to suboptimal value for the actual users and do not meet business needs. This presentation looks at starting IAM with the business case instead, focusing on several essential elements and using real-life experiences and good practices (some learned the hard way) to provide an illustration. The elements will include: getting to know your user, identifying a business strategy, uncovering business need and pain, and joining forces. Key...

BYOIDaaS: Automating IAM Infrastructure & Operations
IAM automation continues to progress as more and more organizations and vendors focus on making their security services consumable through self-service, APIs, and other low-cost/low-friction service delivery methods. But what is to be done about IAM infrastructure, deployments, and general operations tasks? Without paying for someone else to handle it via IDaaS? In this session Jon Lehtinen details how Thomson Reuters used containers, cloud services, & devops to build & launch a...

Panel: The Transformational Next Wave of IGA in the Enterprise
Identity governance and administration is being re-envisioned in the adoption of identity-as-a-service. While its core capabilities for access requests, provisioning, reporting, recertification etc., remain familiar, the adoption mindset in enterprises has evolved, as their use cases have evolved beyond earlier regulatory compliance drivers. The increasing sophistication of attacks and the diversity of the threat landscape has highlighted to many organizations that they should evaluate...

Identity for the Digital Enterprise II


Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: ALPSEE

Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases
Authorization has become a critical component of the Identity & Access Management landscape. Where identity lays the foundation, dynamic authorization helps ensure the right access at the right time to the right resources, ensuring secure collaboration between the IAM teams and the business. With the rapid change in business models and technology trends, it is imperative that authorization services keep pace to meet evolving requirements. This panel of experts should provide a...

Implementation of Role-Based Access Control in a Mid-sized Financial Institution
Managing accesses represents an incredible organizational challenge. The usual way is to grant rights on a case by case basis, complicating the task of security administrators, often by copying rights that similar employees currently have or had in the past. Over time, risk is that employees accumulate undue privileges or that accounts are forgotten and not deactivated, leading to a higher insider risk or account hijacking by external attackers. The risk is even higher with IT employees who...

Why Prevention No Longer Works? A New Approach Using AI for Identity Management

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: ALPSEE

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry
In these tempestuous times, Mobile Operators (MNOs) and the mobile industry are increasingly exploring ways in which they can help customers transact more safely online, and in particular through the provision of: - Authentication services - Identity claims verification (GDPR) - PSD2-compliant authorisation services - Network signals for mitigating fraud - Secure conversational commerce (chatbots) - Identity wallet/agent services This presentation will provide an update on the...

Bring-Your-Own-Identity to the Digital Enterprise
BYO-Scenarios promise borderless collaboration at low cost for employees, external staff, partners, customers and guests. We will take a brief look at these promises and do some reality-check on limitations and consequences. Key topics: Short check: Usability of Bring-your-own-Identity Compliance and some legal aspects: How much do we need to know? Some limitations given by cloud-providers and license agreements From encapsulated micro-environments to zero-trust-patterns:...

Clustering Methods Used for IAM Role Mining
Have you ever thought of a better way to do role modelling? The goal of this presentation is to show how Big Data analysis can be used to obtain a different and effective way of role modelling. Just like in traditional role mining, we take entitlement data from the source applications, but apply tools from the Big Data “world” and use these for analyzing the data. By comparing accounts and entitlements by definition of their similarity, it is possible to make a visual...

Stealing the Crown Jewels

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: ALPSEE

Stealing the Crown Jewels
Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi. This talk looks at the result from penetration testings of PAM systems at major enterprises and...

Panel: Leveraging Privileged Access Management Solutions for Enterprise
Compromising privileged accounts can lead to loss of valuable information. Therefore,  Privileged Access Management is becoming a top priority for enterprises.  Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific...

Things, Robotics & Industrial Internet


The Development of a 5G IAM Architecture

Date: Thursday, May 16, 2019 Time: 11:00-12:00 Location: ALPSEE

The Development of a 5G IAM Architecture
With the emergence of a more digitized world combined with the prospect of a broadband communication of 20 Gbps, the development of an Identity and Access Layer in 5G started with the vision of user’s identities in the center of a new value proposition. Identity as an abstraction layer in 5G bridges across domains, cross access technologies and between the network and Internet services focused on enhanced user experience as well as higher personalization of services that can only be...

Identity Across Things (and Individuals)

The T in IoT Security Stands for Human

50 Billion Identities: The Future of Humans, Corporations and Smart Things

Date: Thursday, May 16, 2019 Time: 12:00-13:00 Location: ALPSEE

50 Billion Identities: The Future of Humans, Corporations and Smart Things
By 2021, it's estimated there will be more than 25 billion IoT devices with identity. There are over 180 million businesses globally – all of these are registered with governments and have identities in financial institutions. And there are 7.6 billion humans interacting with these corporations and IoT devices in complex ways.  This talk is based on research funded by the DHS Science and Technology to explore the impact of NPE (non-person entity) identity on areas of critical...

Panel: IAM of Things
The number of IoT devices is increasing rapidly. These interconnected machines must be accessible from different networks by other machines and/or by people. Furthermore, IoT devices can be vulnerable to attacks and be the desired target on a company or home network. Considering these challenges, it is essential that the companies are deploying scalable and purpose-designed IAM solutions for these machines and that the IoT devices are designed with IAM and security capacities in mind. ...



Microservices: Why Should We Even Care?

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: ALPSEE

Microservices: Why Should We Even Care?
Microservices, like APIs a few years prior, have experienced an amazing evolution: from a fairly technical concept for designing complex applications as a collection of loosely coupled and independently deployable components organized around business capabilities, microservices have grown to become one of the hottest buzzwords in the IT industry and beyond. But what are the reasons behind this surge in popularity? In the age of digital transformation, when technologies, regulations and...

Microservices or Macro-Mess in IAM
Microservices are the next big thing. They are created in agile software development to quickly launch applications and services. Each Microservice could be considered as a single app. Within this app, the IAM is usually implemented locally. However, in an enterprise environment this can lead to a complete mess. As a result, this talk shows how to design the Microservices’ IAM to be manageable also on the macro level. Key takeaways for delegates attending your session: -  ...

Disrupting the Identity Infrastructure? The Power of Microservice Paradigms to Accelerate Complex IT Solutions

Date: Thursday, May 16, 2019 Time: 15:30-16:30 Location: ALPSEE

Disrupting the Identity Infrastructure? The Power of Microservice Paradigms to Accelerate Complex IT Solutions
In today’s connected world, businesses are competing on speed and agility to meet tremendous expectations of customers. In order to achieve this level of agility, the underlying architecture needs to be dramatically different from what we know in the past. Lean, lightweight, and rapid development and deployments have taken over the way we look at software development. Microservices are able to fulfil this promise but change also the way on how Identity and Access Management is...

Agile IAM: Microservices for Delivering a Lean, Faster and Successful IAM
IAM deployments are traditionally considered complex implementations that require significant time, effort and investment on an on-going basis to match the rapidly changing business processes and operating environment of a dynamic organization. Conventional IAM deployments are largely software implementations that over a period of time become rather complicated to the extent of being unmanageable due to the amount of customizations and the business need to honour the legacy systems and...

Securing Microservices: Not as Easy as You Might Have Expected

Date: Thursday, May 16, 2019 Time: 17:00-18:00 Location: ALPSEE

Securing Microservices: Not as Easy as You Might Have Expected
Microservice architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple languages, frameworks and IT environments. However, new architectures require new tools and technologies, and those bring in new security challenges – and new skills to learn to fight off cyber-attacks efficiently. Like with any other new technology which developers, operations and security teams are only beginning to...

Securing APIs and Microservices with OAuth and OpenID Connect
Microservices present a new way of scaling API deployments, where each component is an island, performing a small but well defined task. These systems are quicker to develop and allow for a more agile way of working. As in most designs, security is not part of the original blueprint, which can lead to expensive and hard to manage security solutions. In this talk, Travis Spencer will illustrate how OAuth and OpenID Connect can be leveraged to create a unified distributed framework for...

API Security in a Microservices World
A microservice architecture brings new challenges to API Security and careful design needs to be applied at operations and development level to ensure corporate data is properly protected from unwanted access. In this session we explain what API security encompasses,  why API security needs to be considered as early as possible in the lifecycle of the microservices, how known standards such as OAuth and OpenID Connect can be leveraged to authenticate and authorize access to...

Stay Connected

KuppingerCole on social media

Munich, Germany


European Identity & Cloud Conference 2019

Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2019 Munich, Germany


The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00