Secure Identity, Cybersecrurity & Blockchain

  •  TYPE: Track   DATES: May 15 - May 16, 2019
Conference Tracks

With the growing number and new vectors of cyber attacks, identity and access management is taking a center stage and is becoming a new defence outline. Furthermore, increased number of connected devices and employee mobility are making the job of cybersecurity professionals more difficult. In this context, only perimeter-based safeguarding measures are no longer meeting the security needs and implementation of adequate IAM and cybersecurity tools is necessary. Identity-based technologies like User Behavior Analtics can help in identifying anomalous behavior and detect internal and external threats. By utilizing a combination of already existing IAM, authentication and other technologies, Zero Trust security approach is also gaining popularity.

Blockchain Technology is promising solution for digital identities, enterprise resource planning (ERP), supply chain management and more. Distributed Ledger Technology (DLT) makes Self Sovereign Identities (SSIs) possible, where individuals can keep control of their digital identity and share it whenever they want with whoever they want. Furthermore, it can help large companies in having better transparency and security. Blockchain as a Service is already gaining some traction. Several SSI concepts as well as number of commercial products are being offered on the market already. It remains to be seen how scalability, governance questions and future privacy regulations affect wider adoption of DLT.

Moderators:

Tracks:

Secure Identity I

Sessions:

Identity Is at the Center of Zero Trust, Not the Network

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: CHIEMSEE

Identity Is at the Center of Zero Trust, Not the Network

Panel: Placing Identity at the Center of Security Designs & Models
What does it mean to have identity at the center of your security infrastructure? At its core, it says that we have to build our solutions to always question who someone is, what they want to do. We can no longer blindly trust that just because they come from a known location those questions no longer matter. At the center of those questions is a critical concept: identity. At the center of those questions is one crucial idea: identity. Our solutions must continually validate the identity...

Harness Your Identity Analytics to Deliver Contextual Authentication

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: CHIEMSEE

Harness Your Identity Analytics to Deliver Contextual Authentication
Identity Analytics (IdA) has experienced tremendous growth within the cybersecurity community. Most of the work has focused on data mining to analyze existing user rights to reduce over-provisioning and improve privileged access management systems. But what about authentication systems that must make decisions using dynamic data that is created in real-time? Steve “Hutch” Hutchinson, GE’s Principal Cybersecurity Architect, will show how you can leverage your own hidden...

Panel: Transforming Secure Access to be Intelligent
When it comes to making access decisions, it’s all about acting smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Access provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a...

Secure Identity II

Sessions:

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: CHIEMSEE

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition
The complexity and sophistication of modern malware are evolving rapidly. Malwares today are able to exploit both hardware and software to infiltrate systems and tamper with data used for management. The revelation of several attacks on host machines, highlights that anything with shared resources can be attacked.  In cloud environment, data management is done by a centralised server that maintains the state of each platform. However, this is not...

Navigating NIST Sp-800-63-3 Thanks to Practical xAL Cheat Sheets
Trust. Trust is the most fundamental notion in every one of our business interactions, whatever our needs are: low or high assurance. Do you know that, by June 2019, NIST SP-800-63-3 will celebrate its second birthday? It is a framework that improved lots of points over the previous LoA scale and gained a lot of maturity thanks to implementers, researchers, and confrontations to other Trust frameworks. Still you may find it hard to find your way wherever you try to be a compliant IAL2...

Fight Cyber Risks with Risk Aware DevOps Engineers!
To keep a customer’s trust risk and security is key for Financial Enterprises like ING. At the same time we want to work Agile in an BizDevOps format, because we know it gives us the increased velocity and quality of software we need. And this way of working leads to happier and therefore more productive employees. A separate security team that has to check all software before it goes into production would be a huge bottleneck, especially if you have...

The Anatomy of an IAM Cyber Kill Chain

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: CHIEMSEE

The Anatomy of an IAM Cyber Kill Chain
In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to...

The POWER HACKER – Don’t Let the Lights Go Out – A Look Inside the MIND of a Hacker
Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes. This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to...

At the Intersection of API Security, Cybersecurity and IAM: the Next Wave of Intelligent Solutions
Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of...

Common Sense in the World of Cloud Governance and Security

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: CHIEMSEE

Common Sense in the World of Cloud Governance and Security
Planning for security and governance is essential for building robust cloud environments! Join Microsoft Azure MVP Thomas Janetscheck for this session to learn about how to secure Azure environments and how to circle around snares. We will first focus on cloud governance, what it is and why you need it and then dive deep into Azure Security Center, an AI and ML-based solution for securing IT infrastructures in the cloud and on premises. After this session you will have a good understanding...

Panel: How Cloud Access Control Enables Innovation & Security In the Digital Age
The transformation of the digital business world requires moving forward to new technologies and shifting the focus to agile and flexible environments. As the number of digital identities rises, the need to protect and manage how personal information is collected, used and distributed is higher than ever. Security technologies such as IoT, cloud access control, user behaviour analytics, multifactor authentication, and mobile threat defence are on the rise. Obtaining the cloud is not only...

Blockchain (Identity) I

Sessions:

Self-Sovereign Identity - We've Had It for Thousands of Years. so What's New?

Date: Thursday, May 16, 2019 Time: 11:00-12:00 Location: CHIEMSEE

Self-Sovereign Identity - We've Had It for Thousands of Years. so What's New?
Self-sovereign identity isn't new. It's just a new term. People having been carrying credentials around to prove who they are for thousands of years. When we entered the digital age, something weird happened. Our digital credentials became locked up inside databases owned by corporations and governments. We couldn't get at them, and instead had to get by with vastly inferior usernames and passwords.  Compared with physical passports, driving licenses or even business cards, today's...

An Identity Metasystem
In 2005, Kim Cameron proposed something called an identity metasystem that would serve as the infrastructure for the many context-specific identity systems we have. Such an identity metasystem would not only allow these various identity systems to interoperate but would, importantly, unify the user experience to ensure people were an integral part of the identity exchange and understood what was happening. Now, in 2019 we are on the verge of finally realizing this dream. This talk will talk...

Panel: Current Developments in Blockchain Ecosystem for Digital ID
The convergence of digital identity and blockchain technology has caught the imagination of governments, enterprises and developers around the world. Lots of approaches are being tried. But it only works if it all works together. The world needs a digital standard that is as ubiquitous as paper is in the physical world. We need the SMTP of identity that everyone can use, that is open and non-proprietary. This panel will be enlighten the audience about the development efforts that are under...

Why Governments are Still Important Even in a Self-Sovereign Context

Date: Thursday, May 16, 2019 Time: 12:00-13:00 Location: CHIEMSEE

Why Governments are Still Important Even in a Self-Sovereign Context
It’s always been true that identity is more to do with what other people say about you than what you say about yourself. Placing the user in control of their online identity means that we need the ability to reference authoritative sources of data related to those individuals. If we are to build that user centric and much needed version of Digital Identity then Self-sovereign identity, and its more modest Self-managed form, will need the support of Governments and...

Do People Really Want to Be in Charge of Their Identity?
Shared Ledger Technology is increasingly mature, but remains a relatively under-deployed technology in the digital identity space. The emergence of self-sovereign identity approaches, underpinned and powered by shared ledgers, offer new and exciting solutions to establishing digital identities. As both technologies gain greater mainstream focus, will the combination of the two approaches unlock genuinely consumer-focused identity solution? Moving away from large centrally managed...

Self-Sovereign Identity: A New Dawn for Shared Ledger Technologies?

Blockchain (Identity) II

Sessions:

Revolutionizing How We Buy, Price, and Create Value for One Another

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: CHIEMSEE

Revolutionizing How We Buy, Price, and Create Value for One Another
We present you with a comprehensive look into the future of commerce, encompassing the $5 trillion e-commerce and brick and mortar sectors. Our world will be defined by a decentralized platform in which customers will wield and monetize their personal data and behaviors. We discuss the details of how self-sovereign identity will enable dialogue between retailers and their individual customers. This "conversation" is at the core of how we will create value for one another. It will allow...

You Can’t Do PII on a Blockchain, so What Then Is It Good for in Identity?
Many viewpoints of the applicability of blockchain for consumer identity have been expressed. In particular, some express doubt about the viability of being able to reconcile GDPR’s right-to-be-forgotten with the immutable nature of blockchain. This is in fact true. However, there are still ways that blockchain can increase transaction integrity while also providing privacy-by-design leadership. Come join this session to learn about how blockchain is being used in the Canadian model...

A Macroeconomic Perspective on Blockchain
The Macro-Economic perspective of how Blockchain has potentially influenced various industries in a specific European Country. I could present various analyses that we are currently conducting, which includes and empirical analysis, cluster analysis, and a scenario analysis. With these results, it will help us to gain insight on what types of influences that Blockchain has had on the industry and potential future insights.  We are working on this study with the European Blockchain...

Creating Rich, Valuable Credentials for People

Date: Thursday, May 16, 2019 Time: 15:30-16:30 Location: CHIEMSEE

Creating Rich, Valuable Credentials for People

Third Party Risk Management with Decentralized Identity & Verifiable Credentials
In regulated industries the dependency on suppliers for raw materials and services is very high, especially since there is little flexibility to switch away from qualified suppliers on short notice. Thus the concept of “Knowing your Supplier” is key for a reliable supply setup. This takes on even greater importance with the growing awareness of ethical, environmental and labor policies of individual supply chain partners. This presentation examines how Decentralized Identity and...

Managing Self-Sovereign Identities (a Relying Party Perspective)

Date: Thursday, May 16, 2019 Time: 17:00-18:00 Location: CHIEMSEE

Managing Self-Sovereign Identities (a Relying Party Perspective)
As the groundswell around the Self-Sovereign Identity (SSI) movement grows, it's important to consider what impacts it may have on existing businesses that want to adopt and support this new model of dealing with Identity. This talk will walk through the identity life-cycle at a relying party and discuss impacts and changes necessary to support SSI identities. Key takeaways: How the SSI model differs from current practice for Relying Parties Decisions Relying Parties should...

DID Resolution & DID Authentication
Decentralized Identifiers (DIDs) are a key building block of the emerging Self-Sovereign Identity (SSI) ecosystem. They are a new kind of identifier: Persistent, cryptographically verifiable, resolvable, and of course decentralized, i.e. independent of any central authority or intermediary. In this talk we will explore how DIDs function internally, how they can get registered and resolved, and how they can be used for authentication purposes (DID Auth). The talk will also give an update on...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00