Social & Mobile Login

  • TYPE: Combined Session DATE: Wednesday, May 14, 2014 TIME: 14:30-15:30 LOCATION: AMMERSEE I
Track

Sessions:

While Information Security people have been rather reluctant regarding social logins, there always has been pressure from Marketing, Sales, and Business Development departments. The reasons given by InfoSec people to be more careful have been aspects such as the authentication strength and assurance of these services. Marketing on the other hand has seen this as a "must have" feature for customer convenience and to be "modern". There is a value in BYOI (Bring Your Own Identity), enabling the customer to use one ID for multiple services, avoiding redundant registration and the "password sprawl", requiring him keeping many passwords in mind. But unfortunately, social logins are not secure. New initiatives, such as the FIDO Alliance, are pushing more secure approaches for BYOI that can work with or without social logins.

Aside from information security aspects, there is another challenge, which so far has been widely ignored. It is the simple question: Is supporting social logins really good for business? Looking at the way the social networks operate and their business models, supporting social logins is about massively leaking information about your customers, leads and prospects to 3rd parties, like Facebook or Google, and through those possibly even to your competition. How does this influence your benefits / risk equation?

In this talk, Mike Small will provide a deeper look on how social logins can create competitive disadvantages and what the alternatives are to provide BYOI without the risk of leaking information to competitors.


Speaker:


In this thought leadership panel, the panelists will discuss the various options for securely enabling social and mobile logins in existing on-premise IAM infrastructures and by adding Cloud-based services. Supporting these environments is a common requirement and IT organizations have to be able to react on this. They especially must support mobile security as part of this, in the context of secure access to information (and not only by protecting devices). However, today’s approaches – namely the plumb support of social logins – will face change. Thus, the panel will also look at alternative solutions on how to support BYOI – for mobile users and others. New features of mobile devices such as NFC or integrated fingerprint readers provide new opportunities for mobile security and BYOI.


Speakers:

Ian Glazer is the VP, Identity Product Management, at Salesforce. His responsibilities include leading the product management team, product strategy and identity standards work. Prior to that, he was a research vice president and agenda manager on the Identity and Privacy Strategies team at...

Daniel has more than 15 years of experience building brands and driving product leadership. Prior to joining ForgeRock, he served as Chief Identity Strategist at Sun Microsystems. Daniel has also held leadership positions at McGraw-Hill, NComputing, Barnes & Noble and Agari. He holds a...

Don Schmidt is a Principal Program Manager in the Windows Azure Active Directory engineering team at Microsoft with over 30 years of successful software and standards development experience in security, federated identity and attribute-based access control. He is considered a trusted advisor...



Watch the video:  
Log in to download the presentation:  

Moderator:

Session Links

How to Enable Social and Mobile Login - and Beyond

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2014

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 13 - 16, 2014 Munich, Germany

Partners

The European Identity & Cloud Conference 2014 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00