Authentication Trends and Timeline

  • TYPE: Combined Session DATE: Thursday, May 15, 2014 TIME: 11:00-12:00 LOCATION: ALPSEE


In the seemingly unending search to find the next generation of devices and methods to replace passwords as authentication mechanisms, the various x-Based Access Control (Rules, Roles, Attributes, Context, etc.) which had been projected by one pundit or another to be the “killer app”

for secure access may be getting a run for their money from wearable, biometrics-based, token issuing devices. Join us to find out what’s new and what we recommend for today’s connected agile business.


Amar Singh is Senior Analyst at KuppingerCole, an C-level executive, information risk & GRC expert, CISO, writer industry speaker leading the global information risk management landscape with an innovative, benchmark-setting and visionary approach and is engaged by organisations to help...

In this discussion we will all work together to re-invent authentication.

Why? Because the industry has been adding more and more layers of complexity to the authentication process and rather than making our environments more secure it is having the opposite effect.

Utopia is an authentication process that is simple, memorable and secure, but existing methods of identification used by the majority of organisations, all lack at least one of these vital components.

So, with this in mind what should be the basis of our brave new world? Passwords offer simple way to authenticate, but with so many it is impossible to remember them all. So, we use the same password for multiple resources and rarely if ever change them, thus compromising their security. What is more, whilst password security is relatively low-cost to implement the cost of managing password resets can be expensive, with one financial services business reporting an annual cost at £331,200.

What about hard-tokens? After all, millions of pounds have been invested in them by vendors and end-users over the years, and the mighty Google has been recently touting the future of universal hard-token. Yes these deliver a higher standard of security than a PIN or password, but they are cost prohibitive for the majority of organisations and they are far from simple, especially for the user who will inevitably need to log on when they don’t have the device to hand.

The fundamental problem with all the vast majority of authentication methods being used today is that they ask you to keep a secret, but each time you want to logon you need to give it away, which means it is no longer a secret! What is more the company stores these secrets and if they are lost or stolen such as the recent Adobe incident, the repercussions can be lasting and severe.

So, if we are going to re-invent authentication here today we are going to need to use our brains, and I mean literally. We need to look at authentication with fresh eyes. How can we use the latest advances in pattern and image recognition for example, to ensure that a secret remains a secret during the authentication process.


John Bradley is an Identity Management subject matter expert and IT professional with a diverse background. Mr. Bradley has over 15 years experience in the information technology and identity management field. Mr. Bradley advises Government Agencies and commercial organizations on the policy and...

IT security expert and respected speaker, Steven is a pioneer in the development, implementation and adoption of authentication software. He has led the development of SC Awards Europe winning, PINgrid, introducing a new generation of two factor authentication solutions that transform mobile...

Anthony Nadalin is a partner architect in the Government Engagement Team leading the Standards and Public Policy practice. Anthony had spent the last 27 years with IBM where he was the Chief Security Architect responsible for the security strategy for software group products. Anthony...

I've worked in the digital identity space for 17 years, and I was involved in creating some of the early products in the market. At iC Consult, I direct a team of seasoned professionals to work on cutting-edge projects related to digital identity. At Oracle, I was responsible for strategic...

Bart has worked for VASCO since 1998 and has served in different roles within the company. He started by building the Customer Services department and was responsible for all pre- and post-sales activities at VASCO. After that he switched to a sales position heading the company’s...

Watch the video:  
Log in to download the presentation:  


Session Links

Do We Need to Put Secrecy Back in to Security?


European Identity & Cloud Conference 2014

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 13 - 16, 2014 Munich, Germany