Identity & Security of Things
Facebook Twitter LinkedIn

Identity & Security of Things

Combined Session
Thursday, May 16, 2019 11:00—12:00
Location: ALPSEE

The Development of a 5G IAM Architecture

With the emergence of a more digitized world combined with the prospect of a broadband communication of 20 Gbps, the development of an Identity and Access Layer in 5G started with the vision of user’s identities in the center of a new value proposition. Identity as an abstraction layer in 5G bridges across domains, cross access technologies and between the network and Internet services focused on enhanced user experience as well as higher personalization of services that can only be achieved through a user-centric approach shifting the view from the subscriber to the user.
This presentation will cover the background, including the various use case defined by multiple industry organizations, requirements, and technical development of 5G to enable this fundamental shift in next-generation cellular system to unlock the potential of what 5G can deliver.

The Development of a 5G IAM Architecture
Presentation deck
The Development of a 5G IAM Architecture
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Bjorn Hjelm
Bjorn Hjelm
Verizon
Bjorn Hjelm is a Distinguished Member of Technical Staff in Verizon Corporate Technology organization with over 20 years of experience in network planning, architecture, and implementation of...

Identity Across Things (and Individuals)

Gillan Ward
Gillan Ward
ID Crowd
Gillan is an expert in identity and trusted data who provides thought leadership, advisory services, and expert support to clients. He helps organisations to meet their objectives by ensuring they...

The T in IoT Security Stands for Human

The T in IoT Security Stands for Human
Presentation deck
The T in IoT Security Stands for Human
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Tom Hofmann
Tom Hofmann
Eniwa AG
Tom Hofmann is the CISO & CDPO at Eniwa and a cyber-security enthusiast with a passion for innovation.  For the last 18 years, he implemented projects from the Finnish polar circle to the...
Subscribe for updates
Please provide your email address