Identity Standards

  • TYPE: Expert Talk DATE: Thursday, May 16, 2019 TIME: 11:00-12:00 LOCATION: WINTERGARTEN
Expert Stage III


Are you letting users login without knowing the risks associated with their account activity and user behavior? If so, you’re likely missing indicators of compromise that could help you neutralize an attack in progress. Come see how RSA SecurID® Access and RSA NetWitness® Platform correlate identity analytics to reveal hidden anomalies and outliers, and automatically thwart identity-based attacks.


“It’s okay; we’ll build it ourselves.” When discussing identity, it sounds insane, but is it? At first glance, sure; however, after four years of implementing OAuth and OpenID Connect providers for customers big and small, I can confidently say that it’s not as crazy as it seems.

Over the past few years, there has been a growing number of software developers entering the identity space, both integrating client applications and even eschewing the major identity platforms and implementing the specifications for themselves. Surely some of them must be doing something right.

In this talk, I'm going to discuss why some companies are doing it themselves, the benefits they are receiving as a result, and clear up some common misconceptions of “doing it yourself”. We’ll even see just how easy it is for developers to create an OAuth and OpenID Connect conforming platform.

Key takeaways:

1. That there are now viable alternatives to the major identity platforms
2. That software developers are now getting majorly involved with identity
3. Thatspecializing creating a standards-compliant platform can be done with little to no knowledge of the underlying standards


Scott Brady is a software developer and Pluralsight author specialising in identity and access management. Focusing on ASP.NET, Scott has increasingly found himself in undocumented territory, piecing together the facts and attempting to pass them on so that others don’t have to go through...

The data theft market is booming - and vulnerabilities in your privileged access management (PAM) infrastructure and practices open the door to a devastating breach. Learn five easy steps that enable your organization to assess the maturity of your PAM systems and processes, and take steps to tighten up security and make your business more efficient. Attend this session, hosted by One Identity, recently named a leader in KuppingerCole’s Leadership Compass report for Access Management and Privileged Access Management, to hear about innovative new approaches that can protect your organisation.


Holger Weihe is an experienced speaker on the subjects “security” and “identity and access management” (IAM and PAM). He has gained knowledge by working in various roles for over twenty-five years in consulting, solution design and project management for many national and...

Log in to download presentations:  


Session Links

Munich, Germany


European Identity & Cloud Conference 2019

Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2019 Munich, Germany