Identity Standards
Facebook Twitter LinkedIn

Identity Standards

Expert Talk
Thursday, May 16, 2019 11:00—12:00
Location: WINTERGARTEN

How to Put Identity Analytics into Action

Are you letting users login without knowing the risks associated with their account activity and user behavior? If so, you’re likely missing indicators of compromise that could help you neutralize an attack in progress. Come see how RSA SecurID® Access and RSA NetWitness® Platform correlate identity analytics to reveal hidden anomalies and outliers, and automatically thwart identity-based attacks.

Ingo Schubert
Ingo Schubert
SecurID an RSA Company
Ingo Schubert joined RSA almost two decades ago and dealt with cryptographic toolkits and PKI until he discovered the identity and access management parts of RSA’s portfolio. His main...

Open Source Identity: Building Your Own Enterprise Identity Platform

“It’s okay; we’ll build it ourselves.” When discussing identity, it sounds insane, but is it? At first glance, sure; however, after four years of implementing OAuth and OpenID Connect providers for customers big and small, I can confidently say that it’s not as crazy as it seems.

Over the past few years, there has been a growing number of software developers entering the identity space, both integrating client applications and even eschewing the major identity platforms and implementing the specifications for themselves. Surely some of them must be doing something right.

In this talk, I'm going to discuss why some companies are doing it themselves, the benefits they are receiving as a result, and clear up some common misconceptions of “doing it yourself”. We’ll even see just how easy it is for developers to create an OAuth and OpenID Connect conforming platform.

Key takeaways:

1. That there are now viable alternatives to the major identity platforms
2. That software developers are now getting majorly involved with identity
3. Thatspecializing creating a standards-compliant platform can be done with little to no knowledge of the underlying standards

Open Source Identity: Building Your Own Enterprise Identity Platform
Presentation deck
Open Source Identity: Building Your Own Enterprise Identity Platform
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Scott Brady
Scott Brady
Rock Solid Knowledge
Scott Brady is a software developer and Pluralsight author specialising in identity and access management. Focusing on ASP.NET, Scott has increasingly found himself in undocumented territory,...

Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program

The data theft market is booming - and vulnerabilities in your privileged access management (PAM) infrastructure and practices open the door to a devastating breach. Learn five easy steps that enable your organization to assess the maturity of your PAM systems and processes, and take steps to tighten up security and make your business more efficient. Attend this session, hosted by One Identity, recently named a leader in KuppingerCole’s Leadership Compass report for Access Management and Privileged Access Management, to hear about innovative new approaches that can protect your organisation.

Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program
Presentation deck
Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Holger Weihe
Holger Weihe
One Identity
Holger Weihe is an experienced speaker on the subjects “security” and “identity and access management” (IAM and PAM). He has gained knowledge by working in various roles for...
Subscribe for updates
Please provide your email address