Customer Experience - Best Practices
Facebook Twitter LinkedIn

Customer Experience - Best Practices

Combined Session
Thursday, May 16, 2019 15:30—16:30
Location: AMMERSEE II

BYOID Case Study at Universities - How to Utilize Social Media Identity

In recent years, the types of Identities that universities have to manage, such as parents and vendors in addition to students and faculty members, are increasing. And the it will be difficult to manage these various types of identities anymore with traditional in-house ID management systems.
In this session, I will introduce our customer's case of modern ID management and communication improvement utilizing the social network and BYOID. Also I will introduce about their challenges such as digitization of degree information, password-less onboarding using Blockchain technology.

Key takeaways

1. Best practice of managing various identities at universities with BYOID approach.
2. Best practice of improving communication between organization and students, parents, facilities using social network tools.
3. Challenges of utilize Blockchain for digitization of degree, and password-less onboarding.

BYOID Case Study at Universities - How to Utilize Social Media Identity
Presentation deck
BYOID Case Study at Universities - How to Utilize Social Media Identity
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Naohiro Fujie
Naohiro Fujie
Itochu Techno Solutions
Naohiro Fujie, General Manager at ITOCHU Techno-Solutions Corporation(CTC),  has spent more than 20 years in the IT industry and primary focused on Digital Identity. Since 2021, he has been...

Adaptive Access will Enforce both Stronger Security and Better User Experience


The trustlevel of an identity should meet the trustlevel of the requested access. That means that both the trustlevel of the requester and the required tustlevel of the access requested must be defined. MFA alone is not enough.

The trustlevel of an identity can on one hand be based on trust in an IdP and an Authentication Provider, and on the other on the context of the requester, sucg as location, time, device used. Conditional Access and Multifactor Authentication are technical controls for defining the trustlevel of an access requester. But adaptivity is more than just the context of an identity. Access Policy Management is where the magic happens.
In this presentation we show the concepts behind AdaptAcc and provide a structured method for implementing the solutions.

Key takeaways:

  • The trustlevel of an identity should meet the trustlevel of the requested access.
  • Both trustlevels cannot be met by MFA alone
  • AdaptAcc is concerned about velivering both enough security and a good user experience

Adaptive Access will Enforce both Stronger Security and Better User Experience
Presentation deck
Adaptive Access will Enforce both Stronger Security and Better User Experience
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
André Koot
André Koot
Nixu Cybersecurity
André Koot has more than 25 years of experience in the field of information security, and as an economist he practices this from a business point of view. The last 15 years he specializes in...
Michiel Stoop
Michiel Stoop
Philips
Michiel Stoop is since 2015 Director Identity and Access management in Philips Group Security – Information Security and has over 10 years’ experience in the domain Identity and Access...

Intelligent Search Engine for Medical Technology Products for a Web Marketplace

Dr. Hans-Peter Güllich
Dr. Hans-Peter Güllich
Dydon AG
Dr. Guellich is the founder and CEO of Dydon AG a Swiss based leading provider of bespoke market information for an active Risk & Compliance Management utilising latest Artificial Intelligence...
Subscribe for updates
Please provide your email address