CIAM as Key Factor in the Digital Transformation
- TYPE: Combined Session DATE: Thursday, May 16, 2019 TIME: 17:00-18:00 LOCATION: AMMERSEE II
A vast part of customer access runs via APIs today. Things connect via APIs. Apps work through APIs. The standard HTML-based access through websites is not the norm anymore. APIs thus must be well-secured, starting from the authentication to continuously control what happens via APIs. Because APIs have created a new, attractive path for hackers to gain access to sensitive data, multiple methods have been invented to circumvent traditional security practices to gain access. Intelligence helps stop the most common API attacks not covered by foundational API security tools. API management tools provide an important set of security features to protect APIs. These often include authentication and rate limiting, which ensure resources are securely accessible by internal groups, partners, customers, and third-party developers. But these practices are often deficient in stopping attacks that are built specifically to breach APIs and the data and systems to which they provide access.
The prevalence of API Attacks increasing more and more, and most all go unnoticed until it is far too late. However, many have been very visible lately including recent attacks on Instagram, Verizon, and Facebook. Many of the Security and DevOps leaders we speak to will tell us they: 1. don’t know if they are under attack, 2. don't know how many APIs they have, and 3. don't have detailed visibility into API activity once authentication has occurred.
- What are the most common API attacks today
As most EIC2019 participants will agree: consumer identity and access management (CIAM) is a key success factor in digital transformations. Still, so many CIAM initiatives never see the light of day. And when they do, success is all but guaranteed.
During this session, we will share key insights into how we use ‘The Identity Game’ to accelerate CIAM project initiation and execution leveraging the power of gamification for a.o. stakeholder engagement, business casing and acquiring the priority required to make CIAM projects a success.
- How to overcome non-technical barriers to successful CIAM initiatives
- How to engage crucial, but often overlooked, CIAM stakeholders
- How to accelerate your CIAM initiatives using gamification
As your IAM deployment grows and covers increasing numbers of uses cases its vital to ensure that the business requirements continue to be met, this can lead to increased amount of testing and regression testing on each subsequent change adding significant burdens and reducing the velocity of change much ultimately prevents
* Writing user stories to describe your requirements
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 14 - 17, 2019 Munich, Germany
The European Identity & Cloud Conference 2019 is proud to present a large number of partners
How can we help you