Implementing Identity-First Zero Trust
Facebook Twitter LinkedIn

Implementing Identity-First Zero Trust

Combined Session
Wednesday, May 10, 2023 12:00—13:00
Location: A 03-04

Architecting Identity-First Zero Trust Implementations

Zero Trust starts with Identity. It ends with authorization. And it is centered around policy-based controls for authentication, access, and more. IAM is ubiquitous in Zero Trust. Thus, every Zero Trust implementation must follow an identity-first approach.

In this session, we look at the intersection of IAM and Zero Trust, and provide a mapping of IAM capabilities to Zero Trust requirements. We also look at the need for modern IAM, from adaptive, passwordless authentication to continuous authentication, ITPR (Identity Threat Detection and Response), PBAM (Policy Based Access Management), but also Data Governance and the intersection of IAM and Code Security. This will help you in aligning your IAM and ZT strategies and give you a concrete understanding of technologies you will need (or not).

Architecting Identity-First Zero Trust Implementations
Event Recording
Architecting Identity-First Zero Trust Implementations
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Architecting Identity-First Zero Trust Implementations
Presentation deck
Architecting Identity-First Zero Trust Implementations
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...

Security Offered as Components Empowering Enterprises to Gain Control

You often think service providers should build identity and API security infrastructure by themselves to have full control and flexibility so that it can fit into their business and technology stack. But it tends to be time consuming and costly due to lack of expertise to do so. Buying a heavy-weight solution is another considerable option, but it reluctantly leads dependency on the particular vendor of the solution, which may have redundant features and may not accommodate to customize in a cost-effective and timely manner. In this session, we will discuss a third option to “buy and build” that can combine the best of both worlds and give you control by building from scratch, as well as minimize the time and resource by leveraging “Identity Components as a Service.”

Security Offered as Components Empowering Enterprises to Gain Control
Event Recording
Security Offered as Components Empowering Enterprises to Gain Control
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Security Offered as Components Empowering Enterprises to Gain Control
Presentation deck
Security Offered as Components Empowering Enterprises to Gain Control
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Ali Adnan
Ali Adnan
Authlete
Ali Adnan is Co-Founder of Authlete Inc., a pioneer in providing OAuth 2.0 and OpenID Connect implementation as a service, deployed by the world’s largest digital bank in Brazil and a...
Tom Bruggeman
Tom Bruggeman
DPG Media
Tom is working as an IT Area Manager for DPG Media. As part of his role he manages a number of development teams, one of which is the Identity team responsible for development and rollout of DPG's...
Don Thibeau
Don Thibeau
OpenID Foundation
Don Thibeau serves on the Board of the OpenID Foundation, a non-profit, standards development organization committed to international interoperable technical standards. He was OIDF’s...

FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication

By now, organizations are well aware of the need for better protecting data and application with modern access management and authentication.
Thales and Microsoft partner to help organizations going passwordless to fight against phishing attacks. Thales and Microsoft experts Sarah Lefavrais and Thomas Detzner will talk about the role of Fido and other phishing resistant authentication methods like CBA in achieving Zero Trust approach.

FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Event Recording
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Presentation deck
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Thomas Detzner
Thomas Detzner
Microsoft
Thomas Detzner is a Principal Product Manager on the customer success team in the Microsoft Identity and Network access divisions Identity Architecture team. He spends most of his time working with...
Sarah Lefavrais
Sarah Lefavrais
Thales
Sarah Lefavrais leads technology alliances within Thales’s IAM product marketing team. For the past several years, she has been fully involved in the Go to Market activities of Thales...

Orchestrating Zero Trust - "Detect, Decide, Direct"

The Zero Trust paradigm, the approach of eliminating inherent trust in an IT architecture and always verifying, has been discussed for over a decade. It is well known that Zero Trust is a team sport, with Identity in the center. The many components, from IGA to Device Management, Network-segmentation to contextual awareness and beyond can be fulfilled by as many vendors, bearing the question about how to integrate these for a secure and convenient user experience. While there may be integrations available for some components, they will most likely be disjointed and/or require custom development, making it a challenge to be agile and innovative.

An alternative to the described problem would be Orchestrating Zero Trust, applying the approach of "Detect, Decide, Direct". Through Orchestration the task of gathering all signals and relevant information (Detect) for an appropriate authorization decision (Decide), and continuing with the proper next step(s) (Direct) can be fulfilled in a flexible manner, facilitating customization in a future proof manner.

In this session we will describe the "Detect, Decide, Direct" approach and see how Orchestration can be a key enabler of Zero Trust.

Orchestrating Zero Trust -
Event Recording
Orchestrating Zero Trust - "Detect, Decide, Direct"
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Orchestrating Zero Trust -
Presentation deck
Orchestrating Zero Trust - "Detect, Decide, Direct"
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Mehmet Yaliman
Mehmet Yaliman
Ping Identity
After studying Bioinformatics, Mehmet found himself as a developer, and shortly thereafter he changed his focus to the Identity space, where has been working for over a decade now, spending time in...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address