The Journey to Decarbonization and the Role of Digital Identity
Facebook Twitter LinkedIn

The Journey to Decarbonization and the Role of Digital Identity

Combined Session
Friday, May 12, 2023 10:30—11:30
Location: A 05-06

The Journey to Decarbonization and the Role of Digital Identity

In this session, we will explore how technology is playing a crucial role in decarbonization efforts. We will discuss how Customer Identity and Access Management (CIAM) can enable digital transformation and support the energy transition. Additionally, we will delve into the benefits of using Centralized Entity Management to provide customers with a single ID across all digital channels, improving the user experience and enabling personalized interactions. Finally, we will emphasize the importance of a secure customer journey and persona composition to protect sensitive data, ensure customer trust and regulatory compliance, such as GDPR. Join us to learn how these key components can help drive a sustainable and customer-centric future.

Learn about:

The Journey to Decarbonization and the Role of Digital Identity
Event Recording
The Journey to Decarbonization and the Role of Digital Identity
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
The Journey to Decarbonization and the Role of Digital Identity
Presentation deck
The Journey to Decarbonization and the Role of Digital Identity
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Heiko Klarl
Dr. Heiko Klarl
iC Consult
Dr. Heiko Klarl has been in Identity and Access Management for more than fifteen years. He is driven by the motivation to bridge the gap between business and IT in order to create holistic...

Real-time Fraud Detection - Challenges and Solutions

Fraud can be considerably reduced via speed, scalability, and stability. Investigating fraudulent activities, using fraud detection machine learning is crucial where decisions need to be made in microseconds, not seconds or even milliseconds. This becomes more challenging when things get demanding and scaling real-time fraud detection becomes a bottleneck. The talk will address these issues and provide solutions using the Hazelcast Open Source platform.

Real-time Fraud Detection - Challenges and Solutions
Event Recording
Real-time Fraud Detection - Challenges and Solutions
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Real-time Fraud Detection - Challenges and Solutions
Presentation deck
Real-time Fraud Detection - Challenges and Solutions
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Fawaz Ghali
Fawaz Ghali
Hazelcast
Fawaz Ghali is a Principal Developer Advocate at Hazelcast with 20+ years of experience in software development, machine learning and real-time intelligent applications. He holds a PhD in Computer...

Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management

Companies are facing increasingly complex security threats. Many are struggling to assess their own security risks due to an inability to address potential issues as they arise, due to the breakneck pace at which issues are disclosed, and teams' ability to address said issues as they accumulate and because the huge number of security tools in use create diagnostic fatigue. 

Vulnerability management programs rarely ever match the overall scale of the organization, boosting the number of potential points of exposure. What's more, besides vulnerabilities, attackers are increasingly leveraging exposures such as misconfigurations and stolen credentials to gain access to companies' core business. Because of this, attack paths to critical assets are often overlooked or identified too late.

Instead of looking at vast numbers of isolated issues, XM Cyber aggregates them into an attack graph to proactively identify hidden attack paths and weaknesses in both the cloud and on-premises. XM Cyber helps organizations efficiently address the issues that can have the greatest impact on organizational risk. Then teams can eliminate attack paths at critical junctures, i.e., choke points, in order to achieve ultra-efficient risk remediation.

Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Event Recording
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Presentation deck
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Tilman Epha
Tilman Epha
XM Cyber
Tilman Epha is Sales Director for Germany, Austria and Switzerland at XM Cyber, based in Munich. Tilman Epha has been working in the IT industry for more than 23 years. After studying economics in...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address