Is FIDO Ready for Enterprise Deployment?
Facebook Twitter LinkedIn

Is FIDO Ready for Enterprise Deployment?

Combined Session
Thursday, May 11, 2023 15:30—16:30
Location: A 05-06

Is FIDO Ready for Enterprise Deployment?

With the ever-increasing number of cyber-attacks, level of fines and unstable geopolitical climate, organizations are looking to better protect themselves against data breach by deploying phishing resistant authentication for their workforce.

FIDO combines the benefits of high security with a standards-based approach, but with its background in the consumer world, including privacy by design, how does it fit into an enterprise deployment with the increased demand for identity management?

This session will discuss:

  1. What do enterprises require for high-assurance credential management?
  2. How can FIDO meet these needs?
  3. Options for integrating FIDO into existing IDAM solutions

Is FIDO Ready for Enterprise Deployment?
Event Recording
Is FIDO Ready for Enterprise Deployment?
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Is FIDO Ready for Enterprise Deployment?
Presentation deck
Is FIDO Ready for Enterprise Deployment?
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Allen Storey
Allen Storey
Intercede
Allen has 30 years IT experience, including roles at Prima Software Solutions, Labinal Group and Corah Plc, with more than 20 years focusing on digital identity. As Chief Product Officer for...

What’s Next In Enterprise Authorization

As organizations undergo digital transformation to zero-trust architectures, identity-driven security becomes a critical aspect. Beyond new authentication technologies, organizations must have strong authorization controls. Today, if and when an identity is compromised, the attacker can make lateral movements with very few restrictions and access a wide range of critical systems and information. Much of this over-permissive environment can be attributed to manual permissions management processes that are hard to maintain over time. Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), which underlie these manual processes, provide a good baseline for access security. However, their complexity grows over time and the management overhead they place oftentimes subvert the very goals of security and compliance they are deployed for. Just-In-Time Access Management (JITAM) represents a new robust and secure authorization strategy that can reduce the need for periodic access certifications and manual role administration, while providing auditability. Learn how the authorization space is rapidly changing from RBAC and ABAC to JITAM, and how it could benefit your organization.

What’s Next In Enterprise Authorization
Event Recording
What’s Next In Enterprise Authorization
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
What’s Next In Enterprise Authorization
Presentation deck
What’s Next In Enterprise Authorization
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Atul Tulshibagwale
Atul Tulshibagwale
SGNL
Atul is a federated identity pioneer and the inventor of the Continuous Access Evaluation Protocol (CAEP), forming the basis of the Shared Signals and Events working group in the OpenID Foundation,...

Centralized eID May be the Target of the Next Nordstream Pipeline Attack

With the vast centralization of government digitization in general, and issuance and operation of Digital Identity services in particular, the Nordic countries have made themselves unnecessarily vulnerable to attacks by actors such as those with the resources to blow up the Nordstream pipelines in the Baltic Sea.

With the new Danish digital identity, MitID, as an example, I will discuss

  1. How governments and/or banks centrally attempt to strike a balance between vulnerability and user adoption,
  2. Why compliance and certification may only take you so far, and finally,
  3. How concepts such as wallets and Verifiable Credentials may decentralize the digital identity ecosystem not only for increased privacy but also for more robust and secure infrastructures less prone to attacks by bad actors.

Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Event Recording
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Presentation deck
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Niels Flensted-Jensen
Niels Flensted-Jensen
Criipto
Niels lives in Denmark and has worked in the identity space in the Nordics for 15+ years. He has participated in and observed the all-encompassing digitization of both government and private sector...
Subscribe for updates
Please provide your email address