Early-bird Discount
expires in
Register Now

Agenda

Examples of How to Scale Access for External Identities Successfully

Examples of How to Scale Access for External Identities Successfully

Combined Session
Thursday, June 06, 2024 14:30—14:50
Location: B 07-08
Watch the video
Log in to download presentations

Dive into real life examples of applying workforce IAM principles in CIAM. We’ll focus on adapting joiner-mover-leaver scenarios and adaptive authentication for external users, such as suppliers, distributors, brokers, customers with multiple subscription types. We’ll showcase how managing lifecycles intuitively can streamline access control, enhancing user engagement and offering personalized application usage. Ideal for CIOs and Product Managers, this session reveals a practical middle ground between intricate workforce IAM frameworks and dynamic, business-driving CIAM.

Carlo Schüpp
VP Technology Strategy & Alliances
TrustBuilder
Carlo Schüpp has a wealth of experience in security. At the beginning of this century, at the Belgian security scale up Ubizen, he built one of the first SaaS platforms in the world to analyze...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch