Early-bird Discount
expires in
Register Now

Agenda

Zero Trust Identity

Zero Trust Identity

Combined Session
Thursday, June 06, 2024 14:30—15:30
Location: A 03-04
Log in to download presentations

Zero Trust Network Access - Microsoft New Security Service Edge Solution
14:30—14:45

Watch the video

 

During this Session you will learn how Microsoft is closing gaps in the Zero Trust area and how SSE can help you to reduce operations and process capacities and heavily improve Security. Additional we look into a future without a VPN solution and see how this can be modernise.

Tim Stock
Cloud Solution Architect Security
Microsoft
As a Cloud Solution Architect within the Security, Compliance and Identity Area, Tim is leading the security footprint in Germany for the financial sector and design the next generation of Security...
Automating Security Checks on AWS - A Deep Dive into Preventing Privilege Escalations
14:45—15:00

Watch the video

 

When moving to the Cloud, and especially AWS, common Identity Management functionality as found in on-premise tools have limited impact on securing your AWS environment, as many new types of access to a plethora of AWS resources for an overwhelming number of users need to be managed. Luckily, AWS provides a very detailed and granular model of roles and predefined policies to define who (or which entity) may be granted to access to which object. All done - right? Unfortunately, either through lack of insight to actual role entitlements or by large number of relations, control over the infrastructure is easily lost. The talk introduces a new way to quickly gain back overview and identify threats lingering deep inside this jungle and how to mitigate them quickly!

Manuel Benz
Chief Technical Officer
CodeShield
As the Chief Technical Officer and Co-Founder of CodeShield, Manuel Benz spearheads efforts to strengthen IAM privilege escalation detection in cloud infrastructures. In his academic journey at...
Sebastian Rohr
CTO
umbrella.associates GmbH
While Sebastian has been known as author of multiple articles, reviews and essays on all kinds of Identity and Security topics, he has more recently made a name for himself as being the...
Overcoming Passwords and Legacy: The Future of Customer Identity
15:00—15:15

Watch the video

 

The face of customer identity has changed completely over the years. While legacy systems such as password-based authentication and SAML continue to be present in the market, more modern specifications such as OpenID Connect and FIDO2 are quickly gaining ground and powering unique use cases that enterprises require today.

In this session, Descope Co-Founder Meir Wahnon will:

  • Highlight the changing customer identity needs facing today’s enterprises
  • Share popular use cases of modern protocols like OIDC and FIDO2
  • Provide tips on how customer identity can be an enabler for business teams
Meir Wahnon
Co-Founder
Descope
Meir is a co-founder at Descope, a drag-and-drop customer authentication and identity management platform. Before Descope, Meir served as Sr. Director of Engineering at Palo Alto Networks after the...
From Shadow to Light: AI-Based Approach to Deal With Shadow Admins
15:15—15:30

Watch the video

 

In this talk, we will dive into a common headache for identity teams: shadow admins. These are users who, thanks to some mix-ups in permission settings, end up with admin powers they shouldn't have. The “traditional way” of dealing with shadow admins is mapping all of them and letting the identity team decide what to do with it. This approach can work only if the number of shadow admins is small, however, our research, that is based on data of more than 50 organizations, reveals that in most of the big organizations there are hundreds of shadow admins and sometimes even more.

We will present a novel method that not only finds the shadow admins, but also recommends the identity team which permissions should be revoked to mitigate as many shadow admins as possible. For instance, we discovered that in most organizations more than 70% of the shadow admins can be resolved by revoking one single permission. Our method is based on algorithmic tools and AI. We will share the core concepts of it and show a few real-life examples.

Sameer Makladeh
Senior Data Scientist
Silverfort
Sameer is experienced data scientist holding a B.Sc. in Industrial Engineering and Information Systems from the Technion and a M.Sc. in Industrial Engineering from SCE, contributing to...
Gal Sadeh
Principal AI researcher
Silverfort
Gal is the principal AI researcher of Silverfort. He is responsible for big data analytics and developing AI engines. He joined Silverfort after working as a data scientist at CyberBit. Prior to...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch