Early-bird Discount
expires in
Register Now

Agenda

Tools & Engines Choice

Tools & Engines Choice

Combined Session
Friday, June 07, 2024 10:30—11:30
Location: A 03-04

Build Your Own Authorization Server: Liberate Yourself From Vendor Limitations
10:30—10:50

Watch the video

 

In the fast-evolving landscape of digital connectivity, one of the biggest challenges service providers in highly regulated industries face today is ensuring that authentication and API authorization mechanisms are implemented correctly. At the same time, they are required to meet high expectations of customers for a seamless experience.

Traditionally, authentication and API authorization functions have been combined into one system architecture, often through a managed service provided by a vendor. However, this restricts how service providers can customize their identity and access management systems to deliver a consistent brand experience.
To thrive in the competitive environment, service providers are increasingly opting to build their own authorization servers in-house. They are taking control of their identity and access management systems to deliver a frictionless and differentiated experience.
Discover examples of how well-respected brands have built their fully compliant and secure authorization servers by offloading the protocol processing and management, accelerating the growth of their digital services.

Ali Adnan
Co-founder
Authlete, Inc.
Ali Adnan is a co-founder of Authlete, Inc. and also serves on the board of directors. For nearly 30 years, Ali has led the operation and growth of innovative technology companies in senior...
Session Integrity Prevents Account Takeover (ATO) - One Step Closer to Continuous Authentication
10:50—11:00

Watch the video

 

Rainer Witzgall, Security Evangelist @Veridium, showcases how Veridium’s Identity Threat Protection A.I. is capable of protecting valid user sessions throughout the entire session, from the first authentication to the broader SSO-experience. Veridium utilizes its groundbreaking and patented identity threat protection technologies in connection with user authentication. Rainer is convinced: “This is where continuous authentication currently sits, its current state of evolvement”. Continuous Authentication can be defined as the “Holy Grail of Identity Security,” as it is the best solution to prevent Account Takeovers.

Rainer Witzgall
CRO, Security Evangelist
Veridium
Rainer Witzgall brings over 15 years of expertise in Cybersecurity and Identity and Access Management to his role as the global Chief Revenue Officer (CRO) at Veridium. He leads the customer-facing...
Panel: Policy Engines in Practice
11:00—11:30

Watch the video

 

In this panel, we will host professionals from multiple industries who extensively use policy engines in their day-to-day jobs. We will hear from the end user's perspective what made them choose a particular policy engine over others and what important lessons they learned.

We will try to focus on use cases over the basic engine functionality and provide an in-depth comparison that will help you identify the one that works best for you.

David Brossard
Chief Technology Officer
Axiomatics AB
In his role as CTO, David drives the technology vision and strategy for Axiomatics based on both identity and access management (IAM) market trends as well as customer feedback. He also leads the...
Allan Foster
Chief Evangelist
Identity Evangelist
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of...
Sid Nagavarapu
Senior Customer Experience Manager
Schneider Electric
Sid is a Senior Customer Experience Manager - Responsible for Web platforms in Schneider Electric. Have been in identity space and exploring authorization platforms for our scale at Schneider...
Patrick Parker
Founder and CEO
EmpowerID
Patrick Parker is the founder and CEO of EmpowerID, a company specializing in Identity and Access Management for over 20 years. He pioneered the unique use of Role and Attribute-Based Access...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch