Prime Discount
expires in
Register Now

Agenda

Securing the Digital Frontier

Securing the Digital Frontier

Combined Session
Thursday, June 06, 2024 11:00—12:00

Multi Region - Multi Hyperscaler: The Crucial Role of Identity Providers in Modern IT Architecture and How to Ensure Their Availability
11:00—11:30
 

In a modern Zero Trust based IT architecture, the IDP is one of the most central components and therefore one of the most critical ones.

As all the requests within the network need to be authenticated, its robustness directly correlates with the overall integrity and continuity of digital and therefore-business operations.

Not only the availability but also low latency is key in global distributed ecosystems.

As experience has shown, one hyperscaler can’t guarantee this high demand in availability on its own.

To fulfill all these needs from businesses, applications and corporate we – together with our partners – came up with an multi region - multi hyperscaler architecture.

This talk will provide insight into the design, benefits, and drawbacks as well as the journey we have taken to reach this goal.

Dr. Heiko Klarl
Chief Marketing and Sales Officer
iC Consult
Dr. Heiko Klarl has been in Identity and Access Management for more than fifteen years. He is driven by the motivation to bridge the gap between business and IT in order to create holistic...
Stephanus Rieger
Product Owner
BMW AG
Stephanus Rieger is an accomplished Product Owner at BMW AG, responsible for Identity and Access Management (IAM) products and services. With over a decade of experience in the field of...
Beyond the Surface: The Dark Side of Digital Identity
11:30—11:45
 

In the digital age, identity has transcended personal identification, evolving into a complex digital footprint that is as unique as it is vulnerable. This session focuses on the multifaceted and often hidden threats that lurk within digital identity to unravel the digital threats that individuals and organizations face in today's interconnected world.

We will explore the mechanics and implications of various threat vectors, including the insidious rise of bot attacks, the complexities of fraud, the nuances of credential stuffing, the emerging menace of synthetic identity fraud, and the impact of Generative AI to provide an understanding of how these threats operate and interconnect. 

Our journey will take us through real-world scenarios and case studies to illustrate the technical aspects of these threats and their real-time impact on businesses and individuals, and to extract key lessons and insights. We will also look at proactive strategies and innovative solutions to combat these threats and safeguard digital identities. 

Targeted at professionals, enthusiasts, and anyone vested in the digital identity ecosystem, this session promises to be an eye-opener, challenging conventional perceptions and encouraging a deeper understanding of what lies beneath the surface of digital identity. 

Join us as we explore the dark side of digital identity, where unseen threats pose unseen challenges. 

Ashish Jain
Chief Technology Officer
Arkose Labs
is a product leader with 25+ years of experience, strong engineering background, and deep expertise in identity, security, and consumer fraud. He is the Chief Technology Officer at Arkose Labs...
Bridging Frontiers: The Synergy of Intelligent SIEMs in Unifying Identity, Cloud Security, and Advanced Threat Detection
11:45—12:00
 

Bridging Frontiers: The Synergy of Intelligent SIEMs in Unifying Identity, Cloud Security, and Advanced Threat Detection 

Traditional security information and event management (SIEM) solutions are often associated with high deployment and operating costs, as well as an inability to identify and respond to threats effectively in the cloud and mobile computing era.  

Join this session to find out why the latest generation of SIEMs, examined in KuppingerCole’s 2024 Leadership Compass on Intelligent SIEMs, are ensuring that SIEMs are still essential to the cyber defense of organizations.  

We will look how these solutions are enhancing IAM, how they are providing insights into user behavior, and how they are extending traditional SIEMs to monitor cloud-based assets.  

This session will also summarize the findings of the I-SIEM Leadership Compass, highlighting areas of current and future innovation to show that I-SIEMs are powerful toolthat can bridge the gap between identity management, cloud security, and effective threat detection 

Warwick Ashford
Senior Analyst
KuppingerCole
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist...
Secure your ticket
Be quick before the Prime Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch