Identity Fabric

Video

Unify Identity and Security to Block Identity-Based Cyber Attacks

Join security and identity experts from KuppingerCole Analysts and ARCON as they discuss the importance of securing enterprise credentials, explain why a unified identity security approach in line with Zero Trust principles improve security and efficiency, and describe how to combine…

Video

A Winning Strategy for Consumer Identity & Access Management

Success in digital business depends largely on meeting customers’ ever-increasing expectations of convenience and security at every touchpoint. Finding the best strategy to achieve the optimal balance between security and convenience without compromising on either is crucial, but can…

Video

Live Q&A and Discussion - Introduction to Identity Fabrics

Video

Live Q&A and Discussion - Identity Fabrics 101

Video

Introduction to Identity Fabrics

Video

How to Move from Legacy IAM to Future-Proof Identity Fabric

As enterprises adopt new ways of collaboration and working, the area that has seen some of the biggest impact is the evolution of identity metadata to support improved and secure forms of access to IT infrastructure and services. Yet, this is still the most underrepresented aspect in target…

Video

Identity Fabrics 101

Video

Identity Fabrics Best Practices and Use Cases

Video

Live Q&A and Discussion - Best Practices and Use Cases

Video

Closing Session

Webinar

Oct 18, 2022: A Winning Strategy for Consumer Identity & Access Management

Success in digital business depends largely on meeting customers’ ever-increasing expectations of convenience and security at every touchpoint. Finding the best strategy to achieve the optimal balance between security and convenience without compromising on either is crucial, but can be challenging.

Blog

Identity Fabrics 2

In the digital era, being able to manage and control access to services, data and other resources by employees, partners, customers, and devices (things) is extremely important, and a key element of that is identity. Having a comprehensive Identity and Access Management (IAM) capability,…

Video

Analyst Chat #126: Leadership Compass Identity Fabrics

The Identity Fabric paradigm manifests an important cornerstone of the KuppingerCole Analysts AG research and advisory. Products in that area cover a wider range of capabilities including Access Management and IGA, and beyond. Martin Kuppinger joins Matthias to provide more details about…

Leadership Compass

Identity Fabrics

This report provides an overview of the market for Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service…

Video

Solving "The Right to be Forgotten" for Blockchains

"The Right to be Forgotten" presents a conundrum to builders of blockchain solutions, because the focus of most blockchains is to create an indelible, permanent record. This makes "The Right to be Forgotten" appear irreconcilable with blockchains. I will present a solution to "The Right to…

Video

Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms

In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a pluralistic digital society & business world where size would not be the only thing that matters.…

Video

Panel | Decentralized, Global, Human-Owned. The Role of IDM in an Ideal (If there is One) Web3 World

The Internet had been created without an identity layer, leaving it to websites and applications to take care for authentication, authorization, privacy and access. We all know the consequences - username and password still being the dominant paradigm and, even more important, users not…

Video

Enabling Digital Identity Ecosystems

Video

In Transition - From Platforms to Protocols

Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity technology ecosystem is in flux. What will emerge? OIDC? OIDC/SIOP? DIDComm? Join us for a discussion…

Video

Insights from India’s Data Empowerment & Protection Architecture

Video

Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!

Video

Cyber-Securing the Digital Industry

Video

Trust is a Team Sport, and Like all Good Sports it has Rules

Trust is not just technical, and it’s not just derived from a process or an organisation. The need for Trust is also variable based on the risk involved in a transaction or the risk appetite of the service provider. Sometimes trust is almost irrelevant. Digital doesn’t make…

Video

Privacy = Data Protection + X

Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel we will try to find answers on how we can translate privacy into the (metaverse) future.

Video

Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment

Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect to the Service and/or Deployment Model they implement. Users are thus lacking guidance for…

Video

Global AI Ethics and Governance

Recent years have seen significant Artificial Intelligence (AI) development across all domains of business and society. This panel aims to bring attention to societal impacts of AI – benefits and challenges, by bringing thought leaders and practitioners from different parts of the…

Video

Enabling MFA and SSO for IoT and Constrained Devices

Video

Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds

Video

Inside the Mind of a Hacker – From Initial Access to Full Domain Admin

Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and moves laterally to identify and exfiltrate your critical data. He will share insights into how…

Video

Navigating the OT World – Selecting a Solution to Suit

Video

OT Patch Management Best Practices

Video

Closing Keynote & Announcement of EIC 2022 Gamification Winners

Video

The impact of decentralized identity solutions in the marketplace, insights and lessons

Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s interested, why, and what we learned building a series of solutions for global enterprises in…

Video

Knowing differences between Cyber Resistance and Cyber Resilience

You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience,…

Video

"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?

Video

Reducing the Species in your Cybersecurity Zoo

Video

Signing in the Rain: HTTP Message Signatures and Web Security

HTTP is an amazingly powerful protocol, and it's the lifeblood of the internet today. On the surface, it seems to be a simple protocol: send a request to a server and get back a response, and everything's structured in useful ways. HTTPS adds the TLS protocol to secure the connections…

Video

How to innovate your Identity Governance and Administration program

The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.

Video

Enterprise Domain Annotation based Segregation of Duties strategies

Video

Panel | B2B IAM

Video

Best Practice: CIAM as Business Enabler for Digital Transformation

Video

Panel | How to improve customer IAM and CIAM

Video

Credentials and Privacy - History and New Kinds of Cards

David will talk aboout a new technology that allows the person owning a public key to prove that they have memorized a passphrase, from which they could at any time easily compute the private key. One example use is for votexx.org elections, which are conducted remotely without polling…

Video

Privacy Enhancing Mobile Credentials

The Kantara Initiative is developing a standard and requirements so that organizations can demonstrate to their stakeholders that their commitments to privacy and data protection go beyond transactional and technical trust. At the end of the day people trust, or don't trust, organizations…

Video

The SolarWinds Hack and the Executive Order on Cybersecurity Happened - It Is Time to Prepare

Again and again, I am asked how one can start with the topic of security in an agile project environment. What are the essential first steps, and what should you focus on at the beginning? Of course, this raises the question of suitable methodologies and tools. At the same time, the…

Video

Your Journey to the Cloud: Can you Finally Replace Active Directory?

In this session, we will answer a question that everyone is asking: "Can we really get rid of Active Directory in the cloud era?". In the conversations with many CISOs and CTOs, the future of Active Directory was constantly being questioned and we could see a lot of confusion about what…

Video

Panel | The Future of Corporate Directories in the Cloud Era. Will they Survive?

In this session we will have a look at traditional corporate directy systems and discuss wether, how and where they will survive a cloud first stragey. Do we still need a corporate directory? If so, what are or will be their role compared to oter centralized directories like Azure…

Video

The Identity R/Evolution

The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “ The Laws of identity ”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal…

Video

Verifiable Credentials on the front line

Learn how businesses are using verifiable credentials, decentralized orchestration and blockchain identity to reduce fraud, increase privacy and improve user experience. See real-world examples of production ready solutions from one state’s Department of Education and other public…

Video

Panel | Turning (Distributed) Workforce Challenges into Productivity Gains

Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 

Video

Friends don’t let Friends Centralize Authorization Enforcement

Video

Connecting 10.000+ mobility companies and multi million customers

Video

Cyber Security Architectures in a Hybrid World

A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after all cloud services are adding another dimension of complexity. We will take a short look at the…

Video

Implementing SSI using the existing web infrastructure

SSI and Verifiable Credentials are the latest development in identity management. They offer many benefits over existing federated identity management systems. Unfortunately some proponents of SSI are mandating that companies implement decentralised identifiers (DIDs) and blockchains in…

Video

IGA in the Financial Industry - Implementing IAM

Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.

Video

There is No Consensus About Consent

 

Video

Digital Identity in Travel (and beyond): a public-private affair

Video

Interoperability Between Global Identity Networks

Video

Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats

We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as well as the identity ecosystem embrace themselves for a change in the way we perceived security.…

Video

The Balance Between Decentralization and Efficiency

Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to realize the true power of decentralization – bringing privacy, speed, scalability and user…

Video

Designing an European Identity Wallet: An overview of UI and UX aspects

The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview of how a potential user interface (UI) might look like and will illustrate common…

Video

Drivers for Identity & Access Management in the Financial Industries

Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the new solutions are presented in this talk.

Video

Remote onboarding with Verifiable Credentials

Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent…

Video

Bridging Traditional IGA with Cloud Native Authorization

IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context information is coming from. The talk will shed some light on how the grey area between IGA and cloud…

Video

Latest Developments in CIAM

Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way into B2B and B2E IAM solutions through the "consumerization of IT". KuppingerCole is updating…

Video

Protocol Independent Data Standards for Interoperability

Video

Panel | CIAM and Customer Data Platforms

Video

Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience

This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We will discuss whether you should invite attackers into your network. Much like with vampires,…

Video

The Unique Challenges of Identity M&A in High-Growth Organizations

Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes with its own set of unique issues and risks? One year ago, Okta announced its acquisition of…

Video

Securely Identifying Mobile Apps

Today's open standards ensure that when a user chooses to login, the user’s authentication is protected and only delivered to the mobile app that initiated the authentication. However, how does the Authorization Server identify or verify the invoking app? This talk will look at the…

Video

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been…

Video

If it’s not Simple, Scalable and Agile, it’s not Modern IGA

Video

All Other Identities - The Risk That Is Hiding in Plain Sight

For the last 30 years  virtually every  company, agency and organization has been forced to accept the risks associated with identity management and control for third parties and  all  the other identities that  are not  directly addressed by today's workforce or customer access management…

Video

Unified Endpoint Management: Practical Considerations

Video

Panel | PAM

Video

PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management

A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management.  Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more…

Video

PAM for the People

The cyberssecurity approaches and strategies that works well for a multinational with a large and well funded cybersecurity department may not be as applicable for a mid sized company where the security department may be a single person. Still if the partner company that delivers the…

Video

Proofing your Success: Defining & Measuring Meaningful Metrics for IAM

Video

Trimming down User Access Governance to its Essentials

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy. In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear…

Video

Cloud Security Standards: Expectations, Benefits and Use Case

Video

The Future of Digital ID in South Africa

Video

Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect

 

Video

Joni Brennan and Allan Foster

Video

Progress and lessons on the establishment of Digital Identity in UK

Video

Preserving Privacy in Identity-Aware Customer Applications

  As customer identity programs mature, they bring new opportunities and risks. In the rush to launch new customer experiences, personal data is over-exposed and over-replicated. The default is to ship all identity attributes, to all systems, on every request in order to make access…

Video

Zero Trust and the Business – why you have to align with the application owners!

Video

Challenges for Women in Identity and Security

It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security and identity is even worse, as some studies have shown. "Women in Identity" is a global…

Video

What if your digital twin misbehaves?

The concept of the digital twin comes originally from the Industry 4.0 domain with the idea of having a digital representation of real-life objects or processes. The representation of the digital twin consists of the physical object, the virtual product, and the connections between those.…

Video

Quo vadis, SSI? – Self-sovereign Identity on route to production

Self-sovereign identity (SSI) has reached the in-between stage: more than a concept, not yet fully deployed. This is where the work can get the most gruesome and exhausting, but also the most creative and rewarding. While the dedicated W3C standards are reaching maturity levels, we see…

Video

Self-Sovereign Identity for Legal Entities and their Representatives globally

Video

Creating a Seamless Access Experience with the Digital Double

Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated access. But, is this enough for the next epoch of digital applications, metaverse, and Web…

Video

Qualified electronic signatures in times of the eIDAS2-wallet - a Nordic-Baltic perspective

When dealing with digital identity, emphasis is often put on the identification and authentication part. An equally important aspect is digital signing (or more broadly: electronic signing). Qualified electronic signatures have the same legal status as handwritten signatures in the EU. In…

Video

Transatlantic SSI Interoperability: Building the Identity Layer for the Internet

Many decentralized identity infrastructures and ecosystems around the world are emerging, but how can we get to true global interoperability, where my digital identity works seamlessly across borders and across different use cases? Two of the most prominent initiatives in the digital…

Video

Kubernetes and Crossplane at Deutsche Bahn

This session will be about the journey of Kubernetes and Crossplane at Deutsche Bahn, to provide platform consumers with access to a unified API for deployments, infrastructure provisioning and applications in a manner that is independent from the cloud, addressing compliance and…

Video

Deploying Open Policy Agent (OPA) at Scale and in Production

OPA is a fast rising star in the Authz market. In this deep dive we will cover lessons learned and best practice from early adopters on how to deploy OPA at scale and in production. How can you ensure consistent polices, how do you test and life cycle policies, how do connect with external…

Video

Identity Management in a Web 3.0 World

The third iteration of the Web, Web 3, aims to put more control over web content in users’ hands. It promises to be built on blockchain, eliminating all big intermediaries, including centralized governing bodies. The vision for a Web3 world is for people to control their own data and…

Video

An ecosystem for trusted identities

 

Video

Enterprise Identity: A case study of the EU Gaia-X project

Gaia-X Federation Services is a European project that promotes innovation through data sharing and represents the next generation of the data infrastructure ecosystem. To see how we bring about an open, transparent, and secure digital ecosystem, we thus share a practical example and working…

Video

Making SSI accessible: IOTA technology, solutions and projects

Traditional identity and access management solutions built so far on the trust for selected identity providers and their adoption from an ecosystem of identity owners and identity verifiers. The decentralized identity paradigm is disrupting these ecosystems and required more…

Video

Hybrid Central/Decentralized Identity: Deployment Strategies for SSI

The disruptive changes in the SSI paradigm will not be effortlessly adopted by the industry worldwide without technological enablers. Indeed, before transitioning to a fully decentralized ecosystem, standard enterprise IAM solutions and canonical IGA disciples will need to adapt and…

Video

Panel | IGA for Successfully Managed Identities

Video

Access Control - The new Frontier

Video

Creative Disruption: How Web 3 Models are Capturing Markets & Customers

Web 3 businesses are gaining traction. Data and metrics around customers and markets show growing usage, early adoption and huge growth potential. Currently, these businesses built on decentralized networks are separate from traditional web 2 platforms. Will the 2 paths converge? Will there…

Video

The Omniverse SWOT

Our headlines and podcasts are filled with the promise of web3. Positioned as a digital utopia that will foster and reward creativity whilst righting the wrongs of data equity. This new world, fusing our physical and digital – will be more immersive, collaborative and experiential…

Video

Global Trust Frameworks Interoperability

Video

GAIN Insight

In this session, Daniel Goldscheider will give an overview on GAIN, the standards behind, and use cases. 

Video

Panel | GAIN Interoperability

Video

Panel | The Pieces of Modern Authorization - Whats Happening in the Market

Video

Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?

Video

Human-Centric Identity

Security vs experience. Platform vs best of breed. Fast vs thorough. The identity technology world forces us to make trade-offs. These difficult decisions are an endless exercise in technical and logistical nuances like developer and IT resources, product licenses, integrations, and…

Video

Implementing Multi-Region Identity Identifiers and IAM

Video

Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization

Video

Identity in Polyglot Cloud Environments

Video

Panel | Cloud Infrastructure Entitlement Management (CIEM): Managing Your Cloud Scale Risk with an Identity Defined Security Approach

CIEM adopts a zero trust approach to Identity and Access Management (IAM) for cloud infrastructures, making access risks visible and avoidable. In this panel session 

Video

SASE vs. Zero Trust: Perfect twins or antagonists?

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in…

Video

Demystifying Zero Trust

“It’s about the journey, not the destination” they said. “It’s basically just Don’t Trust But Check, what’s the real difference?” they said. “ What’s the big deal?” They said. Zero trust has been the panacea to…

Video

Zero Trust at Siemens: Where the impossible and the doable shake hands

Two years ago, Siemens started a still going on process to change its security architecture to Zero Trust. Not an easy task for a company that big, widespread, and divers in products. In this session program leads Thomas Müller-Lynch and Peter Stoll are talking about what …

Video

The Changing Cyber Threat Landscape and its impact on IAM (II)

Video

Experience is What Counts, Orchestration is How you Get There

Video

Dealing with Multi-Cloud, Multi-Hybrid, Multi-Identity: Recommendations from the Field

Video

Reinventing the Network with Zero Trust to Stop External Network Attacks

Video

What Ails Enterprise Authorization

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access…

Video

OpenID SSE, CAEP and RISC - Critical standards that enable Zero-Trust security

Zero-trust security relies heavily on the ability for independently owned and operated services to dynamically adjust users’ account and access parameters. These adjustments are based on related changes at other network services, such as identity providers, device management services…

Video

What Supports Zero Trust in the Enterprise?

When we think of Zero Trust, we often discuss how it can support and improve your security posture, defense-in-depth strategies, and architecture -- but what supports Zero Trust? This discussion will focus on other IT / Security strategies, methodologies, and business practices that can…

Video

The Path to Zero Trust by Securing Privileged Identities

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on…

Video

Plan A: Reduce Complexity in your Cloud Native Environment (there is no Plan B)

Organizations with an advanced cloud migration program have hit a roadblock. TO successfully navigate the adoption of compartmentalized code, in order to reap the benefits of improved agility and reduced costs, The CISO must embrace automated deployment and gain control over APIs.

Video

The Role of Identity & Access Management for Ransomware Resilience

Video

Panel | Digital Identity & Web3- Rethinking Business Models

Video

Certificate Based Authentication in a Cloud Native Environment - a Migration Journey from Handcrafted XML Signing to OpenID Connect

During this best practice session we will present you with hands-on experience from one of our financial services industry customers. The company used a handcrafted xml signature mechanism to authenticate their business partners when initiating machine-to-machine communication to…

Video

How organizations can make and save money with decentralized identity

In this talk John will present one way of modelling the potential value propositions for the parties (people and organisations) in decentralised identity models. Using real world examples of products and systems, he’ll use the model to consider their value propositions, and whether…

Video

Making Digital Identity Enable Your Organization's Cloud/Digital Transformation

Video

The Empowered Consumer and the Next Era of Digital Identity

Video

A Story About Convenient Security

Video

Siemens AG: Real-World Enterprise IAM at Scale

In today´s unpredictable business environment where change is the normal, it has become critical to have a manageable and scalable Identity & Access Management program in place. In this Best Practice Presentation, Leonardo Morales will talk about the challenges and his learnings…

Video

Give me 10 minutes, I'll give you the truth about verified Identities

Video

The strategic building blocks of the composable enterprise: Concepts & technologies

This session is a continuation of the opening keynote by Martin Kuppinger on the future Composable Enterprise. Together we take a look at what powers the composable enterprise and which concepts and technologies can contribute to building a composable enterprise. KuppingerCole proposes…

Video

How to use the framework of a Trusted Data Ecosystem to simplify building decentralized identity solutions

Decentralized identity is an incredibly flexible technology that solves fundamental problems in the way we manage digital communication. But this capacity to do more than one thing at once  can be a source of confusion: How do I actually build a decentralized or self-sovereign…

Video

From A to B - How Decentralized Technologies Are Changing Collaboration Between the Public and Private Sector

The world of modern urban mobility is full of - unused - opportunities. To get to their destination, people can use public transportation, take a cab or rent an e-scooter. But many options also means many providers. Anyone who uses more than one of the aforementioned forms of…

Video

Demystifying CIEM for an Effective Multi-Cloud Security Enablement

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools…

Video

Panel | Multi-Cloud Agility Must-Haves

With a highly prioritized digital tranfsformation towards a composable enterprise, it will be inevitable to work with multi-cloud solutions to achieve the level of agility and flexibility required. If it was to avoid vendor lock-in or to consequently go for best-of-breed solutions - in this…

Video

Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments

Performing accidentally wrong or intentionally bad configuration changes by administrators, scripts or systems can lead to serious security vulnerabilities or unintentional visibility or leakage of data. This applies to on-premises systems, but especially to systems and applications in…

Video

Dissecting Zero Trust, a real life example

After his presentation on Strategic and Tactical approaches for Zero Trust, in this presentation Fabrizio will breakdown the components of a Zero Trust implementation and highlight what a company needs to implement it. Fabrizio will also cover use-cases like legacy or cloud-based applications.

Video

Panel | The Stack, the Stack, the Stack: How Trust over IP is Enabling Internet-Scale Digital Trust

The internet was designed without a trusted identity layer to connect physical entities to the digital world. This layer is now emerging in the form of decentralized digital identity systems (aka self-sovereign identity or “SSI”) based on digital wallets and digital…

Video

Panel | Assessing the Cybersecurity Impact of Russia’s Invasion of Ukraine

Russia’s invasion of Ukraine has tectonic consequences for citizens and businesses across the world. An expectation of normalcy post the pandemic has been replaced with fears of increased gas prices and supply chain disruptions. Attackers are expected to leverage the context to carry…

Video

The Changing Cyber Threat Landscape and its impact on IAM (I)

Video

Panel | Introducing Open Policy Agent (OPA) for Multicloud Policy and Process Portability

With over 120 million downloads, and users like Netflix, Zalando and GS,  the open source project Open Policy Agent has quickly become the de facto standard for Authorization. In this session, KuppingerCole´s Alejandro Leal will discuss with  Jeff Broberg, Gustaf…

Video

Promoting Cyber Resilience through Identity and Zero Trust

Resilience is defined as the dynamic process of encompassing positive adaptation within the context of adversity. Organizations today are under constant siege from any number of security threats. The only path to weathering this ongoing storm is to learn to intelligently adapt…

Video

OAuth DPoP (Demonstration of Proof of Possession): How to Not Let Attackers Steal your OAuth Token

Most OAuth deployments today use bearer tokens – tokens that can be used by anyone in possession of a copy of them, with no way to distinguish between legitimate uses of them and those that stole them and used them for nefarious purposes. The solution to this is proof-of-possession…

Video

Panel | Best Practices for Implementing Zero Trust

The “zero trust” approach to cybersecurity has been gaining momentum in recent years, as both corporations and government agencies have struggled with how to enhance security given the de-emphasis on the network perimeter. For the most part, the…

Video

The ICaaS (Identity Component as a Service) approach for taking control of customer experience

Video

Denmark's 2022 brand new eID solution

Video

The Importance of a Centralized Access Management System

Video

Panel | Deliver on the Promise of an Identity Fabric: The Power of Data

Digital identities of consumers, customers, business partners, employees, but also devices, things, or services are at the core of the digital business.  Unfortunately, most digital identities reside in siloes. Building a modern Identity Fabric that delivers seamless yet secure and…

Video

Building a robust CIAM foundation, fit for the dynamic financial market

As organizations are recovering from the pandemic, many of them embark on a digital transformation at high-speed. Investments to drive online business, powered by customer insights and an attractive user experience, yet secure and compliant to rules and…

Video

SSI, NFTs, ENS & Co - Trends and Adoption of Decentralized Identity in 2022

Goal of this Deep Dive: Listeners will leave with a solid understanding of different approaches to decentralized identity like Self-Sovereign Identity (SSI) and Non-Fungible Token (NFTs), Ethereum Name Service (ENS) their adoption (based on real use cases) their impact on…

Video

Why KYC Isn’t Enough

Video

Trends in Enterprise Authentication

Video

Panel | Overcoming SMS OTP: Secure passwordless MFA with your mobile phone

Video

Fraud Reduction Intelligence Platforms - an Overview

Video

The State of Passwordless Authentication

The FIDO Alliance has made tremendous strides in its mission to change the nature of authentication with stronger, simpler and passwordless authentication. Join this session to get find out the state of passwordless authentication from the FIDO lens, including a sneak peak at major news…

Video

Panel | MFA usage in enterprise

There are so many ways enterprises could benefit from using Multi-Factor Authorization (MFA). Benefits include identity theft prevention, secure devices, lower breach risks, to name just a few. But why are so many businesses still not using MFA? Perhaps because it is too complex and…

Video

A Blueprint for Achieving a Passwordless Reality

Password-related attacks increased by a staggering 450% in 2020, with over 1.48 billion records breached worldwide. Meanwhile, the average cost of a password reset exceeds $50 USD. We all know that passwords fail to deliver adequate Zero-Trust security and cause unnecessary friction for…

Video

Practicalities of Identity Proofing for Authentication

Video

Panel | Centralized vs. Decentralized: Pros, Cons, Use Cases

Video

IAM-Suites for Medium-Sized/Mid-market Organizations

Video

Panel | Identity Fabrics: The Mesh and the Factory for Identity Services

Identity Fabrics as a concept has established itself as a common paradigm for defining and implementing the identity services needed by organizations to provide seamless, yet secure and controlled access of everyone and everything to every type of service, regardless whether its legacy or…

Video

IAM 2025: Integrated, Agile, Flexible. Decentralized?

Times are challenging, probably more than during the last few decades, with a pandemic that seems to never ending, homeoffice workers who don´t want to return, some frightening growth rates on the dark side of digital with ransomware everywhere and nation-state intellectual…

Video

Panel | The Future of Authentication

Video

European Identity & Cloud Awards Ceremony

Once again, analysts from KuppingerCole come together to showcase outstanding Identity Management and Security projects, standards and people. The winners will be honored live on stage during the award ceremony.

Video

SSI Market Size (and opportunity in web3.0) and use cases

Who is this new beast, which widespread technology is going to be used everywhere from banking to metaverse, travel to healthcare? The technology that has no limits in its application across sectors is equally welcome in centralised and decentralised worlds. Meet, self-sovereign…

Video

The CASE for a Vehicle Lifecycle Ledger

Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation. Ranging from eScooters, bicycles, ride-sharing to car-sharing, ride-hailing and public transport.

Video

Identity Ecosystems for a Better Customer Experience

Portable, verifiable and, most importantly, reusable representations of personal data can enable high-touch, high-trust and low-cost engagement between customers and networks of complementary service providers. The EU is already adjusting to the opportunities of Self-Sovereign Identity, but…

Video

The 'Credentials-first Mobile-first' Identity Ecosystem

This is a new development in the world and touches on mDL, Verifiable Credentials, decentralized identity, and personal data topics. A forward-looking presentation about what the world might look like, the foundational changes represented by this change, and some current and potential…

Video

Cardea: verifiable credentials for health information go open source

As an incubator for innovation in air travel, Aruba has chosen to use verifiable digital credentials to manage entry requirements and health testing for travel to the island. This decentralized, open-source technology, which provides secure authentication while preserving traveler…

Video

Drone Pilot Credentialing for Air Safety

Drone operations are estimated to bring €10bn/yr to the EU economy by 2035. A critical e-Government issue is the ability to fly drones in regulated airspace around airports. Unauthorised drone operations in the flightpath of passenger aircraft can endanger lives and cause…

Video

The Digital Identity Shake-up we’ve been waiting for: How to Survive, and how to Thrive

 

Video

A Key Milestone towards CBDC Wallets - The eIDAS 2.0 Payment-Authorising Wallets

The presentation to be made by Stéphane Mouy (SGM Consulting - France) and Michael Adams (Quali-Sign - UK) will focus on the forthcoming eIDAS 2.0 digital identity wallets (DIWs) and the payment use case. DIWs will allow users to share high LoA identity and status credentials to…

Video

We’re Gonna Need an even Bigger Boat: How Pervasive Digital Transformation, Nation State Actors, and Open Code Repositories Mandate a Reinvention of Identity

Video

Key Requirements for Next Generation MFA

In this talk you will learn how MFA can be a foundation for your Zero Trust Initiative

Video

What Does It Mean to Package Ethics Into a Technology Stack?

Video

The Value Paradox: The 3 Inflections of IGA

Video

A Learning Agenda for Federal Identity

Video

Dynamic Authorization in Zero Trust Architecture

Video

New Face, Who Dis? Privacy vs Authentication in a World of Surveillance

Facial recognition technology is evolving rapidly, presenting the benefits and dangers that innovation always does. Will it provide reliable biometric authentication, or will it erode personal privacy? We’ll examine the current landscape from both a policy and a technical…

Video

Digital Identity and Privacy: Stories from the Frontline

As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a…

Video

Welcome to EIC 2022

Video

Advocating for Decentralised Identity in Europe: 7 Lessons Learnt

Video

Future Government: Transforming Public Services to Be More Agile and Innovative

Video

Identity. Security. Decentralized. The Future of IT in the Age of Change

The future of the enterprise is changing. In the Digital Age, much is different than it has been in the past. The focus must be on agility in business models and delivery, innovation, and reliability in delivering to the customers. This requires a shift in focus, in all areas, including IT.…

Video

I'm None of your Business

Video

Pre-Conference Workshop | The IAM Experience Your Users Really Deserve

Organisations that are being targeted by SaaS and B2B companies might struggle when it comes to building a smooth and quick process of authentication for their users. Issues with business needs, such as user organisation within a specific target business, separate branding, access control…

Video

Model, Measure, Manage - The Journey to Autonomous Security in a Hybrid Multi-Cloud World

We cannot manage what we cannot measure.

Video

Privacy and Data Protection. What is this Thing Called Privacy?

Video

The New Digital Identity Wallet for all Europeans: Latest Amendments

An impactful 73 pages proposal for amending the 2014 e-IDAS regulation was made in June last year, a.o. providing EU wide wallets for national e-ID’s. Market consultations and impact assessments have been concluded early 2022 and the European Parliament discussed the proposal with…

Video

Journey to the North: Canadian Perspectives and Progress on Digital Identity

Video

It's the Relationship, Stupid

Video

Privacy: The Real Cost

Privacy is one of the most challenging aspects to protect in identity solutions. The entities that stand to gain the most from surveilling users can use convenience as a bargaining chip. Users understand and appreciate convenience, but they often don't appreciate the costs of loss of…

Video

Pre-Conference Workshop | Standards Matter. Trustworthy use of Identity and Personal Data

The world has changed because of COVID. More fraud is taking place. More misuse of identity is occurring. To combat the rise in fraud and to mitigate risk, the Kantara Initiative offers a 3rd party conformity assessment program.

Video

Pre-Conference Workshop | How OpenID Standards are Enabling Secure & Interoperable Digital Identity Ecosystems

OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while also enabling a collaborative platform to openly address current trends and market opportunities. The OpenID Foundation Workshop at EIC includes a number of presentations focused…

Video

Tribute to Kim Cameron: Privacy & the 7 Laws of Identity

Last November, the creator of the 7 Laws of Identity, Digital ID thought leader and focal point of a Global Identity Community, Kim Cameron, passed away. He not only left us with an uncountable number of unforgettable moments. He also left us with those 7 laws of Identity, a set of…

Video

Pre-Conference Workshop | IAM, the Cloud, and GDPR - Why you will fail on GDPR without a strong IAM posture

Video

CISO Panel | Securing the Composable Enterprise

As if it all came together on the foundations of an agile, fully decentralized enterprise, embracing the API economy to deliver results through assembling and combining pre-packaged business capabilities. AI-driven, automated, everything delivered on-demand, providing the best possible user…

Blog

Identity Fabrics: Developing your IAM Program from Vision to Strategy

Are you bothered by the ubiquitous dichotomy between delivering to urgent demand and delivering to a strategy for your organization’s IAM (Identity & Access Management)? The one good news on that is that you are not alone. But there is more good news: You can get both, without…

Video

Prediction #2 - The Convergence of IAM and how to Manage Complexity in a Multi Cloud, Multi Hybrid, Multi Identity World

It is the same set of drivers – first and foremost remote workforce requirements and seamless customer interaction, that make our infrastructure and service even more complex as they used to be, with multiple public and private clouds, on-site IT, all of them with identity silos. In…

Virtual Event

Oct 06, 2022: Driving Innovation With Identity Fabrics

Digital Transformation has put businesses under a lot of pressure, not only with regards to compliance but also through a high demand for customer privacy and improved user experience. With too much security, e.g., through Authentication, users are scared off, whereas having too little…

Video

Delivering on the Promise of an Identity Fabric in a Modern Enterprise

Identity sprawl is a challenge facing most modern enterprises as a result of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work. This sprawl leads to tremendous technical debt and has turned identity and access management into a…

Webinar

Nov 04, 2021: Delivering on the Promise of an Identity Fabric in a Modern Enterprise

Identity sprawl is a challenge facing most modern enterprises as a result of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work. This sprawl leads to tremendous technical debt and has turned identity and access management into a…

Blog

EIC Speaker Spotlight: Chris Owen on Identity Management

Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC 2021. To give you sneak preview of what to expect, we asked Chris some questions about his planned…

Hybrid Event

May 10 - 13, 2022: European Identity and Cloud Conference 2022

After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital.

Video

Building the Future of Identity | Frontier Talk #4 - Doc Searls

"Progress is the process by which the miraculous becomes mundane.” says Doc Searls, the next guest on our popular podcast series - Frontier Talk. In this episode, Raj Hegde sits down with one of the most prolific technology thinkers of our generation to understand the problems of the…

Video

Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)

CIEM is one of the latest entries to the set of 3- and 4-letter acronyms in IAM technology. Martin Kuppinger and Matthias take a look at the functionality behind it and its role within an Identity Fabric.

Executive View

Saviynt Enterprise Identity Cloud

Enterprise IT organizations need Identity solutions to protect data, applications, and third-party access to critical IT infrastructure and services. The Saviynt Enterprise Identity Cloud (EIC) takes an all-encompassing approach to these different aspects of identity, delivering an…

Video

Analyst Chat #66: Enterprise Authentication - an Updated Look at That Market Segment

John Tolbert has just recently completed an updated Leadership Compass research document in the market segment of Enterprise Authentication. He joins Matthias for this episode to talk about recent developments and trends in that important area of the Identity Fabric for both IAM and CIAM.

Blog

Okta & Auth0

Okta will purchase Auth0 for $6.5B. Okta is a leading IDaaS vendor, originally focused on workforce but now addressing B2E, B2B, and B2C use cases. Okta’s solutions are designed for organizations that want to quickly enable cloud-delivered identity and seamlessly interoperate with…

Video

Martin Kuppinger: Interview with Simon Moffatt

Video

Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink

Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM. IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance…

Video

Simon Moffatt: The Road to CIAM Success: Why an Identity Fabric Powers Digital Transformation

Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs.  A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling…

Video

Manoj Kumar: Cloud-delivered IAM: Promises and Challenges

Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the…

Video

Tobias Urban: The Balance Between User Experience and Security

Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver…

Video

Matthias Reinwarth: User & Authorization Management. Real Benefits For The Business, Effective Projects, Efficient Operation And A High Level Of Acceptance

Video

David Doret: TOME: Strengthening the Semantic Foundations of IAM

We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are: a manager trying to explain its IAM strategic program to top management, an architect trying to make IAM efficiently and…

Video

Sylvie Vandevelde: From a Centralized Digital ID Towards a Hybrid Model

Video

Oliver Krebs: Anchoring Real Identity in a Digital World

In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one. It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them…

Video

Rakesh Tripathi: Future of Identity Management

Video

Akhilesh Rajendran: Automation in Identity and Access Management Operation

 An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation…

Video

Vinay Dabas: Securing the Digital World - Identity Verification and Authentication

Video

Christine Owen: Identity-Centric IAM For Enhanced Integration Into Emerging Security Models

Video

Vilma Blomberg: No Compromises, No Mercy – IAM’s Inevitable Role in Safeguarding The Organization

Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a…

Video

Panel: Tackling the Legacy IAM - Towards Future- Proof Identity Fabric

Blog

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or vendors - let us start by simply being consumers.  Consumers of online services for banking,…

Virtual Event

Mar 03, 2021: Identity Fabrics - Future-Proofing IAM

Join the KCLive Event on Identity Fabrics on March 3, 2021 to learn how to elevate overall IAM strategies that enable digital transformation and support innovation.

Executive View

Atos DirX Audit

DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can analyze concrete access. It comes with dashboard, KPI, and reporting capabilities, providing flexible insight and a…

Video

There Is No Successful Digital Transformation Without Strong Identity Management

2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices…

Video

Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain…

Video

How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.

Webinar

Dec 03, 2020: There Is No Successful Digital Transformation Without Strong Identity Management

2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices…

Webinar

Oct 27, 2020: Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain…

Video

The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Video

Security Fabric: Building a Secure Future With a Flexible IT Architecture

IT security is of central importance to companies. There are many requirements that must be met so that users with different roles and rights can use the various computers and networks securely and efficiently.

Webinar

Aug 25, 2020: The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Webinar

Sep 30, 2020: How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.

Webinar

Jul 22, 2020: Security Fabric: Building a Secure Future With a Flexible IT Architecture

IT security is of central importance to companies. There are many requirements that must be met so that users with different roles and rights can use the various computers and networks securely and efficiently.

Blog

Creating an Innovative Identity Fabric Structure

To maintain competitive advantage, digital transformation is no longer a choice – it’s an imperative. The rapid shift to the cloud and as-a-service models has enabled organizations to offer more digital services and applications across a wider range of devices for their workforce…

Virtual Event

May 12, 2020: Identity Fabrics & the Future of Identity Management

With this Virtual Event, KuppingerCole will help you in defining a step-by-step approach to migrate from your legacy IAM to a future-proof Identity Fabric.

Blog

Modernizing IAM Solutions Leveraging New Operating Models With the KuppingerCole Identity Fabric

Video

Modernizing IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric

Learn more about Legacy IAM and how to modernize IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric.

Blog

Ambient Intelligence Can’t Mature Without an Identity Protocol

Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital experiences. This growing range of smart devices – both in the IoT sense and the intelligent AI…

Blog

Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About

Shifting IAM to Modern Architecture and Deployment Models There is a lot of talk about IDaaS (Identity as a Service) these days, as the way to do IAM (Identity and Access Management). There are also fundamental changes in technology, such as the shift to containers (or even serverless) and…

Blog

API Platforms as the Secure Front Door to Your Identity Fabric

Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate separate IAM services in a cohesive way. Identity Fabrics help the enterprise meet the current…

Webinar

Dec 10, 2019: Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and…