Early-bird Discount
expires in
Register Now


Enterprise Identity IV

Enterprise Identity IV

Thursday, June 06, 2024 14:30—18:30
Location: B 07-08

In the evolving tapestry of the AI driven digital realm, Enterprise Digital Identity stands as a linchpin, central to both operational efficacy and security. As businesses soar to new digital heights, understanding and innovating within this sphere becomes imperative. This session stream at EIC 2024 delves into the nuances, challenges, and innovations that are shaping the identity landscape for modern enterprises. With a blend of cutting-edge trends and foundational strategies, this stream addresses the future-ready requirements and the transformative potential of digital identity management within organizations.

Each topic within this session stream promises a combination of expert insights, real-world case studies, and forward-looking strategies, ensuring that attendees are well-equipped to navigate the challenges and harness the opportunities within the enterprise digital identity sphere.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 3 CPE Credits for this track.

After attending this track, participants will be able to:

  • Recognize the critical role of Enterprise Digital Identity
  • Determine how an identity-first approach amplifies security measures, ensuring robust defenses against evolving threats
  • Illustrate why adaptive and scalable architectures are crucial for future-proofing Identity and Access Management (IAM)
  • Recognize strategies for optimal IAM hygiene, reducing vulnerabilities, and optimizing user experience
  • Distinguish tools and technologies that enable cohesive identity management across diverse user bases
  • Illustrate the increasing and evolving nature of threats targeting IAM systems
  • Discuss the power of data strategies in enhancing identity management protocols
  • Recognize how generative AI applications and analytics can revolutionize IAM

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Digital identity futurist and strategist
Venn Factory


June 06, 2024
14:30 - 14:50
Examples of How to Scale Access for External Identities Successfully
Dive into real life examples of applying workforce IAM principles in CIAM. We’ll focus on adapting joiner-mover-leaver scenarios and adaptive authentication for external users, such as suppliers, distributors, brokers, customers with multiple subscription types. We’ll showcase how managing lifecycles intuitively can streamline access control, enhancing user engagement and offering personalized application usage. Ideal for CIOs and Product Managers, this session reveals a practical...


June 06, 2024
14:50 - 15:10
Breaking Free from Legacy CIAM: The Key to Unlocking your Insurance Company's Digital Potential
Legacy Customer Identity & Access Management (CIAM) systems contradict insurance companies' digital goals, hindering user experience with slower, less secure methods. These old technologies fragment the user journey and impede operational excellence with high costs, limited scalability, and security risks. Insurers must embrace modern CIAM to remain competitive. Join this session to discover: Why insurance companies need to modernize their identity systems to remain competitive in...


June 06, 2024
15:10 - 15:30
Panel: Decentralized Identity for Onboarding and CIAM
Picking up on the observation at EIC 2023 by KuppingerCole Principal Analyst Martin Kuppinger about the application of Decentralized Identity to Enterprise onboarding, the panel will discuss how Decentralized Identities can augment and improve onboarding and CIAM (Customer Identity and Access Management) processes, and how enterprises can develop the capability to utilize decentralized customer identities and data. The panel will also consider the potential for emerging technologies like...

Ping Identity
Dock Labs AG
DIF Hospitality & Travel SIG

June 06, 2024
15:30 - 15:50
Top 5 Lessons - Implementing Decentralized Identity at Raiffeisen Bank
Over the past year, we have learned a lot about practical implementations of decentralized identity. There is a lot of buzz, many organizations are dipping their toes, and some are taking the plunge. Raiffeisen Bank International (RBI) is one of Europe’s leading banking groups, serving more than 17 million customers. Focused on digitization, RBI’s main security priorities are: Harmonizing CIAM IdPs Harnessing decentralized identity Highest security and compliance standards...

Ping Identity
Raiffeisen Bank International AG

June 06, 2024
15:50 - 16:10
Passkeys in the Enterprise
Passkeys are quickly becoming an interesting option for phising resistent authentication in the enterprise, but what kind of challenges are you likely to run into when you roll out passkeys in an enterprise? This session will cover what we have learned about passkeys and passkey roll out in a global, flat packed, and meatball centric organisation.

June 06, 2024
16:10 - 16:30
Hybrid Identity: Liminal Space or Permanent Fixture?
Hybrid identity has been sold as this sort of temporary, interim state that is typically required to get us away from Active Directory and into a cloud-native, cloud-driven identity. Yet many organizations, assessing their current landscape, find limitations and gaps that leave them unsure if hybrid identity is the final stop on their identity modernization journey. In this session we’ll explore the current state of hybrid identity, assessing current real-world blockers and gaps for...


June 06, 2024
17:30 - 17:50
Graph-Based Harmony: Simplifying Zero Trust Authorization in the Age of Data Breaches
In the face of escalating data breaches and relentless attacks on identity, the imperative to establish robust Zero Trust (ZT) architectures has never been more urgent. Yet, the complexity of this undertaking, coupled with the multitude of tools and stacks involved, can be overwhelming. This session will examine the Zero-Trust reference architecture outlined by NIST, revealing that authorization sits at its very core. Building on this foundation, we'll showcase how harnessing the...

June 06, 2024
17:50 - 18:10
Dynamic Authorisation: The Key to Unlocking Open Banking Potential in the PSD3 Era
The next frontier of customer identity lies not in simply knowing who someone is, but in what they are allowed to do. This is more important than ever in the financial services industry, as the proposed Payment Services Directive 3 (PSD3) framework creates further opportunities to deliver highly personalised, secure, and scalable data-driven services through Open Banking. At the same time, customers are pushing their providers to give them the tools needed to delegate control of their...

Ping Identity
Ping Identity

June 06, 2024
18:10 - 18:30
Panel: Why Authorization Standardization is Imperative
Join this discussion about the efforts of the AuthZEN working group in the Open ID Foundation, which will include an overview of the authorization space, and the various technologies and players involved. The panel will also discuss why the group exists, the problems that it is trying to solve, and the state of the current work. As Authorization appears to be the next horizon for standardization efforts, and the multiple technologies, often incompatible with each other, the need...

Axiomatics AB
Identity Evangelist
Ping Identity

Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch