Early-bird Discount
expires in
Register Now


Enterprise Identity V

Enterprise Identity V

Friday, June 07, 2024 10:30—15:30
Location: B 07-08

In the evolving tapestry of the AI driven digital realm, Enterprise Digital Identity stands as a linchpin, central to both operational efficacy and security. As businesses soar to new digital heights, understanding and innovating within this sphere becomes imperative. This session stream at EIC 2024 delves into the nuances, challenges, and innovations that are shaping the identity landscape for modern enterprises. With a blend of cutting-edge trends and foundational strategies, this stream addresses the future-ready requirements and the transformative potential of digital identity management within organizations.

Each topic within this session stream promises a combination of expert insights, real-world case studies, and forward-looking strategies, ensuring that attendees are well-equipped to navigate the challenges and harness the opportunities within the enterprise digital identity sphere.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 4 CPE Credits for this track.

After attending this track, participants will be able to:

  • Recognize the critical role of Enterprise Digital Identity
  • Determine how an identity-first approach amplifies security measures, ensuring robust defenses against evolving threats
  • Illustrate why adaptive and scalable architectures are crucial for future-proofing Identity and Access Management (IAM)
  • Recognize strategies for optimal IAM hygiene, reducing vulnerabilities, and optimizing user experience
  • Distinguish tools and technologies that enable cohesive identity management across diverse user bases
  • Illustrate the increasing and evolving nature of threats targeting IAM systems
  • Discuss the power of data strategies in enhancing identity management protocols
  • Recognize how generative AI applications and analytics can revolutionize IAM

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Head of Advisory


June 07, 2024
10:30 - 10:50
Top Risks of Identity and Credential-Based Cyberattacks
This session explores the pressing risks posed by identity and credential-based cyber attacks, spotlighting live demonstrations to expose vulnerabilities and real-world examples that underscore the dire consequences when identities are compromised. Attendees will gain actionable insights into fortifying their defenses against evolving threats, with a focus on proactive cybersecurity strategies. Join us to navigate the complexities of this ever-evolving threat landscape and learn from...


June 07, 2024
10:50 - 11:10
Zero Data Enabled Zero Trust
Zero data is the idea that organizations can store much less data than they used to - sometimes zero data- because of the advent of just-in-time identity streaming technologies like verifiable credentials. Verifiable credentials, combined with ubiquitous fine-grained access control can provide significant benefits to organizations using zero trust principals to secure their applications and internal workloads. This talk will discuss how just-in-time data that is easily verifiable...

Amazon Web Services

June 07, 2024
11:10 - 11:30
An Identity Company's Own Enterprise Journey to ZTA, Passwordless & Phishing Resistance
This is an implementation and enterprise change management story about how we moved Okta from a baseline of traditional MFA gating app/resources access to a far more dynamic & secure app/resource access policy position using ZTA principles, passwordless, & eventually, phishing resistance. It’s about cross-departmental partnership, iterative improvement, and performance benchmarking to deliver a data-driven transformation in our security posture in a short, yet realistic, time...

June 07, 2024
11:30 - 11:50
Do we need to Internalize Authorization Before we Externalise it?
Compared to externalising authentication, externalising authorization has proven elusive. Yet a combination of the rise of advanced threat actors, regulation, compliance and pressures for greater business agility is bringing it back in focus. It is tempting to think of externalising authorization as a technology problem. Technology like policy languages, authorization engines and workflow systems is necessary to enable the externalisation of authorization, but it is not sufficient....


June 07, 2024
11:50 - 12:10
Micro Authorizations: Unlocking the Potential of Zero Trust in Privileged Access Management
The cybersecurity landscape is evolving rapidly, and traditional security paradigms are proving inadequate in the face of modern threats. As organizations strive to embrace Zero Trust principles, the role of Privileged Access Management (PAM) is pivotal. This talk explores the transformative concept of "Micro Authorizations" and its potential to shape the optimal direction for PAM implementations in support of Zero Trust initiatives. The Authorization Fabric decides whether a specific...


June 07, 2024
12:10 - 12:30
Beyond Compliance: Enriching Data Governance with Identity Insights
One of Identity’s core purposes is to secure access to resources. Since the inception of Identity Governance programs, organizations we have taken an “inside out” approach to secure access and have not focused as much on the resource model. While this approach has produced positive results, it has come at the cost of efficiency, speed and accuracy. We explore the different contributions that identity governance can make to data governance and how combining data and identity...


June 07, 2024
13:30 - 13:50
Securing Workload Identities: Best Practices for Tokenizing Third-Party API Keys and Access Tokens
Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments. Modern cloud deployments employ secrets management systems such as KMS to protect key materials at rest and avoid leaking keys or credentials in source code or other build artifacts. However, secrets are unprotected at runtime, so any vulnerability or compromise of a service could lead to credential theft. This talk will propose an architecture that,...


June 07, 2024
13:50 - 14:10
Enabling Fine Grained Authorization for Microservices with Standards
The proliferation of micro-services along with the changing threat landscape means it is no longer possible to rely on network segmentation to establish a secure permitter while allowing broad access between services inside the perimeter. As a result, we have to assume that the attackers are inside the perimeter and apply fine grained authorization at the microservice level to ensure least privilege access based on the context of each transaction. This context includes details of the...


June 07, 2024
14:10 - 14:30
Digital Trust - Building Truly Collaborative Networks
Collaborative Networks have been widely used in business models for modern manufacturing to support today’s fast-moving innovations and complex supply chains. Managing different levels of trust efficiently and securely in Collaborative Networks is critical for productization and time-to-market. Enabling trust in digital interactions requires the right balance between security and user experience. By combining the lessons learned from the user experience of consumer identity;...


June 07, 2024
14:30 - 14:50
End of SAP Identity Management Support: Strategies for a Seamless Transition
Join Martin Kuppinger for an insightful discussion on how organizations can effectively prepare for the end of SAP Identity Management support in 2027. As organizations face the impending sunset of this critical identity management solution, it's essential to develop comprehensive strategies for a seamless transition to alternative solutions. In this talk, Martin will delve into the challenges and opportunities presented by the end of SAP Identity Management support, offering practical...


June 07, 2024
14:50 - 15:10
SAP Identity Management Ends - Know-How and Migration Support for Your Future IAM
Obtaining detailed clarity about the technical requirements associated with the replacement of SAP Identity Management is a central task with the given end of the maintenance period for the SAP product. The search for the best possible succession solution is now in full swing. Answers are needed how to follow-up and what are the next steps. The right solution depends on a large number of prerequisites and technical details. The approach presented here is based on existing experience from...


Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch