Early-bird Discount
expires in
Register Now


Identity Beyond the Enterprise

Identity Beyond the Enterprise

Friday, June 07, 2024 10:30—15:30
Location: C 01

The digital identity landscape extends far beyond the confines of enterprise walls. As we step into a hyperconnected world, the significance of identity stretches across global platforms, consumer interfaces, regulatory environments, and innovative identification paradigms. This session stream at EIC 2024 seeks to uncover the vast expanse of digital identity, diving deep into its transformative potential and its evolving challenges. Attendees will be equipped with insights and strategies, ensuring they're poised to navigate and leverage the multifaceted domain of global digital identity.

Immerse yourself in discussions, case studies, and expert sessions that aim to broaden perspectives, challenge conventions, and offer transformative solutions within the realm of digital identity beyond the enterprise.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 4 CPE Credits for this track.

After attending this track, participants will be able to:

  • Recognize the vast expanse of digital identity, with an emphasis on transformative potential and the evolving challenges in a hyperconnected world
  • Identify the potential of global ID wallets to provide seamless access across services and platforms worldwide
  • Determine the revolutionary concept of identity not bound by centralized authorities, ensuring user ownership and control
  • Identify the implications of blockchain technologies powering decentralized identities for both businesses and consumers.
  • Identify the nuances of managing identities in consumer-facing platforms, balancing user experience with security
  • Plan how to tailor user experiences based on identity data while adhering to privacy standards
  • Recognize evolving regulations surrounding digital identity, from data protection to user rights
  • Go beyond multi-factor authentication (MFA) to illustrate emerging paradigms in verifying user identities

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com




June 07, 2024
10:30 - 11:10
Panel: Decentralized Identity in Production
Over the past 18 months, Verifiable Credentials have begun to be integrated into Production environments, enabling digitization of workforce certifications, supply chain documentation and educational qualifications at scale. The panel will explore the business case to integrate this new data format within existing IGA / IAM solutions, and will highlight key success factors and project learnings, product roadmaps and future direction.

Content Authenticity Initiative / Adobe

June 07, 2024
11:10 - 11:30
How NHS Doctors use Digital Wallets to Get Onto the Hospital Wards and Treat Patients Quicker
Lessons from the UK’s National Health Service (NHS) on translating organisational requirements into real world solutions using policy, technical specifications and by socialising tangible benefits and mitigating perceived risks. In essence describing how the NHS enables healthcare professionals to easily move between the 240+ autonomous NHS hospitals using digital wallets and verifiable credentials. How the NHS uses trust frameworks to define the policy and business rules and technical...

ID Crowd

June 07, 2024
11:30 - 11:50
A Case Study: Enhancing Identity Assurance through Verifiable Credentials
In this session, I will delve into the application of Verifiable Credentials to elevate user identity assurance levels. By leveraging Verifiable Credentials for attribute assurance, we establish a foundation that enhances user confidence and trust. Through a detailed exploration of real-world use cases, we will illustrate how this approach not only safeguards user identities but also fosters a secure and reliable environment for system utilization. I unravel the key principles and practical...

Itochu Techno Solutions
Research Center for Open Science and Data Platform (RCOS), National Institute of Informatics (NII)

June 07, 2024
11:50 - 12:10
Meeting the Challenges of Securing the EUDI Wallet with a High Level of Assurance: an Overview of Deployment Solutions.
In the next three years, the twenty seven states of the European Union (EU) will have to finalize the implementing acts for the eIDAS2 regulation and issue digital identity wallets to their citizens. Although the Architecture Reference Framework (ARF) defined by the EU expert group has clearly identified mandatory standards for several parts of the wallet, such as the credentials formats, or the verification or presentation protocols, it has not mandated standards on how to secure of the...

June 07, 2024
12:10 - 12:30
Manipulative Digital Identity: What is Manipulation in the Context of eIDAS Recital 3?
Online manipulation is mentioned in several EU Regulations as one of the cyber threats that need to be countered. Recital 3 in the eIDAS 2.0 regulation also mentions manipulation as a threat that the European Digital Identity Wallet and other subjects covered in eIDAS are to address. This talk will detail from a normative perspective what manipulation is and how online manipulation has specific traits. From that perspective the way the EUDIW is discussed and how it can aggravate or reduce...


June 07, 2024
13:30 - 13:50
What's the Right Balance Between Decentralization and User Experience?
Self sovereign identity has been the ideological framework for decentralized identity solutions. Based on the principles of data ownership, control and consent sharing, this framework has produced highly decentralized, privacy preserving solutions that place a lot of responsibility on the user. After 4 years developing on of the most decentralized and privacy preserving decentralized identity solutions (Polygon ID) and testing the product in the Web3 space, we can share our learnings and...

Polygon Labs

June 07, 2024
13:50 - 14:10
The Data Sharing Ecosystems and Trust without EUDIW
eIDAS version 2 has set in motion and energized identity professionals to think about and work on sharing attributes related to identity data. eIDAS version 2 provides a possible framework and set of technologies to do so. However, that framework does not match with a lot of technical and business practices already in use. In Belgium an ecosystem is forming to perform data sharing in a way which is adapted to the needs of the different existing stakeholders: data subjects, sources, attribute...

Belgian Mobile ID

June 07, 2024
14:10 - 14:30
Identity is Already Decentralized. We Need Better Ways to Prove it
For decentralised identity to reach its full potential we need high levels of trust and high levels of inclusion. As a community we have developed some great standards and practices for identity verification, but they mostly rely on having strong documentation issued by a government if you want to gain the higher levels of trust. The reality is not everyone has strong documentation and not everyone has access to digital technology to verify that documentation remotely. For example, in the UK...

ID Crowd

June 07, 2024
14:30 - 14:50
Food Supply Chain: Pioneering a Digital Farm Wallet with a Consortium in New Zealand
In the rapidly evolving agricultural sector, the importance of data management and sharing has never been more critical. Traditional methods are no longer sufficient; they create compliance burdens, inefficiencies and face a lack of trust. New Zealand is undertaking a transformative approach with the Digital Farm Wallet pilot, conceived by the Trust Alliance New Zealand (TANZ), a non-profit industry consortium recognising that trusted data sharing is essential for the growth of New...

Scheddebrock Ltd.

June 07, 2024
14:50 - 15:10
Will EUDI Wallets be Able to Support the Digital Euro?
The European Central Bank is busily preparing for a potential launch of a Digital Euro, that would provide an electronic alternative to cash, significantly changing how we send money to each other. Any such system will have to meet an exacting set of requirements - including the ability to support massive scale and protecting of the privacy individuals whilst preventing fraud and money laundering. This talk will explore the potential role of EUDI Wallets in meeting these requirements,...

Consult Hyperion

June 07, 2024
15:10 - 15:30
Decentralized Federation: A New Trust Model Built on Existing Systems and Connecting Trust Registries
What would happen if standards-based digital credentialing technology becomes widely accessible? Any entity, large or small, can start issuing and verifying within weeks, days or even hours. Then, the initial adoption of digital credentials will mostly be driven by ‘local’ needs. This is inevitable due to the decreasing cost and complexity of technology. However, as more and more begin to issue credentials on their own terms with little to no coordination, even when the technology...

Identity Woman in Business

Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch