Early-bird Discount
expires in
Register Now


Track II: Innovate

Track II: Innovate

Wednesday, November 15, 2023 14:30—16:30
Location: Sirius

The Identity Security I track explores the complexities of identity security in the modern digital landscape. Attendees can expect insights into strategies to minimize the impact of cyber attacks, the evolution of trust dynamics in federation agreements, and the challenges and solutions related to digital vulnerability. The track emphasizes the importance of adaptive and modern identity solutions, the role of privileged access management in cloud environments, and the transformative potential of dynamic trust models.

This track promises a more comprehensive understanding of modern identity security challenges, solutions and innovations. It emphasizes the importance of accurate identity verification and management, especially as organizations move between on-premises, cloud-based, and offline resources, all while leveraging the power of artificial intelligence (AI). Attendees will gain insight into the balance between ensuring robust security and optimizing the user experience in the face of digital transformation. The track also explores the fascinating concept of identities for AI, addressing the challenges and considerations of integrating AI identities into digital infrastructures. In addition, attendees will be introduced to operational concepts that prioritize control and manageability in information security systems, highlighting the importance of risk class-based access management.


Head of Advisory


November 15, 2023
14:30 - 14:50
How to Minimize the Blast Radius of an Attack?
In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.


November 15, 2023
14:50 - 15:10
Federation Bubbles - Dynamic Trust Moves Beyond The Commons
Traditional federation agreements are relatively static. It takes some effort to onboard an IdP and RP to each other, but once that trust is established, it's good until some exceptional event breaks the federation. But what about a more dynamic world, one where trust comes and goes based on context? What if users could be provisioned dynamically into a space based on trust from elsewhere? What if an isolated space could still function in a disconnected state and still have powerful...

Bespoke Engineering, LLC

November 15, 2023
15:10 - 15:30
Panel: Addressing Universal Digital Vulnerability with Modern Identity
The risk of being digitally vulnerable, or not being able to access basic services, affects us all. There can be no doubt that enhancing accessibility features across digital access journeys is tremendously important in helping people simply and safely connect with the digital world. But this doesn’t go far enough. What you’ll learn from this session: How can adaptive, connected, and balanced digital identity go further in addressing universal digital vulnerability at the root,...

Bespoke Engineering, LLC
Ping Identity

November 15, 2023
15:30 - 15:50
Enabling the Power of Digitalization with Identity-Based Access Privileges
As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has never been more vital. Strong identity-based access to applications not only fortifies security by allowing organizations to grant privileges based on verified identities, buy it also enables real-time threat detection, compliance adherence, and adaptive scalability. You’ll always know with...

November 15, 2023
15:50 - 16:10
Panel: Autonomous yet accountable: Do We Need Identities for AI?
This session aims to explore the practicalities and paradigms of integrating AI identities into current and future digital infrastructures. Topics will include the regulatory and governance challenges posed by autonomous AI operations, the technical requirements for creating and managing AI identities, and the technical and even legal considerations of recognizing AI as identifiable entities, focusing on accountability and traceability within various frameworks.


November 15, 2023
16:10 - 16:30
Operational concepts with the WALLIX tiering model
Lack of control and controllability is increasingly a problem in many internal IT departments today. The complexity of the solutions used has steadily increased. It is therefore all the more important that information security systems are optimally set up and easy to operate and administer. Establishing a risk class-based access management system makes sense for many reasons. In addition to meeting compliance requirements such as ISO27001, BSI IT-Grundschutz or industry standard 62443 and...


Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch