Early-bird Discount
expires in
Register Now

Agenda

Fortress Identity

Fortress Identity

Track
Wednesday, June 05, 2024 14:30—18:30
Location: A 05-06

The "Fortress Identity" track is dedicated to dissecting the critical nexus of identity management and security. In an age where digital identities are as valuable as physical assets, safeguarding them against escalating threats and vulnerabilities is paramount. This track explores innovative strategies, technologies, and frameworks to fortify identity systems. Join industry leaders and security experts as they navigate the complexities of authentication, authorization, and identity assurance, offering insights into building resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 4 CPE Credits for this track.

After attending this track, participants will be able to:

  • Discuss the critical nexus of identity management and security
  • Recognize the complexities of authentication, authorization, and identity assurance
  • Describe how to build resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats
  • Identify the potential risks of generative AI in Identity and security

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Moderation

Lead Analyst & CTO
KuppingerCole
Lead Analyst
KuppingerCole

Sessions

June 05, 2024
14:30 - 14:50
Securing Identity in a Digital Jungle: Battling AI-Driven Digital Injection Attacks
Digital ecosystems continue to grow and expand at record levels as organizations and governments seek to provide remote access and services to meet customer, citizen and employee demand. However, an unintended side effect of this growth is an ever-expanding attack surface that legacy identity verification systems can’t stand up to. Couple that with easily accessible and criminally weaponized generative artificial intelligence (AI) and machine learning tools, and there is an increasing...



June 05, 2024
14:50 - 15:10
Creating a Killer IAM Business Case
Enterprises today face a pivotal challenge: how to prepare for the future while maximizing current capabilities. In the heart of this challenge lies Identity and Access Management (IAM) transformation projects. While often seen as routine upgrades, these initiatives hold the key to unlocking a company's true potential. Imagine a journey where mundane processes are transformed into dynamic workflows, where every transaction becomes a strategic move. This is the essence of IAM transformation....

Saviynt
Saviynt


June 05, 2024
15:10 - 15:30
Generative AI in Identity and Security: The Potential and the Risks
Generative AI not only represents opportunities to transform Security for your organisation, but it creates new risks both in the hands of attackers and when deploying AI models within your technology stack. Wondering how you can responsibly use the benefits of AI in Identity and Access Management? Join our Senior Solution Engineer Arkadiusz Krowczynski to learn how you can apply AI capabilities to increase security, improve user experience and maximise operational efficiency.



June 05, 2024
15:30 - 16:00
Cyber Resilience: A Selection of Practical Patterns
Large and complex cyber systems, often spanning from legacy to cloud systems, are difficult to maintain and operate, including all questions on cyber security. Investing in cyber resilience helps not only in cyber security but also helps building, maintaining and operating these systems. We will explore some basic patterns for building robust and resilient cyber systems and reflect them on some practical use cases in typical on-premises/cloud scenarios and complex identity management...



June 05, 2024
16:00 - 16:15
The Fraud Landscape: Trends, Methods, and Countermeasures
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent objectives of fraudsters, as expected. However, insurance, gaming, telecommunications, health care, cryptocurrency exchanges, government assistance agencies, travel and hospitality, and real estate are increasingly targeted as cybercriminals have realized that most online services trade in monetary equivalents. In this session we will look at the trends in consumer...

KuppingerCole


June 05, 2024
16:15 - 16:30
Gamifying Cybersecurity & Level Up Your Identity Defense Strategy
In the dynamic realm of cybersecurity, safeguarding against identity-based threats is crucial for organizations. To fortify your defense strategy, Identity and security professionals need to continually augment their expertise and capabilities. The integration of gamification into identity-based cybersecurity has transformed the learning landscape, providing an immersive and pragmatic method to stay abreast of the latest attack vectors, exploits, and vulnerabilities.Embark on a journey into...

Delinea


June 05, 2024
17:30 - 17:45
Is Your Cloud NIS2 Ready?
With the European Union's Network and Information Security (NIS2) directive being in effect in October 2024, it is estimated that 40000 German companies do not realize they must comply with the directive. One of the big questions is how companies could prepare for the NIS2 Directive, especially if they are using cloud-native infrastructures. The talk will discuss on what are the steps needed to make the clouds to be ready for NIS2.



June 05, 2024
17:45 - 18:00
How to Adopt Passkeys for B2C in Regulated Markets
There is no need to insist on the benefits of passkeys in terms of UX, security and even cost reduction. Together with their widespread availability on all kinds of platforms, it is a no brainer that any digital service provider should jump on to implement support for them. A different question is how. For financial service providers, this question is particularly relevant. Among the many things to consider are: the critical nature of the assets they protect financial regulations they...



June 05, 2024
18:00 - 18:15
API Security and Management: Market Overview, Current Trends, Future Developments
From what used to be a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. APIs are now powering the logistics of delivering digital products to partners and customers. Almost every software product or cloud service now comes with a set of APIs for management, integration, monitoring, or a multitude of other purposes. This evolution only continues to accelerate....

KuppingerCole


June 05, 2024
18:15 - 18:30
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.Organizations are exploiting cloud because they help to accelerate business changes without the need for capital expenditure or lengthy procurement delays to obtain hardware. However, the dynamic nature of cloud services creates new security challenges that need a dynamic approach to governance and security controls.In addition, the...

KuppingerCole


Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch