Authentication Trends and Standards - II

  •  TYPE: Track    START DATE: Wednesday, May 10, 2017     START TIME: 14:30    LOCATION:  AMMERSEE II
Parent Track


The density and variation of cybersecurity threats has reached a new extreme and continues to grow. Within enterprises, CISOs raise their budgets for threat intelligence and Rivileged User Management. Outside in the digital wilderness, the EU´s PSD2 reform of the financial sector is introducing Strong Customer Authentication as a legal requirement for any transaction valued higher than 10 €. Password-only seems to now really disappear…

  • Authentication Standards: Which are the relevant ones?
  • Risk based , Adaptive, Context based, Behaviour based - where is the real innovation?
  • PSD2 compliant authentication options and adoption strategies
  • Decentralized Authentication in blockchain based (Sovereign Identity) infrastructures


Results from a Recent KuppingerCole Leadership Compass: Adaptive Authentication

Date: Wednesday, May 10, 2017 Time: 14:30-15:30

Results from a Recent KuppingerCole Leadership Compass: Adaptive Authentication
Matthias Reinwarth, KuppingerCole • John Tolbert, KuppingerCole

Identity and Access Management (IAM) systems have continued to evolve significantly over the last two decades. Increasing security and improving usability have both been contributing factors to this evolution. Data owners and IT architects have pushed for better ways to authenticate and authorize users, based on changing risks and newer technologies. Businesses have lobbied for these security checks to become less obtrusive and provide a better user experience (UX). One of these such...

Killing the Password Once Again: Will the strong authentication providers finally succeed?
Anthony Nadalin, Microsoft • Don Thibeau, OpenID Foundation • Louis-Marie Fouchard, Atos Cybersecurity • Dr. Amir Alsbih, KeyIdentity • Christian Reuter, Yubico

With all the attempts for killing the password over the past years, the question remains: Will it ever happen? Passwords and other weak means of authentication such as PIN numbers are still the by far most widely used way to authenticate. On the other hand, we observe an uptake for strong(er) authentication, be it the built-in biometrics in mobile devices, be it cloud-based MFA, or be it easy-to-use and rather cheap tokens. Thus, the question is: Are we already reaching the "break-even" for...

Using FIDO to implement the W3C Verifiable Claims Model

Date: Wednesday, May 10, 2017 Time: 15:30-16:30

Using FIDO to implement the W3C Verifiable Claims Model
Prof. Dr. David Chadwick, University of Kent / Verifiable Credentials Ltd.

Today’s federated identity management infrastructures suffer from a number of problems, in particular with regard to the privacy of users. First, many Identity Providers (IdPs) are not willing to release the user attributes that Service Providers (SPs) require in order to provide the fine grained authorization they need. This necessitates the pulling of user identity attributes from other Attribute Authorities (AAs). In order to solve this 'attribute aggregation' problem, the...

Strong Authentication using Keys on your Devices Controlled by You
Dr. Michael B. Jones, Microsoft

The W3C Web Authentication enables web applications to sign in using stronger methods than passwords – using authenticators that utilize private keys held on your devices that are used with user permission, typically by employing a user “gesture” such as a biometric or PIN. This can also be used with the FIDO 2.0 Client To Authenticator Protocol (CTAP) protocol, which enables remote authenticators, such as those on phones, to be used when signing in.

Token Binding Standards and Applications
Dr. Michael B. Jones, Microsoft

The IETF Token Binding standards enable data structures to be bound to a particular TLS channel – preventing them from being stolen and reused in unintended places. Data structures that can be Token Bound include browser cookies, ID Tokens, Access Tokens, and Refresh Tokens. This presentation will discuss the Token Binding mechanisms, the kinds of threats they mitigate, and the current deployment status.

IaaS Cloud Services for the Paranoid

Date: Wednesday, May 10, 2017 Time: 17:30-18:30

IaaS Cloud Services for the Paranoid
Dr. Ravindar Bindra, Novartis AG

Many companies today are purchasing IaaS as an extension or replacement of their internal data centers and the Infrastructure team is given the task of offering the internal customers a PaaS for their hosted applications. The question of how to secure the data remains uppermost in the minds of CISOs and now even CIOs. For the security professional - it gives a green field in which to architect the utopia of The Perfect Design. When coupled with Operational reality, a more realistic, scalable...

Privilege Management @ BASF
Christian Schwenk, BASF SE

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany