Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Event Recording
Welcome to the European Identity & Cloud Conference
Dec 22, 2017
Learn all you need to know about the future of information security today!
Event Recording
Innovation, Agility, Usability - Getting the Most out of Your CIAM Strategy
Dec 21, 2017
Panel at the Consumer Identity World 2017 APAC in Singapore
Event Recording
The Role of Consumer Identity in Driving Enterprise Business Value
Dec 21, 2017
Panel at the Consumer Identity World 2017 APAC in Singapore
Event Recording
The User Experience Panel
Dec 21, 2017
Panel at the Consumer Identity World 2017 APAC in Singapore
Event Recording
How to Work Together in a Privacy Preserving Way to Mitigate Risks
Dec 21, 2017
Panel at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Colin Wallis - An Introduction to Kantara, its mission, work, structure and business model
Dec 20, 2017
Kantara Workshop at the Consumer Identity World 2017 APAC
Event Recording
Katryna Dow - How Consumer Identity is approached by Meeco
Dec 20, 2017
Kantara Workshop at the Consumer Identity World 2017 APAC
Event Recording
Eric Lee - CIAM Challenges in Driving Customer-Centric Digital Transformation
Dec 20, 2017
Kantara Workshop at the Consumer Identity World 2017 APAC
Event Recording
What is CIAM and why do we need it?
Dec 20, 2017
Kantara Workshop at the Consumer Identity World 2017 APAC
Consumer Identity World 2017 APAC
15 videos
Videos from the Consumer Identity World 2017 in Singapore
Event Recording
Don Thibeau - Trust Frameworks: Their Critical Role in Governing Identity Systems
Dec 19, 2017
Session at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Gerauld Fiel Rivera - Marrying CIAM and Your Purpose to Jumpstart Your Identity Strategy
Dec 19, 2017
Keynote at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Allan Foster - Power to the People: Privacy, Trust and Data
Dec 19, 2017
Keynote at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Rashmi Vittal - Earn Your Customers’ Trust: Building Deep Customer Relationships Gradually through Progressive Identity
Dec 19, 2017
Keynote at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Tom Wills - Customer Authentication Strategies in an Evolving Technology, Threat and Regulatory Environment
Dec 19, 2017
Session at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Graham Williamson - Privacy in the Asia Pacific: CBPR vs. GDPR
Dec 19, 2017
Session at the Consumer Identity World 2017 APAC in Singapore
Event Recording
Dr. J.R. Reagan - Identity 4.0: Scaling for the Industrial Internet
Dec 19, 2017
Keynote at the Consumer Identity World 2017 APAC in Singapore
Webinar Recording
Step-by-Step Guide to GDPR Compliance
Dec 13, 2017
With less than 250 days left till the dreaded EU General Data Protection Regulation (GDPR) comes into force, organizations around the world are feeling increasingly uneasy. Any company, both large and small, that wants to continue doing business in the European Union must comply with GDPR or face harsh penalties.
Event Recording
Peter Groeneveld - Implementing Consumer IDaaS for Your Smart Thermostat
Dec 10, 2017
Customer Case Study at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Gauthier le Masne - Reinvent the Air France KLM Customer Experience
Dec 10, 2017
Customer Case Study at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Yann Lechelle - Personal Voice Assistants: How Personal, How Much Assistance?
Dec 10, 2017
Presentation at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Kannan Rasappan - Blockchain-based Pseudonymous Identity Provider
Dec 10, 2017
Presentation at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Khanh Dang Ngo - CIAM, Privacy & the Blockchain in Financial Markets
Dec 10, 2017
Presentation at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Gil Bernabeu - There Will Be No Growth in the Digital Service Market Without Privacy
Dec 10, 2017
Presentation at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Mobile Ecosystem Forum Workshop: The Trust Advantage
Dec 10, 2017
Workshop at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Mobile Biometric Authenticators: The Smartphone as Key
Dec 10, 2017
Discussion panel at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Make Consent Work with More Transparency and Less Control
Dec 10, 2017
Discussion panel at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Accepting Mobile Authentication: How to Integrate with E-Commerce
Dec 10, 2017
Discussion panel at the Consumer Identity World 2017 EU in Paris, France
Webinar Recording
Redefining Access Governance for Security and Fraud Prevention in Critical Applications
Dec 08, 2017
Continued digitalization of modern organizations, supported by the growing adoption of cloud computing, big data and other innovative information technologies, shows no signs of slowing down. Critical business data such as corporate intellectual property, financial documents or sensitive personal information, which traditionally have been kept in the most secure on-premises systems, must now be made accessible to the outside world: remote offices, mobile workforce, business partners, sometimes even the whole Internet.
Event Recording
Martin Kuppinger, John Tolbert - Balancing User Experience, Privacy and Security for the Connected Consumer
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Christian Goy - Approaching Tomorrow Through a New Lens
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Corné van Rooij - How Consent Can Build Customer Intimacy
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Thom Langford - Won’t Somebody Think of the Customers Data?!
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Rooly Eliezerov - How the Upcoming Wave of Identity Innovation Will Impact Society and You
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Katryna Dow - Harnessing CIAM, Regulation, Privacy and Customer Inclusion to Drive Digital Transformation
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Tim Maiorino - GDPR Is Coming
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Dennis Rijntjes, Daniel Vijge - Deepening Traveler Relationships through CIAM
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Joni Brennan - Consumer ID will Move GDP
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Cécile Wendling - Insurance in the Digital Age
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Martin Kuppinger - What Does It Take for a Complete CIAM Solution?
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Event Recording
Angelica Steinacker - How to Build a Secure and Successful Consumer Relationship
Dec 08, 2017
Keynote at the Consumer Identity World 2017 EU in Paris, France
Consumer Identity World 2017 EU
26 videos
Videos from the Consumer Identity World 2017 in Paris, France
Event Recording
Colin Wallis - Overview of Kantara's Work
Dec 07, 2017
Kantara Workshop at the Consumer Identity World 2017 EU
Event Recording
Mark Lizar - Kantara Initiative's Consent and Information Sharing Workgroup
Dec 07, 2017
Kantara Workshop at the Consumer Identity World 2017 EU
Event Recording
Thorsten Niebuhr - Kantara Initiative's Identity Relationship Management Workgroup
Dec 07, 2017
Kantara Workshop at the Consumer Identity World 2017 EU
Event Recording
Corné van Rooij - Kantara Initiative's Consent Management Solutions Workgroup
Dec 07, 2017
Kantara Workshop at the Consumer Identity World 2017 EU
Webinar Recording
Authentication & Authorization for the Microservices World
Dec 06, 2017
As businesses are expanding their presence in the cloud, they are increasingly looking into innovative approaches towards software development and operations that allow them to bring their applications to the market faster, to make them more adaptable and scalable to the ever-changing business requirements.
Webinar Recording
Identity and Access Management for Microsoft Azure and SharePoint Online
Dec 01, 2017
As Microsoft’s cloud solutions – including Microsoft Azure, Microsoft Office 365, and Microsoft SharePoint Online – are gaining more market share, integrating these platforms into existing enterprise IAM environments becomes essential. As more and more sensitive corporate data is moved to the cloud, ensuring strong information protection, secure access for employees, partners or customers, and, last but not least, compliance with the stringent regulations like GDPR, is impossible without a unified IAM across all on-premises and cloud systems.
Webinar Recording
Understanding the GDPR Impact on Corporate IT
Nov 29, 2017
The upcoming General Data Protection Regulation (GDPR) can be a major challenge for any organization established or just doing business in the European Union. Soon, failing to properly protect personal information of EU residents may lead to harsh financial penalties, so organizations are scrambling to understand the impact of GDPR on their processes, applications and systems and to adapt to the new requirements accordingly.
Webinar Recording
Revised Payment Service Directive: Understanding Its Technical Requirements for a Smooth and Secure Customer Experience
Nov 17, 2017
In less than 24 months, banks will have to comply with the Revised Payment Service Directive, commonly called "PSD2". The directive will introduce massive changes to the payments industry, removing the banks’ monopoly on their customer’s data. It will radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to achieve this, banks and TPPs must put the technical requirements in place in a secure way.
Webinar Recording
Connected Car: Putting Digital Identity Behind the Wheel
Nov 15, 2017
The Internet of Things comprises of a diverse range of devices – from industrial sensors controlling critical manufacturing processes all the way to home devices like smart TVs and fridges. The idea of connecting a car to the internet started as an upgrade to the vehicle’s onboard entertainment system. The concept quickly evolved and branched into numerous market segments including navigation systems, safety and diagnostics, toll payments, and fleet management.
Webinar Recording
Industrial Control Systems: Understanding the Access Risks and Security Challenges
Nov 10, 2017
For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks.
Webinar Recording
Improving Agility and Reducing Cyber Risks with Business-Driven Security Policy Management and Automation
Nov 03, 2017
Today’s enterprises are under continuous pressure to support new digital transformation initiatives, to adopt modern technologies like the cloud and software-defined data centers (SDDC) and, of course, to stay protected from external and internal cyberthreats. With the increasing pace of business, achieving greater agility and efficiency through automation of business processes is becoming one of the key challenges for IT. Unfortunately, the resulting dramatic increase in complexity of heterogeneous IT infrastructures combined with growing sophistication of modern cyberthreats has made...
Webinar Recording
Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale Unternehmen
Oct 25, 2017
Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen,...
Webinar Recording
Security Management im digitalen Unternehmen: Business-orientiert, agil, effektiv
Oct 20, 2017
Wie schön waren die Zeiten, in denen man die physische wie digitale Sicherheit in seinem Unternehmen als eine Art Ritterburg mit umlaufendem Wassergraben („Perimeter“) abbilden konnte. Nur wenige, gut bewehrte und streng bewachte Zugänge („Firewalls“) sorgten dafür, dass der Austausch zwischen drinnen und draussen kontrolliert erfolgte und Raubritter wenig Möglichkeiten hatten, sich unberechtigt Zugang zu verschaffen.
Webinar Recording
GDPR: The Six Critical Steps to Compliance and Brand Differentiation
Oct 19, 2017
From May 2018 when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. Companies collecting such information from their customers will have to adapt to fundamental changes both in the very definition of personal data and in technical requirements around its secure and privacy-enhanced processing, including topics like consent management, data portability and the right to be forgotten. You will also understand why leading companies, however, will look beyond compliance to how they can enhance their customers’...
Webinar Recording
Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM
Oct 18, 2017
Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations and to provide frictionless user experience. CIAM solutions allow businesses and public-sector agencies to gather more information about the consumers while maintaining compliance with the current and upcoming data protection regulations like the EU GDPR and PSD2.
Webinar Recording
The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018
Oct 13, 2017
Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services. Enterprises want to collect, store, and analyze data on consumers to create additional sales opportunities and increase brand loyalty.
Webinar Recording
Top Considerations for Selecting an Identity and Access Management as a Service Vendor
Oct 06, 2017
As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high.
Webinar Recording
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices
Sep 29, 2017
In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are increasingly looking into new approaches to make their applications more flexible, scalable and easier to maintain and modernize. In recent years, service-oriented architectures and microservices in particular have become the preferred method for many developers to create modular and adaptable enterprise...
Webinar Recording
The Crucial Role of Identity in Securing Industrial IoT
Sep 27, 2017
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security.
Event Recording
Steve Tout - Risk Aware IAM for an Insecure World
Sep 23, 2017
In a world full of uncertainties and data breaches, Identity and Access Management (IAM) must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction. With such large-scale breaches becoming commonplace, it is more important than ever to integrate threat intelligence insights proactively into authentication workflows. Risk aware IAM requires business processes to be enhanced by deeper integration with modern security solutions and automated within an organization’s security operations center...
Event Recording
Heather Flanagan - Consumer ID will Move GDP
Sep 23, 2017
Heather Flanagan talks about the confidence that is needed to accelerate the digital economy and now business and governments can work together toward that common goal of growing the economy.  Digital ID is how we get the confidence as a platform to grow the economy.
Event Recording
John Tolbert - The CIAM Solutions Market
Sep 23, 2017
KuppingerCole's Lead Analyst John Tolbert presents the findings from a recently published Leadership Compass on CIAM solutions
Event Recording
What is CIAM and why do we need it?
Sep 23, 2017
Panel discussion at the Kantara Workshop
Event Recording
Eve Maler - UMA deep dive - GDPR, PSD2 - pivot to CIAM
Sep 23, 2017
Presentation at the Kantara Workshop
Webinar Recording
Unstructured Data – A Blind Spot for GDPR Compliance
Sep 22, 2017
While many (but not enough) organizations have finally begun preparing for GDPR compliance, there are still important steps to take. When in May 2018 the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change.
Webinar Recording
The New Role of IAM in the Age of Digital Transformation
Sep 21, 2017
Organizations are under pressure to change in the current age of Digital Transformation. One of the key differentiators of innovative digital business models and thus new revenue streams is the profoundly changed relationship to customers and consumers. Creating innovative consumer services, collecting and managing better customer information and even just optimizing the reach of everyday marketing activities – all this depends on the ability to manage consumer identities in a flexible, scalable and secure way.
Webinar Recording
Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation
Sep 20, 2017
Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as...
Event Recording
Colin Wallis - Programmatic Advertising Is Dead, Long Live Consumers! Really?
Sep 20, 2017
The truly awful practice of tracking through cookie matching may finally have found its nemesis in combined effects of ad blockers, new browsers, and the GDPR.  But there is still a big headwind to be navigated before we can say the job is done. What could be the role of industry consortia like Kantara to help bring about improved privacy - aware practices and education?  In this presentation, we overview the landscape and the forces for 'good'.
Event Recording
Grad Conn - Marketing to the Future: A CMO’s Roadmap for Customer Experience Management
Sep 20, 2017
Event Recording
Phil Lam - It Takes a Village to Protect Your Customers Online
Sep 20, 2017
When large-scale breaches occur, they not only hurt the impacted service but also erode the trust our customers have in online commerce as a whole. Protecting our customers online can no longer be a siloed activity but need to be coordinated among service providers to ensure customers continue to transact with confidence online. The current market of consumer identity protection solutions are limited in scope and capability. Credit checks, insurance, concierge services when things go wrong only provide mechanisms to mitigate losses after an incident has occurred. A new set of innovative...
Event Recording
Jason Rose - Getting to Know You: Building Deep Customer Relationships Gradually through Progressive Identity
Sep 20, 2017
Consumer Identity World 2017 USA
16 videos
Videos from the Consumer Identity World 2017 in Seattle, USA
Event Recording
Christian Goy - Approaching Tomorrow Through a New Lens
Sep 19, 2017
We share how understanding the human mind and the principle of behavioral economics can alter the way we approach product ideas, new thinking and what the future might/could look like, let's say, for self-driving cars or smart cities.
Event Recording
Ryan Fox - The Role of Financial Institutions in Providing Trusted Identities Beyond Banking
Sep 19, 2017
Keynote at the Consumer Identity World 2017 in Seattle, USA
Event Recording
Tim Maiorino - GDPR is coming, what is it and why does it affect me anyway?
Sep 19, 2017
As if Data Protection wasn't regulated to the bone already, Europe has come up with a new set of rules introducing a new level of regulation – in terms of detail, scope and in terms of applicability. The new rules have significant impact on how business are required to structure their internal processes, how they allocate responsibilities and – in general – how they focus on personal information.
Event Recording
Christian Goy - The “Why” Behind Customer Journeys
Sep 19, 2017
People are notoriously unreliable witnesses to their own thoughts and motivations. However, the ability to design behavior-based solutions is the common denominator of every successful modern brand. Behavioral science is the way to navigate the chaos of choice and during this keynote we will share how to turn behavioral economic principle into practical brand and product success stories.
Event Recording
From Dumb Cookies to Informed Consent: Privacy-by-design as a Strategic Requirement
Sep 19, 2017
This panel includes a look at the GDPR requirements, with an emphasis on the business opportunities for creating closer customer relationships when moving to informed consent; including the ability to potentially convince customers of moving to non-freemium models and paying for better service. We also consider the impact on how the customer journey will change to gain consent for additional purposes.
Event Recording
How to Work Together in a Privacy Preserving Way to Mitigate Risks
Sep 19, 2017
Digital identity is central to all electronic transactions. Prevention of credential misuse is the first responsibility of identity management professionals today. Proper identity management includes identity vetting, issuance of credentials, risk-appropriate authentication and authorization, auditing, and more. Regulations such as GDPR also mandate that identity management systems must work to preserve the privacy of users. This session explores contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.
Event Recording
The User Experience Panel
Sep 19, 2017
The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. This combination must be taken seriously to provide a smooth Customer Experience (CX) and to guarantee that every consumer can control the access of his personal information. This panel discusses what is important for good User Experience and how you can create it without getting trouble...
Webinar Recording
Cognitive Technologies and the Future of Identity & Access Management
Sep 15, 2017
Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.
Webinar Recording
Consent Lifecycle Management: Consumer IAM’s Core Capability?
Sep 13, 2017
2018 is going to be a hell of a year for nearly every organization operating within the European Union. Not only the dreaded General Data Protection Regulation (GDPR) will finally take effect next May, introducing massive changes to the way companies will have to deal with personal information (not to mention hefty fines for violations), January 2018 also marks the implementation date of the revised Payment Service Directive (PSD2), which will break the banks’ monopoly on their customers’ account information.
Webinar Recording
GDPR Compliance Countdown to Adequacy – Minimum Preparation to be Compliant
Sep 08, 2017
With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds.
Webinar Recording
Security Benefits of Cloud Solutions
Sep 05, 2017
While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services can dramatically improve flexibility and scalability of critical business applications, reduce time-to-market for new products and even unlock completely new business models.
Webinar Recording
Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience
Jul 20, 2017
Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so.
Webinar Recording
Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment
Jun 29, 2017
As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers.
Webinar Recording
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
Jun 28, 2017
The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels.
Webinar Recording
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
Jun 23, 2017
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed...
Event Recording
Luca Martelli - The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Jun 14, 2017
Data, People and Software security: how does them relate to the GDPR security principles? In this new attack landscape, network-centric security is no longer enough because threats come from inside and outside the network. Oracle Identity SOC is an identity-centric, context-aware intelligence and automation framework for security operations centers, backed by advanced user behavior analytics and machine learning to spot compelling events that require automated remediation.
Event Recording
André Koot - From RBAC to ABAC in a Pragmatic Way
Jun 07, 2017
An Expert Stage presentation at the European Identity and Cloud Conference 2017
Webinar Recording
(Big) Data Security: Protecting Information at the Source
Jun 02, 2017
The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property.
Event Recording
Denis Joannides - Empowering the Digital Insurers
Jun 01, 2017
In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including governance and shares his lessons learned.
Webinar Recording
Identity 2.0: The Next Generation of Customer Identity
May 31, 2017
Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights. Companies and public sector organizations with deployed CIAM solutions can provide better digital experiences for and gather more information about the consumers who are using their services.
Webinar Recording
Getting Identity and Access Management Right – Even If SAP Is Involved
May 24, 2017
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application.
Webinar Recording
Architecting a Digital Strategy for PSD2 and Open Banking
May 18, 2017
PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region expose open APIs to allow other banks and third parties to access the data they hold on customers, when the customer has given their explicit consent. Designed to improve choice for customers, create more competition and stimulate innovation in the finance sector, the introduction of 'open banking' in the UK and...
Event Recording
Impressions of the European Identity & Cloud Conference 2017
May 15, 2017
Event Recording
Martin Kuppinger's EIC 2017 Summary
May 12, 2017
Event Recording
Nishant Kaushik - At the Intersection of Security, Innovation and Privacy: Invisible Identity
May 11, 2017
We’ve reached an interesting crossroads in identity management, as it transitions from being a niche area of interest to a major pillar in corporate IT. Balancing competing but complementary concerns of security, innovation and privacy requires a rethink of how we’ve traditionally used identity in IT. Invisible Identity is an architectural and functional imperative to make identity simply disappear from people’s sight, moving into the background as a silent protector and enabler. But this move is fraught with challenges, whether they be concerns about privacy or choices...
Event Recording
Hans Peter Bigl - Distributed IT: Secure Cloud Identity Management
May 11, 2017
Event Recording
Dr. Sridhar Muppidi - The Cognitive Era of Identity & Access Management
May 11, 2017
The Identity & Access Management we have known is changing rapidly. In addition to users, IAM should factor in applications, devices & things; It must evolve with digital business in mind; It must handle the complexity for monitoring and controlling access to not only demonstrate compliance but also to mitigate cyber risks. IAM should allow us to apply continuous learning, reasoning and human interact-ability. This will enable us to better handle the dynamic and ever growing requirements of today’s IAM.
Event Recording
Prof. Dr. Heiko Beier - Know your Customer: Deep Level Understanding of Customer Interaction with Smart Data Analytics
May 11, 2017
Event Recording
Scott Carlson - Just trust everyone and we will be fine, right?
May 11, 2017
Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls?  In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.
Event Recording
Prof. Dr. Sachar Paulus - Closing Keynote
May 11, 2017
Event Recording
Balázs Némethi - Financial Inclusion & Disenfranchised Identification
May 10, 2017
Event Recording
Joni Brennan - Accelerating Canada’s Digital ID Ecosystem Toward a More Trusted Global Digital Economy
May 10, 2017
Event Recording
Daniel Buchner - Blockchain-Anchored Identity: A Gateway to Decentralized Apps and Services
May 10, 2017
Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.
Event Recording
Victor Ake, Allan Foster - Digital Identity for the Internet of Things: Security, Privacy and Consent Challenges
May 10, 2017
IoT is a new digital channel to provide more products and services. However Security, Privacy and Consent in such environment are a major concern. To provide a secure interaction we need a “Holistic Identity” strategy, where identities represent humans, devices, things and their relationships; and privacy and consent management are also part of the strategy. Without Identity there are no security nor privacy, and this goes for all kind of entities! To implement a Digital Transformation strategy, it is necessary to provide more channels to face customers and citizens. The IoT is...
Event Recording
Ian Glazer - The Next Step for Identity Professionals: De-weaponizing Identity Systems
May 10, 2017
As the identity industry has grown it has become more valuable to all stakeholders: our customers, our enterprises, and our employees. With this growth identity professionals have become more valuable as well, and we have recognized this increase in value by starting to professionalize our industry. Attackers, too, have noticed identity’s increased value, specifically the value of identity systems, and have begun turning identity systems meant to deliver value into weapons used to cause harms both large and small.
Event Recording
Mark McGovern - Seeing through the Sandstorm: Recognizing Innovation
May 10, 2017
Today, Identity is a fast moving technology that attracts an unprecedented amount of attention from business leaders, investors and entrepreneurs. At times, it seems like only two things are moving faster (1) business expectations and (2) marketing noise. Being able to recognize true innovation and accelerate its adoption is critical to success, but it’s also incredibly hard. It requires a strategy that considers the unique challenges posed by Identity systems, the forces driving the market’s development of future capabilities, the risk posed by the new technology, and the...
Event Recording
European Identity & Cloud Awards Ceremony
May 10, 2017
The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security.
European Identity & Cloud Conference 2017
35 videos
Keynotes, interviews, and selected sessions from the European Identity & Cloud Conference 2017.
Event Recording
Martin Kuppinger - Opening Keynote
May 09, 2017
Event Recording
Prof. Dr. Udo Helmbrecht - Cybersecurity Strategies in the EU
May 09, 2017
Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on Network and Information Security (NIS). The keynote will provide an outline on emerging EU policy legislative context addressing improved capabilities, cooperation, crisis management and preparedness at EU Level. The second part of the keynote will focus on initiatives and synergies to support EU policy implementation that will on the one hand stimulate the competitiveness and...
Event Recording
Doc Searls - When the Customer Becomes the First Party
May 09, 2017
The time is coming when customers have the upper hand, and companies agree to their terms rather than the other way around. Doc Searls, leader of the VRM (Vendor Relationship Management) movement, co-author of "The Cluetrain Manifesto", and author of "The Intention Economy: When Customers Take Charge", will explain how customer independence and empowerment will make the GDPR’s dreams come true—for both regulators and companies, as well as for customers themselves.
Event Recording
William Mougayar - State of Business in Blockchains
May 09, 2017
Where we are, and where we are going in blockchain implementations and strategies. What are the implications for various industry sectors and stage of enterprise adoption? How to think about new blockchain-based business models?
Event Recording
Pamela Dingle - The Age of Federated Accountability
May 09, 2017
We are about to enter a decade where critical business-grade information is protected by the OAuth 2.0 framework. Congratulations are not yet in order. Our mission for the next decade is to not repeat our own identity history, and instead to build a system that is provably secure through test-driven automation and that takes a vicious approach to detecting anomalies.
Event Recording
Jackson Shaw - When will Identity and Access Management be Digitally Transformed?
May 09, 2017
Tired of paying hundreds of thousands or millions of dollars for IAM projects that don’t show benefit or eventually are considered failures? Us too! So we decided to do something about it. “Digital transformation is the profound and accelerating transformation of business activities, processes, competencies and models to fully leverage the changes and opportunities of digital technologies.” We took this to heart and radically changed our approach to our own customer IAM, how we (and our customers) connect to SaaS properties and how we leverage machine learning, advanced...
Event Recording
Mia Harbitz - Motivations and Constraints of Actors in the Field of Identity Management
May 09, 2017
An identity of some sort is necessary for almost all daily interactions in developed countries, and is becoming increasingly necessary in many developing nations. To interact with the public sector, it is imperative for an individual to have a legal identity that is anchored in a legally established, standardized, verifiable, and trustworthy source. All countries in the world have such repositories, and they exist either as civil registries or civil identification registers (or both). The 198 countries reviewed in this study have a civil registry and 171 have civil identification registers...
Event Recording
Dakota Gruener - ID2020 - Identity as a Cornerstone in Global Development
May 09, 2017
Event Recording
Dr. J.R. Reagan - Designing Industry 4.0
May 09, 2017
Around the world, industries are experiencing a digital transformation that is accelerated by exponentially growing technologies. The networking of ’internet of things, services, data and people’ will fundamentally change the future of individual companies, as well as transform market dynamics across a whole range of industries. This talk how to design for success in this new environment and the impact technology will have in shaping it.
Event Recording
Richard Struse - Let Them Chase Our Robots
May 09, 2017
The economics of cybersecurity have long favored the attacker. Adversaries skillfully harness automation to increase their advantage while benefiting from their victim’s fragmented and uncoordinated defenses. Automated Cyber Threat Intelligence (CTI) ecosystems hold the promise of changing these economics in favor of the defender. This keynote will highlight the promises of CTI along with the challenges we still must overcome if we are to realize the full potential of this opportunity.
Event Recording
Dirk Backofen - Managed Secure Identity for Enterprises, IoT & Consumers
May 09, 2017
Secure and unambiguous identities will be the next currency in the online world. Whether for information exchange or for online commerce in the consumer and the business segment, a secure identity will become more and more relevant over the coming years. A broad range of new services can be built up on this central element. This talk will provide information about the relevant technologies and the future business models.
Event Recording
Analyst Panel: The Future Role of Identity in Digital Transformation
May 09, 2017
Event Recording
Patrick Parker - Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows
May 09, 2017
Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today. In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques...
Event Recording
Jason Rose - Anonymous to Known: How to Grow Your Business by Mastering Customer Identity Management
May 09, 2017
You can’t sell to strangers. Customer identity and access management (CIAM) is the emerging technology that transforms unknown online visitors into known and loyal customers. Find out how CIAM can help your organization build trusted and lasting customer relationships. By progressively identifying online users from initial website visit to the creation of a full customer profile — businesses can build consent-based relationships that respect the new rules as outlined in the forthcoming GDPR. The great power delivered by CIAM also demands great responsibility. Learn how to...
Event Recording
Alex Simons - Identity Imperatives in the World of Cloud and Devices
May 09, 2017
The tectonic shift of enterprise IT to a world of cloud and devices is upon us. As enterprises around the world look to embrace the incredible opportunities and address the competitive pressures this tectonic shift creates, they are discovering that digital identity is the cornerstone technology of a successful modern IT estate. This tectonic shift brings a new set of identity design and architectural imperatives that legacy systems are poorly suited to address. Alex will discuss these trends, the new set of design and architectural imperatives they create and give examples of how these...
Event Recording
PATECCO's Thoughts on IAM in Relation to Service Based Digital Business Technologies
May 09, 2017
An interview during the European Identity & Cloud Conference 2017
Webinar Recording
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Apr 28, 2017
Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche Herausforderung und bedarf angemessener Prozesse und Technologien.
Webinar Recording
Making the Cloud a Secure and Easy to Use Environment
Apr 07, 2017
Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.
Webinar Recording
Digital Transformation in Government
Apr 06, 2017
Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed services. This webinar will investigate the challenges facing government and the opportunity digital transformation affords.
Webinar Recording
Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards
Apr 05, 2017
Companies that manage consumer identities and personal profiles have a bit more than one year left to comply with the new European General Data Protection Regulation (EU-GDPR).
Webinar Recording
Reducing Risk with User Behavior Analytics (UBA)
Mar 31, 2017
Business landscape is changing rapidly where most organizations, irrespective of the vertical, are transforming themselves into technology organizations. With the adoption of Internet of Things (IoT), the number of connected entities has increased significantly. Managing identities of people, things and other objects in an automated and predictive manner is becoming the new norm. Simultaneously, the burgeoning number of identities exposes a broader attack surface posing a big challenge to these organizations and their growth plans.
Webinar Recording
Creating Secure and Unified Next Generation Workspaces
Mar 30, 2017
A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management.
Webinar Recording
Personal data breach and the GDPR – Prevention, Detection and Notification
Mar 24, 2017
The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud...
Webinar Recording
Blockchain - How to Separate the Hype from Reality
Mar 23, 2017
Blockchain has taken the world by storm since the inception of Bitcoin. While the primary interest has been in the financial and insurance industry sector Blockchain technology has wider application. This webinar will describe the technology and separate the hype from reality, looking at some innovative Blockchain applications from identity management to the Internet of Things.
Webinar Recording
GDPR as opportunity to build trusted relationships with consumers
Mar 20, 2017
The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.
Digital Finance World 2017
4 videos
Videos from the Digital Finance World 2017
Event Recording
Christian Goy - The Future of Digital Finance
Mar 08, 2017
The financial world is pressured with ever-increasing change in customers’ demographics undermining banks loyalty-base, well-funded fintech startups looking to disrupt incumbents and a new generation of customers.In his session, Christian Goy will explore what value means to customers today, how redefining a brand’s customers by how they think, instead of who they are or what they do becomes more paramount, and how banks today can use behavioral economics to help predict the customer demands of tomorrow.
Event Recording
Martin Kuppinger - Findings from a Recent KuppingerCole Study on PSD2 Readiness
Mar 08, 2017
Event Recording
Robert MacDonald - The Alternate Truths of Identity Management
Mar 08, 2017
It is an exciting – and challenging – time in the identity management space for the Financial Services industry. Digital disruptors like IoT, Digital Transformation, the Cloud, Hybrid, Blockchain, Shadow IT, DevOps and more suggest a significant change in identity management. But what does this challenge mean for Financial Institutions? Join our session as we work through the alternate truths to find a way forward.
Event Recording
Dr. Khanh Dang Ngo - Regulation of Blockchain-based Platforms
Mar 08, 2017
Webinar Recording
Privileged User Monitoring as Key Element of Counter-Measures
Feb 22, 2017
The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services.
Webinar Recording
Improving Your SOC Efficiency with Advanced Security Analytics
Jan 25, 2017
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.