Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Video
Martin Kuppinger's Top 5 IAM Topics for 2019
Dec 21, 2018
Where to put your focus on in 2019
Webinar Recording
Online Forms Are Out of Date – There Are New Ways to Sign Up Customers
Dec 20, 2018
An extreme lack of innovation has led to online forms dominating online buying for over two decades. The latest identity platforms use fast, easy, and secure technology to streamline customer sign-ups and simplify data.
Event Recording
Cybersecurity Innovation Night 2018 - Machine Learning & Deep Learning for Secure Future
Dec 20, 2018
Every year the number of cyber attacks is increasing. The types of targets include just about everyone, ranging from Fortune 500 companies, small and medium-sized businesses, critical infrastructure, and government agencies. Cyber-attacks are becoming more sophisticated as well as growing in frequency. Up to a million new malware variants are created every day. Each new threat group can be significantly different from previous ones and can be used in damaging attacks around the world. The Cybersecurity Innovation Night will focus on cutting-edge approaches and advanced solutions in...
Event Recording
Martin Kuppinger - User Behaviour: The Link between CyberSecurity and Identity Management
Dec 18, 2018
An increasing number of attacks, both external cyber-attacks and internal attacks, are well-thought-out and long-running. Particularly external, targeted attacks rely on the use of zero-day-exploits, which factually are yet unknown exploits. Thus, standard approaches such as signature-based analysis don’t help – you can’t detect what you don’t know. On the other hand, malicious behavior of internal users is hard to detect. Commonly, existing entitlements are used, but not as they should be used. Both challenges can be addressed by analyzing the user behavior and...
Event Recording
Dr. Torsten George - How Zero Trust is Creating a Game-Changing Security Experience
Dec 18, 2018
We got security wrong. Enterprise security is failing with two-thirds of organizations experiencing an average of five or more security breaches in the past two years, according to Forrester. Adding to the fervor is the impact of Cloud, Mobile, DevSecOps, Access. The entire experience of developing, deploying and protecting applications has forever changed. In today’s network perimeter-free world, organizations must adopt a Zero Trust Security model – and shift from ‘trust but verify; to assume users inside a network are no more trustworthy than those outside. And with...
Event Recording
Dr. Frank Dudek - Accelerating Cybersecurity – Is Your Information Security Program Up to Speed?
Dec 18, 2018
Internet content providers rely on fast, modern webapps and feature-rich web frameworks to drive customers to their sites. In a landscape of accelerating change and continuous code deployment, my keynote will discuss how a company’s cybersecurity program must evolve to remain effective in such fast-paced environments. 
Event Recording
Tim Hobbs - DevOps & Service Layers
Dec 18, 2018
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can be adjusted at the same pace. Modern data centers are configuration-driven, resilient environments designed to meet rapidly changing application needs, and modern IAM solutions must be in line with this paradigm. Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's...
Event Recording
Dr. Michael von der Horst - The Current Threat Landscape: A 360° View and Effective Remediation Strategies
Dec 18, 2018
In today’s cloud-connected world, the way we work has changed. But security has not. When over half of the PCs in most organisations are mobile, you need to protect your workforce wherever they access the internet – not just when they are in the office. You need to identify attacks as they are staged on the internet, so you can block them before they launch. Join us as Dr. Michael von der Horst, Senior Director for Cybersecurity Germany at Cisco, takes us through what we see out there “in the wild”. He will present effective defence and remediation strategies...
Event Recording
Paul Simmonds - From Network Protection to Data Security
Dec 18, 2018
"Zero Trust" is the latest security buzzword from the vendors marketing department; but what it actually means for you means should vary depending on your business requirements. Properly aligning security architecture to enable the business strategy of the organisation is the key to deliver a Zero Trust architecture. But the solution could be anything from implementing identity-aware firewalls to the extremes of "BeyondCorp"; Google's firewall-less global network when the security posture is identical whether you are in Starbucks or on the Google campus.
Event Recording
Klaus Hild - Predictive Governance – Leveraging the Power of Identity Analytics
Dec 18, 2018
In this presentation, SailPoint will explain why Identity Analytics will change the way companies will think about CyberSecurity, by adapting ‘Predictive Governance’. Predictive Governance will enable organizations to be more effective and efficient at governing access without increasing the risk.
Event Recording
Dragan Pendic - Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Dec 18, 2018
Businesses are more data-driven than ever, but inaccurate and manipulated information threatens to compromise the insights that companies rely on to plan, operate, and grow. Unverified digital resource is a new type of vulnerability - one that is  chronically overlooked by digital enterprises. With autonomous, data-driven decision making, the potential harm from unverified digital resources become an enterprise-level existential threat. And then, there's a wider cybersecurity aspect and how to address the following: - Data provenance verification - the history of data from its...
Event Recording
Martin Kuppinger - User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right?
Dec 18, 2018
User Behavior Analytics (UBA) or UEBA (User & Entity Behavior Analytics) is an important capability of a variety of products: Specialized solutions for UBA; IAM tools with built-in UBA capabilities; and various cyber-security products that also come with built-in UBA capabilities. The question to start with is: What is UBA really and how does it differ from e.g. Threat Analytics, SIEM, Access Governance, and other capabilities? Where is the benefit of UBA? Is it a nice-to-have or must-have in these days of ever-increasing cyber-threats? And if we go for UBA: How do we do it right?...
Event Recording
Yaniv Avidan - AI Powered Data Herding in Hybrid Cloud Environments
Dec 18, 2018
Having cloud software tools and services entering our core business processes, it becomes even more critical that we govern information across platforms, the diverse forms of data and at scale. Artificial Intelligence plays a significant role in enabling companies keep their business running faster, more protected in hybrid cloud environments, while optimizing the Hardware and Software stack.
Event Recording
Gal Helemski - How a Policy Based Approach Dramatically Improved Access Control and Authorization
Dec 18, 2018
Hear how a leading multinational Financial institution was able to evolve from Role Based Access Control (RBAC) to the new paradigm, Policy Based Access Control (PBAC), and learn what challenges this solved, and the ROI they were able to see from using PBAC.
Event Recording
Peter Gyongyosi - Can You Trust UBA? -- Evaluating Machine Learning Algorithms in Practice
Dec 18, 2018
The promise of every security solution is to detect the next attack, but verifying that claim is almost impossible. Attacks are extremely rare and tend to change: the ability to catch attacks that happened in the past say little about the ability to find things that will happen in the future and those breached are unlikely to share information and data about how that happened. In this  presentation  I will show the different approaches and metrics we found to measure the efficiency of the unsupervised machine learning algorithms commonly used in UBA products.
Event Recording
Alexei Balaganski - The Sorry State of Consumer IoT Security and How Can We Possibly Fix it
Dec 18, 2018
The Internet of Things has already become an integral part of our daily lives, whether we like it or not. In the office, at home, and even in the street, we are surrounded by a multitude of smart devices ranging from smart TVs and fridges to network routers, voice assistants and parking meters. No matter how different their functionality is, however, all these “things” share two major common traits: they are all connected to the public Internet and they lack the most basic security controls. For decades, security was never a priority for embedded device manufacturers. Modern...
Event Recording
Alexei Balaganski - Containers, Microservices, APIs: The Latest DevOps Security Trends
Dec 18, 2018
To stay competitive during the times of digital transformation, when business models and technology landscapes change daily, enterprises must reinvent many of their business processes to achieve new levels of agility and flexibility, and nowhere else this is more evident than in software development. As the demand for faster design, development and delivery of software is growing, organizations are adopting the DevOps methodology that fundamentally changes the ways software is produced. With a strong focus on practices like continuous delivery, infrastructure as code and test...
Event Recording
Richard Bell - Developing a Strategy for Managing Incidents
Dec 18, 2018
For many years now, the management of incidents has been a challenging, dynamic and somewhat accidental in response. Today, whatever the threat we face, there is zero margin for errors if affected and excuses are certainly a thing of the past. Planning for the worst-case scenario is now commonplace, yet is it tested? and who is involved? Developing the right strategy for your organisation and its operations is key to continued success and minimising the impact of any incident. This presentation intends to encourage the consideration of different approaches, thinking, and conversations...
Event Recording
Chris Burtenshaw - User Behaviour Analytics (UBA) - The Enterprise Value Proposition
Dec 18, 2018
This session explores what UBA is and the value it brings to enterprise security in context of other common controls and tools.  Chris will give some history of how user activity monitoring has changed, and its challenges, and the state today. Finally, we will discuss how this is changing and what to look out for as organisations are consuming more cloud-based services.
Event Recording
Dimitri Chichlo - What is the Role of a CISO in 2020?
Dec 18, 2018
In the past years, a CISO would mainly be chosen among the IT staff who expressed his interest for information security or by arbitrarily promoting someone from the inside to please the auditors with filling a headcount gap. Tasks and skills were mainly technical, focusing on patching, administering firewalls and installing antiviruses. With the years though, companies have made their IT systems the backbone of their businesses. Similarly, criminality has shifted to exploit online systems. Combination of both realities now requires that CISOs possess and demonstrate core competencies that...
Event Recording
Peter Dornheim - Build Up a Security Operation Center and Provide Added-Value to Business Operations
Dec 18, 2018
Make or buy? Budget annihilator or business driver? Only 2 questions which must be answered when building up a Security Operation Center. How to address these questions and how to start a project to establish a Security Operation Center in a traditional German manufacturing company is content of this session. - Start small, think big: Understand how to start a SOC project and deliver an added-value fast - Think big: Identify a SOC target vision which maps to your individual company situation - Be prepared: Learn about typical challenges during the SOC ramp-up...
Event Recording
Mans Hakansson - Beyond OAuth: Securing APIs with Policies & Attribute-Based Access Control
Dec 18, 2018
Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. -API security basics -Avoiding bad security practices -Overcoming OAuth limitations -Managing authorization as a microservice
Event Recording
Tom Hofmann - Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect
Dec 18, 2018
When we think of security in the OT / IoT space, we are very focused on technological measures and controls. However, the recent incidents in this field showed that security events are not only based on a failure of technical controls. The 2017 Triton malware attack on SaudiAramco is a good example of what can happen based on human behaviour. While the attacked Triconex SIS controller is protected by a physical switch, it seems that this switch has been left in program mode. The ongoing digitalization of operational technologies presents cyber security professionals a whole new challenge....
Event Recording
H. Huetter, B. Peeters and D. Roeper - Managing Complexity in a CIAM Migration Project - A Case Study of the ‘Steinberg ID’ Project
Dec 18, 2018
To handle the digital identities of customers efficiently is key to deliver valuable digital services. This entails a change of the core infrastructure, leading to a critical operation for many stakeholders and raising challenges in different domains. These challenges not only affect technical architecture and implementation, but also processes, communication and even organizational structures. In this talk, we will give an overview of how Steinbergapproached those challenges. This includes topics like: - How to handle the huge complexity of such a project, technically and...
Event Recording
Panel - Risk Assessment and Security Design
Dec 18, 2018
Zero Trust Security assumes that nothing in a companies ITinfrastructure like including users, endpoint devices, networks, and resources, is ever trusted. All interactions must be verified to decrease the chance of a security breach. Zero Trust Security ensures secure access to resources while significantly reducing the possibility of access by bad actors. In this paneldiscussion we will discuss the considerations companies should make before implementing Zero Trust Security and Zero Trust Security by Design.
Event Recording
Panel - AI and the Future of Cybersecurity
Dec 18, 2018
 Advanced analytical technologies will help organizations in their fight against cyber-attacks. These technologies assist in detecting potential attacks at an earlier stage, as well as enabling the identification of complex attack patterns that span various systems. In this panel we will discuss the role of AI in the future of cybersecurity, possibilities of using it as a weapon by adversaries and the possibility of developing preventing techniques using Machine Learning and Deep Learning. 
Event Recording
Dr. Rachel Suissa - Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber Leadership
Dec 18, 2018
The aim of this presentation is to map the comprehensive human factor and cybercrime landscape categories (Motivations, the category of the perpetrator, category of the targets and victims, opportunistic and targeted attacks, the jurisdiction of the target, technology versus social engineering). Mapping these two pillars provides indicators that can be integrated in AI cybercrime predictive analysis, construct a model of the man-cognitive system and a cyber leadership network based on the deduction of cyber policy challenges.
Event Recording
Panel - Future of Critical Infrastructure Security
Dec 18, 2018
More often we hear about the devastating effects the attack on critical infrastructure can have on the citizens of an affected city or a country. Yet we don't see large scale attacks yet being conducted. Panellist will discuss possible threats in todays world as well as the ways private sector and governments can collaborate to prevent such assaults on critical infrastructure.
Event Recording
Panel - Achieving Consistent Enterprise Security
Dec 18, 2018
In this discussion the panellists will speak about the types of attacks which enterprises should expect in coming years. The ways of DevOps integration into an enterprise security program will also be discussed together with best practice highlights.
Event Recording
Dragan Pendic - Application Security - Achieving Security at Speed and Scale
Dec 18, 2018
Modern software development for cloud-native world requires continuous application security to go along with continuous integration, continuous delivery, and continuous deployment. Sadly, even well-established application security programmes often can’t operate at the speed and scale required. We will look into the ways of rethinking legacy security infrastructure and processes and how to adapt in the complex world of digital business and advanced attacks.
Event Recording
John Tolbert - Defense-in-Depth: New Kinds of Tools for All the Layers
Dec 18, 2018
The principle of defense-in-depth remains a key design element for enterprise organizations. Although many have said that perimeters are going away, or identity is the new perimeter, the fact is that almost all enterprises still have perimeters. The names may have changed, and components may be declared “next-gen”, but there are still firewalls, VPNs, intrusion detection and prevention systems, etc. We will look at how new kinds of tools have become available to help protect against attacks from the application to the network layers.
Event Recording
Matthias Reinwarth - CIAM as a Building Block of an Online-Success Story
Dec 18, 2018
Consumer Identity and Access Management (CIAM) encompasses many aspects. On the one hand, it is about optimizing the usability of services through technologies and practices to make it easier and secure for users sign up for a service. For the service providers, CIAM is all about lifecycle management of identities of many kinds - ensuring that accounts are set up, changed, and deactivated (or deleted) in a timely, accurate and secure manner. And for even more people, it focuses on security and compliance through technologies and practices that facilitate auditing and governance activities,...
Event Recording
Martin Zeitler - Your Move to “the Cloud” Secured
Dec 18, 2018
There is a tremendous amount of business value that you can get from “the cloud”. But, there are a lot of challenges in adopting these services securely. The real question is how we can approach “the cloud” from a security perspective in order to really get that full benefit of the offerings.
Event Recording
Marko Vogel - Cyber Security as Part of Industry 4.0
Dec 18, 2018
 - More aggressive, complex and well organized: Cyber threat landscape on the rise - Cyber Security – added value for industry 4.0? - Industry 4.0 needs company-specific security strategies
Event Recording
Jochen Werne - The Future of Digital Business Security
Dec 18, 2018
The digital development spurts have captured all areas of life. Industry 4.0 is on everyone's lips. The digitization of all areas of work and life requires integrated and robust strategies and processes at all levels. Consequently, this poses many questions: How well prepared are economies and politics as well as the society as a whole with regard to cyber safety aspects? How do people react to change processes? Basically, what is the significance of the human factor in the overall context of digital safety and cybersecurity? Of course, there have been prior leaps in developments within...
Webinar Recording
Five Steps to Building an Effective Insider Threat Program
Dec 14, 2018
The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and even your own privileged employees who already have full access to your company's systems and sensitive data. Any of those can cause substantial damage to your business by leaking confidential information, disrupting access to a critical system or simply draining your bank account. The most privileged users in this regard are no longer the IT administrators, but the CEO or CFO, and the number of new...
Webinar Recording
The Power of Identity Context: How to Get the Right Context and How AI will Help
Dec 12, 2018
How did the phrase “Russian trolls” manage to take over the news? If anyone knew at the time that these were not actually American citizens, they would have had no power to influence. That’s what a lack of identity context will do to you.
Webinar Recording
Modern Endpoint Protection – Automating Prevention, Detection, and Response
Dec 07, 2018
“Antivirus is dead!” - we’ve heard talks like this for years. Some experts would point out that traditional signature-based products cannot detect zero-day attacks or sophisticated advanced threats. Others would even recommend getting rid of any 3rd party antimalware products because the one built into Windows is good enough. But can we really take these claims at face value?
Webinar Recording
Security vs. Innovation: Why Not Choose Both?
Dec 05, 2018
In a world where businesses compete and succeed on the basis of application-driven innovation, enterprises are challenged to deliver software to market faster than ever before. Simultaneously, they're grappling with insider and outsider cybersecurity threats, as well as stringent data privacy regulations such as GDPR.
Event Recording
Maximilian Möhring - Die Zukunft Digitaler ID ist Dezentral – Aber Nicht Blockchain
Dec 04, 2018
Die Identitätslandschaft ist voll von IAM-Systemen, Identifikations- und Authentifizierungsanbietern, verschiedenen Technologiestandards und wird durch nationale sowie branchenspezifische Normen geregelt. Die Lösung für dieses Problem ist die Interoperabilität der Lösungen indem der Markt vereint wird und die Integration bestehender Identitätsanbieter vereinfacht wird. Obwohl Blockchain neue ID-Lösungen liefern kann, löst sie nicht die Kernproblematik des Identitätsmarktes. Revolution wird durch die Evolution des bestehenden Marktes...
Event Recording
Martin Lum - Dezentralisierte Blockchain Identität BYODID ohne Zwischenhändler
Dec 04, 2018
Viele der neuen DID und Self-Sovereign Identitäts-Konzepten verlangen weitreichende neue Strukturen und Verfahren. Ihr Schwerpunkt ist der Austausch maschinell lesbarer Identitäts-Unterlagen zwischen Behörden und vertrauenden Geschäftspartnern. Anstatt Zwischenhändler abzuschaffen, so wie von den Blockchain Propheten versprochen, werden neue Führungsnetzwerke aufgebaut um technische Neuigkeiten traditionell zu verwalten.
Event Recording
Dr. Andre Kudra - Dezentrale Digitale IDs und die Vorzüge der Blockchain Technologie
Dec 04, 2018
Um den Dschungel von Authentifizierungsverfahren und digitalen Identitäten zu bändigen, werden oftmals Single Sign-on (SSO) Strukturen geschaffen. Dadurch wird es Nutzern ermöglicht viele Logins mit nur einer digitalen Identität zu verwalten und Authentifizierungsverfahren je nach  Bedarf  einer Applikation anzupassen. SSO-Applikationen haben jedoch einen entscheidenden Nachteil: Sie setzen ein Vertrauen in nur eine Instanz, z. B. den Entwickler der Applikationen, oder mehrere Instanzen voraus. Was wäre, wenn wir für jeden Onlinedienst oder...
Event Recording
Workshop - Mobile Apps und Single Sign-On
Dec 04, 2018
Wenn es um die Integration von Mobile Apps in die Single Sign-On-Umgebung geht, dann entstehen oft Interessenskonflikte zwischen Designern, der IT-Sicherheit und dem, was der Kunde wirklich möchte. Welchen Einfluss hat das gewählte Login-Verfahren auf die Sicherheit und welche Ansätze haben sich in der Praxis bewährt? Wie kann ein Kompromiss aussehen, der sowohl den Kunden zufriedenstellt, aber trotzdem ein ausreichendes Sicherheitsniveau bietet? Erfahren Sie, welche Best Practices es gibt und welche Rolle OAuth 2.0 dabei spielt.
Event Recording
Andre Priebe - CIAM & API Management
Dec 04, 2018
Customer Identity & Access Management und API Management sind als Business Enabler bekannt. Aber in Kombination sind sie sogar mehr als die Summe ihrer Teile.  Erfahren Sie, wie digitale Identitäten Ihrer Kunden und Ihrer APIs das digitale Ökosystem Ihrer Kunden infiltrieren, um sie noch stärker an Ihr Unternehmen zu binden. Verstehen Sie, warum die Weitergabe von Kontrolle an Dritte und externe Entwickler der Schlüssel zum Erfolg dieses Ansatzes ist und dass die Einhaltung von Standards Voraussetzung dafür ist.
Webinar Recording
Identity Verification & Authentication Made Easy
Dec 03, 2018
Business is undergoing change. The Digital Transformation affects business models and changes the way businesses interact with their customers. A seamless customer journey is a key success factor for the digital business. This journey starts with attracting the customer and includes steps such as registration, Identity Verification and the authentication of customers when they return.
Webinar Recording
Blockchain ID for the Enterprise: A Single ID? A Good Complement? Or Irrelevant?
Nov 23, 2018
Blockchain and the underlying concept of “Distributed Ledger Technologies” (DLT) have well passed the peak of initial hype. As always, focus is now shifting to real-world applications that allow companies to improve their business. It is less about cryptocurrencies and concepts with a global impact, but more about process and supply chain optimizations as well as better identity (ID) concepts. Blockchain IDs are being heavily discussed as the number of concrete product offerings is increasing in the marketplace. With organizations facing an ever-growing ID problem in their Digital...
Event Recording
The Future of Identity Management at Border Controls: Gateless and Multiple Biometric and Beyond
Nov 19, 2018
Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications.  Gateless border control and multiple biometrics, coupled with self-managed crypto-identity will be the future.  This may seem travel-specific, but the same identity that will get you into a country will also open a fully authorized bank account - with KYC/AML and the relevant National FinCrime agency...
Webinar Recording
Zero Trust Reality Check: Secure Access for Hybrid IT
Nov 16, 2018
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?
Cybersecurity Leadership Summit 2018 Europe
39 videos
Videos from the Cybersecurity Leadership Summit 2018 in Berlin, Germany
Event Recording
Cybersecurity Leadership Summit 2018 Europe Summary
Nov 14, 2018
Consumer Identity World 2018 EU
13 videos
Videos from the Consumer Identity World 2018 in Amsterdam, Netherlands
Event Recording
CX as the core of any CIAM
Nov 13, 2018
Customer Experience (CX) is the central starting point when it comes to the strategic definition of your CIAM. The management of millions of identities and the handling of several millions of interactions per day is a technical challenge that changes every day. However, ease of use, efficiency and joy of use by the customer are indispensable prerequisites. At the same time, it is imperative that every consumer can control access to his personal data. Managing customer information in a digitally changing economy with many business partners in need of access is one of today's biggest...
Event Recording
How Policy Based CIAM can Improve the Customer Journey
Nov 13, 2018
In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such as mobile, internet of things, social media, and big data, the approach towards customers is getting redefined. During this presentation, TrustBuilder’s Sales Director for Benelux Kurt Berghs will give some industry-based examples of how policy-based Customer Identity and Access Management (CIAM) can help with these new challenges.  For different markets such as finance,...
Event Recording
5 months of GDPR – status quo on implementation of the most extensive digital law in the world
Nov 13, 2018
How are companies, consumers and authorities taking the new regulation?
Event Recording
Panel: Blockchain, Identity and Privacy - How to Combine It?
Nov 13, 2018
Blockchain, Identity and Privacy: Three words that buzz, fade and mature.  The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead. Further, we discuss If and when blockchain-based identity projects reach critical mass in terms of user adoption, they could help get more decentralized services off the ground.
Event Recording
A Digital Society Needs a Digital ID
Nov 13, 2018
Our world is becoming more digital and more mobile every day. The sensitivity of information being exchanged online grows rapidly and data privacy is a real concern to many people. How are we facing new challenges to keep pace with today's digital transformation? Getting rid of all paper flows, taking KYC-process to the next level, improve customers’ experience, introduce a safer way to login and confirm transactions, be compliant with EU regulations and PSD2. Creating a digital ID in a country is one of the solution, but it requires more then just technology.
Event Recording
Panel: CIAM Strategy Best Practice
Nov 13, 2018
When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organization the consumer typically does this with two contrasting expectations. On the one hand, the consumer wants to benefit from the organization as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are...
Event Recording
Privacy By Design in Practice
Nov 13, 2018
Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations of a single country/region. Supporting each and every regulation as they emerge is challenging and greatly increases the maintenance cost. Furthermore, these kinds of regular modifications can lead to poor customer experiences. Leveraging well-known privacy by design principles into your system design strategy is a long-term and sustainable solution for most of these privacy challenges. Once these...
Event Recording
The End of the Password – How to Really Protect Digital Identity
Nov 13, 2018
In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack. Once a password is stolen, it opens the doors to fraudulent use and data theft. Furthermore, since most consumers link their online accounts at Amazon, eBay or Twitter to their Facebook or Google account, attackers only have to hack one password in order to gain access to the entire range of applications. This also enables them to easily compromise the complete digital identity of a user. All...
Event Recording
Consent Life Cycle Management
Nov 13, 2018
Consent Management is a crucial aspect of PSD2 and GDPR regulation. At initial thought, consent seems to be simple but from legal and regulatory perspective its complexity arises. Managing consent within an organization should be well planned with all units of businesses and audit trail to prove the veracity of the consent should be tied to identity and security systems of the organization.
Event Recording
Panel: How to Defend your Customer from Current and Future Threats
Nov 13, 2018
This  panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.  Learn best practices from data protection & privacy experts on how to use the latest defenses to secure your organization against the latest threats and to offer your customer a smooth customer journey without fears.
Event Recording
Data Privacy — Who Actually Cares and Why?
Nov 13, 2018
Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for advertisers and every other data mining company. But if we do care, what are the implications for marketers? What does it mean for the generation of products and services we develop? This session will highlight how we rationalize or perceive data-privacy, why we care, and what we expect from companies when...
Event Recording
Transform Your Customer Experience: Customer Identity Today and Tomorrow
Nov 13, 2018
Customers are increasingly expecting more from the businesses they interact with, especially as security and privacy breaches dominate headlines. Customer Identity and Access Management can help businesses transform their customer experiences. Join this session to learn about key use cases where organizations have leveraged CIAM to deepen their relationships with a broad spectrum of customers, businesses, and partners and to hear Okta's view of what they will demand in 2018 and beyond.
Webinar Recording
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication
Nov 09, 2018
KuppingerCole has published two related Leadership Compasses on Adaptive Authentication and Cloud-based Multi-Factor Authentication solutions. We define adaptive authentication (AA) as the on-premises deployments, whereas Cloud-based MFA is SaaS-delivered.
Webinar Recording
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
Nov 07, 2018
GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the concept of “consent,” which is fairly new for most data controllers. Now, with the GDPR regulation in force, parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easily as it was given.
Webinar Recording
Fine-Grained Policy-Based Access Control: Why & How?
Oct 19, 2018
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization control infrastructures have developed their own segment in the security market.
Webinar Recording
Assuring and Implementing Cybersecurity and Data Protection for Public Clouds
Oct 17, 2018
Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.
Webinar Recording
Buying Into Zero Trust? What You Need to Consider to Be Successful
Oct 12, 2018
As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to change the way we approach security, we need to think beyond the technology and focus on the gaps we need to consider.
Webinar Recording
Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDPR Compliant
Oct 04, 2018
Digital Business Transformation is a continuous process that affects all areas of doing business, with technology finally getting the right focus: The customer and his/her experience with your business. It is now all about providing that ultimate Frictionless CX (customer experience) so that users don't do that “one-click” towards your competitors.
Consumer Identity World 2018 USA
14 videos
Videos from the Consumer Identity World 2018 in Seattle, USA
Event Recording
John Tolbert - The Journey to CIAM Success
Oct 02, 2018
Consumer Identity and Access Management (CIAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts are set up, modified, and retired in a timely, accurate, and secure manner. And for still others it’s focused on security and compliance through technologies and practices that make governance activities such as attestations easy and complete, or adding a...
Event Recording
Patrick Salyer - The Digital Imperative: Build Trust with Customers, Don't Break It
Oct 02, 2018
Today’s customers, beset with endless choices, expect brands to understand their needs and deliver contextual experiences that reduce stress and increase convenience. But, these same customers don’t want this kind of personalization at any cost. Unfortunately, many businesses still employ “creepy” tactics when marketing to customers, breaking their trust. This, in turn, has led to the GDPR and a slew of newer data protection regulations. How do you win back the trust of customers and steer clear of regulatory punishment? Join us to learn best practices from CX...
Event Recording
Andrew Shikiar - Moving Beyond Passwords with Standards-based Strong Authentication
Oct 02, 2018
Event Recording
Dr. Hans Lombardo - Identity for a Connected World
Oct 02, 2018
  In this session, we will examine use of blockchain tech and smart contracts How the blockchain can support identity verification of humans (KYC), objects (KYO) and connected devices (KYD) Building a platform-as-a-service offering shared regulatory compliance services for humans, companies, objects, and devices.  Enabling development of new apps that need trusted connections between human, corporate, and device identities
Event Recording
Panel: Blockchain, Identity and Privacy - How to Combine It
Oct 02, 2018
Blockchain, Identity and Privacy: Three words that buzz, fade and mature.  The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead. Further, we discuss If and when blockchain-based identity projects reach critical mass in terms of user adoption, they could help get more decentralized services off the ground.
Event Recording
John Tolbert - The CIAM Solutions Market
Oct 02, 2018
Event Recording
Panel: CIAM Strategy Best Practice
Oct 02, 2018
When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organization the consumer typically does this with two contrasting expectations. On the one hand, the consumer wants to benefit from the organization as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are...
Event Recording
William Spruill - Trust and Privacy in Digital Identity Verification
Oct 02, 2018
Event Recording
Panel: Multi-Factor Authentication Options for Consumer Identity Solutions
Oct 02, 2018
Event Recording
Marisa Rogers - Privacy by Design for Consumer Goods and Services
Oct 02, 2018
Event Recording
Panel: How to Defend Your Customer from Current and Future Threats
Oct 02, 2018
Learn best practices from data protection experts on how to use the latest defenses to secure your organization against the latest threats and to offer your customer a smooth customer journey without fears.
Event Recording
Christian Goy - Data Privacy: Who Actually Cares and Why
Oct 02, 2018
Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for advertisers and every other data mining company. But if we do care, what are the implications for marketers? What does it mean for the generation of products and services we develop? This session will highlight how we rationalize or perceive data-privacy, why we care, and what we expect from companies when...
Event Recording
Prabath Siriwardena - Five Pillars of Consumer IAM
Oct 02, 2018
Transforming the customer experience is at the heart of digital transformation. Digital technologies are changing the game of customer interactions, with new rules and possibilities that were unimaginable only a few years back. Customer Identity and Access Management (CIAM) is a whole emerging area in the IAM, which is essentially an ingredient for digital customer experience. Today’s increasingly sophisticated consumers now view digital interactions as the primary mechanism for interacting with brands and, consequently, expect deeper online relationships delivered simply and...
Event Recording
Tim Maiorino - GDPR: Four Months in... And Now
Oct 02, 2018
A quick overview of how the perception of GDPR has developed over the last few weeks prior to 25th May 2018 and in the weeks following the date everyone had been waiting for and working towards for months and months. Is GDPR as dangerous as everyone thought? What are the most relevant questions, issues and tasks in practice?
Webinar Recording
Making Sense of the Top 5 Latest Cybersecurity Trends
Sep 27, 2018
Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night.
Webinar Recording
Access Control From an Userbase to Agency Applications in the Education Sector
Sep 26, 2018
The Ministry of Education in New Zealand can now control access from a wide user base to agency applications in the education sector.
Webinar Recording
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Sep 26, 2018
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption? Either on business optimization, by doing things better and more efficiently, or focusing on a...
Webinar Recording
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Sep 13, 2018
Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to mitigate risk, banks and TPPs must address the core regulatory technical requirements outlined by PSD2.
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Sep 12, 2018
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in advance, your customer's needs has on the one hand become a must. On the other hand, GDPR is significantly limiting the way how to create such intelligence through collecting personally identifiable data.
Webinar Recording
Privilege Management From the Cloud: Go or No-Go?
Sep 07, 2018
The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task.
Webinar Recording
Security and Governance in the Hybrid Multi-Cloud
Sep 05, 2018
Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.
Event Recording
Welcome to the European Identity & Cloud Conference 2019
Aug 15, 2018
Learn all you need to know about the future of information security today!
Event Recording
Jonathan Sander - Starting Real Cybersecurity Means Protecting Credentials
Aug 10, 2018
An Expert Stage presentation at the European Identity and Cloud Conference 2018
Event Recording
Marc Vanmaele - Empower IAM to Serve your Business Needs
Aug 10, 2018
An Expert Stage presentation at the European Identity and Cloud Conference 2018
Webinar Recording
Active Directory Disaster Recovery
Jul 13, 2018
Active Directory has grown both in importance and complexity in recent years, with businesses have become increasingly dependent on AD for authentication and authorization of mobile workforce and cloud-based applications. The new AD usage landscape has introduced greater complexity to the enterprise IT environment, raising the risk of AD disasters tied to human error and cyberattack. More and more frequently, attackers are using AD as an attack vector to compromise enterprises and, in some severe cases, wiping out the entire IT environment.
Webinar Recording
Patients, People and Things - Managing Identities in Healthcare
Jul 05, 2018
Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all require improved healthcare IAM. This will eliminate administrative expense, implement up-to-date governance and facilitate the exploitation of known trends in healthcare.
Webinar Recording
Securing your Hybrid IT Environment with Privileged Access Management
Jul 02, 2018
As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications in addition to existing ones. The conventional approaches of managing privileged access using controls native to the individual operating systems, and other internal access policies, are not only cumbersome to manage but add to the security risks in today’s hybrid IT environment.
Webinar Recording
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
Jun 27, 2018
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
Webinar Recording
Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management
Jun 27, 2018
Privilege Management has been a key element of both IAM (Identity & Access Management) and cybersecurity programs for years. However, increased complexity of modern corporate IT infrastructures and mounting pressure from compliance regulators force privilege management solutions to constantly expand their scope into new functional areas. From simple password vaults to advanced monitoring and behavior analytics to governance and compliance – a modern PxM solution permeates every corner of your enterprise IT infrastructure.
Webinar Recording
Managing Authentication and Access for Different Identities in Hybrid Environments
Jun 22, 2018
The Digital Transformation is driving enterprises in all geographies and throughout most verticals to become open and connected. These enterprises need to digitally engage with their customers, to technologically empower and mobilize their employees, to optimize their current business processes and to ultimately transform their products. At the same time, large-scale cyberattacks and wrongful exploitation of personal data has reached an all-time high and the associated risks are further increasing.
Webinar Recording
Best Practices of Privileged Identity Management
Jun 21, 2018
Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.
Webinar Recording
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance
Jun 19, 2018
Die Mengen an digitalen Daten, die Organisationen nun speichern und verarbeiten müssen, wachsen exponentiell. Dabei geht es nicht nur um die Digitalisierung bestehender Geschäftsprozesse - für viele Unternehmen sind die Daten selbst zum wertvollsten Gut geworden, das sie vor Lecks und unberechtigtem Zugriff schützen müssen.
Webinar Recording
Wie Sie mit der Kombination aus Technologie und Awareness eine zukunftsfähige Cybersecurity-Strategie entwerfen
Jun 15, 2018
Mehr Cyberangriffe, mehr Investitionen – aber zahlt sich das für Ihr Unternehmen aus? Die richtige Cybersecurity-Strategie und die richtigen Tools helfen, Ihre Budgets gezielt einzusetzen, den Erfolg zu messen und insbesondere die Risiken durch die stetig wachsende Zahl von Angriffen und deren immer raffinierteren Methoden zu reduzieren.
Webinar Recording
Cloud IGA: Built for Hybrid Reality
Jun 12, 2018
Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the move to cloud with a need to support an increasingly mobile workforce has entirely changed the IAM priorities for organizations.
Webinar Recording
Classification - the Intelligent Way to Ensure Strong Data Protection
Jun 12, 2018
As businesses are increasingly embracing the digital transformation, the volumes of information that a typical company has to collect, keep, transport and process is growing exponentially. Massive amounts of digital data are now being stored in various structured and unstructured formats across multiple environments – both on-premises and in the cloud – and businesses are struggling to keep up with the demands generated from the increasingly globalized regulatory environment.
Webinar Recording
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM
Jun 07, 2018
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed...
Event Recording
Impressions of the European Identity & Cloud Conference 2018
May 18, 2018
Event Recording
Martin Kuppinger's EIC 2018 Summary
May 18, 2018
Event Recording
[DE] Privilegierte Konten sichern. Angriffe stoppen.
May 17, 2018
An interview during the European Identity & Cloud Conference 2018 Privileged accounts, credentials and secrets are everywhere— on premises, in the cloud, on endpoints, and across DevOps environments. From personally identifiable customer information to critical intellectual property, they provide access to your enterprise’s most valuable assets. And attackers are after them. Right now.
Event Recording
Dr. Torsten Lodderstedt - Is Blockchain the Silver Bullet for Identity
May 17, 2018
As one of the winning presentations from the pre-conference Blockchain ID Innovation Night, Dr. Torsten Lodderstedt will continue his presentation about the limits of Blockchain Identity and the challenges that still need to be solved.
Event Recording
Rene Mulder - Challenges to the Wide-Spread Adoption of DLT-Based Self-Sovereign Identity
May 17, 2018
In a world where everyone has a large amount of different personas and credentials stored and managed by government, banks, socials and other, we call for consolidation and control while preserving privacy and security. With DLT a lot of that call can be answered, but how do we roll-out. There are some major challenges to adoption such as usability, network economics, governance, privacy and recoverability. How do we approach these challenges to reach a global self-sovereign identity platform?
Event Recording
Joni Brennan - The Economics of Identity
May 17, 2018
Around the world topics related to Digital Identity are becoming more and more critical. The world is beginning to recognize that Digital Identity lays the foundation needed for trust to perform myriad transactions in both the public and private sectors. Canada is moving rapidly toward the next Digital Identity Revolution. In this new model, capabilities from both the public and private sectors come together to deliver value to businesses, customers, citizens, and governments. This Digital Economy focused model prioritizes privacy and security by design as well as convenience delivered...
Event Recording
Ian Bailey - The OrgBook: Enabling the Digital Economy
May 17, 2018
British Columbia is a digital identity leader in Canada with the development of the BC Services Card and associated digital identity services. Building upon our experience in providing digital identity services for all British Columbians, the Province of BC is now collaborating with the Canadian Federal government and the Province of Ontario in establishing the Org Book for businesses. The Org Book provides verified digital claims about businesses and their representatives to enable streamlined government service delivery to businesses and to enable digital transactions in the broader...
Event Recording
Markku Rossi - Credentialess Cloud Access
May 17, 2018
Some of the most common causes of cloud security breaches include system misconfiguration, dynamic system updating and patching, unmanaged and leaked access credentials. The industry is applying different methods to overcome these challenges. These methods include dynamic system monitoring and alerting, automated deployment pipelines, and access management including credential and key management and rotation. But what if we could overcome all of these challenges with an immutable cloud infrastructure that could be accessed without any credentials which could be leaked or compromised?
Event Recording
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
May 16, 2018
In recent times, an increasing number of vendors announced a migration of their products towards microservices architectures. Some renovate their existing on premises IAM tools, others build new solutions with a new architectural approach. Factually, the idea isn’t that new, but the evolution in the field of microservices and containerization now enables flexible architectures that allow to distribute and scale components better than in the past. Furthermore, such architectures build the foundation for simplified hybrid cloud deployments, but also increased customization using APIs...
Event Recording
Jeff Jonas - Do you Know What You Know About the Data Subject?
May 16, 2018
GDPR obligates organizations to provide data subjects with access to their personal data. To comply, companies must be able to answer a seemingly innocuous but frighteningly difficult question: What do we know about the data subject? Further, organizations must respond to Data Subject Access Requests (DSARs) in a privacy-preserving, Privacy by Design-embedded manner. This is going to be problem as organizations are not going to be able to reliably find the data – as there are too many places look, data variability (Elizabeth vs. Liz) and other problems. In this keynote these...
Event Recording
Tim Hobbs - What Connects DevOps & IAM
May 16, 2018
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can be adjusted at the same pace. Modern data centers are configuration-driven, resilient environments designed to meet rapidly changing application needs, and modern IAM solutions must be in line with this paradigm. Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's...
Event Recording
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
May 16, 2018
Social, economic and technological changes are creating urgent new requirements for enterprise identity that enable interconnected digital systems. These new use cases require a governance framework that is consistent, integrated and efficiently managed. It also needs to provide increased security, privacy and reliability while being open. Learn how to respond holistically to these growing and evolving identity needs.
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
May 16, 2018
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters. This keynote outlines an entirely new approach — Zero Trust Security. This paradigm assumes that nothing in your corporate IT infrastructure — including users, endpoints, networks, and resources — is ever trusted,...
Event Recording
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
May 16, 2018
The focus of digital identity for consumers and enterprise is to remove silos, minimize redundant effort, enable better collaboration and provide a foundation for regulatory compliance. The challenge is that shared credentials for both commercial and public-sector organizations will require organizations to innovate to address requirements for physical access, protecting PII, delivering cross-agency services and re-thinking how digital consumers interact. In this session, we will discuss best practices across the industry that can be applied to enable interoperable credentials, we will...
Event Recording
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
May 16, 2018
The real problem behind the recent Facebook scandal is not primarily that a company like Cambridge Analytica has "gained" access to the personal information of millions of Facebook users and misused them for political manipulation. It is the business model of social networks itself: Letting their users deal privacy for some kind of communication convenience, without letting them at any point opt for both: the convenience of using social network services to digitally interact with others as well as control over the usage of their personal information.  Will such business models...
Event Recording
European Identity & Cloud Awards Ceremony
May 16, 2018
European Identity & Cloud Awards Ceremony
European Identity & Cloud Conference 2018
34 videos
Keynotes, interviews, and selected sessions from the European Identity & Cloud Conference 2018.
Event Recording
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
May 15, 2018
Distributed Ledger Technologies ("Blockchain") are the foundation for the most disruptive changes to business we are either already observing or that are on the road to becoming a reality. Based on these technologies, both new business models and fundamental changes to established models become possible – and what is technically feasible and economical beneficial will happen. However, there is still one missing element for fully leveraging the Blockchain potential: Identity. Identity in that context is far more than just identification, authentication, or authorization. It is...
Event Recording
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
May 15, 2018
Blockchain is much more than the technology behind its still most successful application – the Bitcoin. One of its key attributes is the immutable storage of information. Besides other applications, this enables trustful online business between two or more individuals – without the need of any intermediary. Thus, the Blockchain is said to introduce the “Internet of Trust” as successor of the “Internet of Information”. In various workshops with industry, we have identified how organizations cope with this possibly disruptive technology. While some try to...
Event Recording
Ralf Oestereich - We will Disrupt You
May 15, 2018
We will Disrupt You - Are AI, Blockchain, IoT a Blessing or Curse for an Insurance Company?
Event Recording
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO
May 15, 2018
ABNAMRO runs over 30 blockchain experiments, also involving digital identity capabilities. Co-operation has been set –up across various coalitions, and use cases are running a lot wider than just the banking and payments industry. Academia, building-, and shipping industries are also involved. What are the typical problems to solve with blockchain technology, and why? Some of the practical use cases and scenarios ABNAMRO is involved in today.
Event Recording
Doc Searls - How Customers Will Lead Companies to GDPR Compliance and Beyond
May 15, 2018
Nearly all advice on GDPR compliance is about what companies can do for other companies, or companies can do for themselves. There isn't much on what customers can do for companies, which may turn out to be the biggest help of all. That’s because customers are going to get more power all the time, and that’s exactly what the GDPR was made to encourage, whether regulators knew that or not. Doc Searls has been on this case for over a decade, leading ProjectVRM, which encourages development of tools and services that empower customers. (And which won a KuppingerCole award in...
Event Recording
Kim Cameron - The Laws of Identity on the Blockchain
May 15, 2018
Keynote at the European Identity & Cloud Conference 2018
Event Recording
Dr. Sridhar Muppidi - Identity Meets Fraud Protection to Establish Digital Trust
May 15, 2018
In this session, we will introduce a framework to establish digital trust based on capabilities from fraud protection and Identity. This will quickly and transparently establish a trusted, frictionless digital relationship for your customers, employees, and business partners. The session will also highlight key scenarios of adoption, best practices and leveraging emerging topics like decentralized identity networks.
Event Recording
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM
May 15, 2018
The AI and Robotic Process Automation revolutions are in full swing with record growth in both sectors as well as an explosion of new startups in this space. Not to be left behind, existing vendors are rushing to heed the call of AI and automation by sprucing up there existing product suites with conversational interfaces and smart AI-driven assistants. This session will cover the impact of these emerging technologies on the IAM product space and what can be expected in the near future.
Event Recording
Jason Rose - Realizing the full potential of Consumer Identity
May 15, 2018
Customer Experience is Everything and Everything is Digital. Digital transformation is now the center of marketing, advertising and sales strategy across every industry and region, with today’s consumers demanding a seamless and relevant experience across online and offline channels and devices. Consumers and Regulators Demand Privacy, Security and Control of Personal Data With the rise of increasingly severe cybersecurity incidents and concerns over poor or unethical business practices, governments and their citizens are rewriting the rules for online commerce and the collection...
Event Recording
Jackson Shaw - Fire Safety and Cyber-Security – Smoke Detectors are Not Enough
May 15, 2018
It takes most businesses over 6 months to detect a breach on their network. And while smoke detectors are proven to halve the death rate by fire, saving thousands of lives each year, detection is sometimes too late to prevent many buildings from burning to the ground. So imagine if it were possible to reduce the risk of a cyber-security fire starting in the first place. We are all familiar with the elements needed to start a fire: heat, oxygen and fuel. For data breaches, one key element of risk is abnormally high access entitlements. Detecting these abnormalities early, across your...
Event Recording
Eve Maler - The Evolution of Identity and its Importance for our Digital Lives
May 15, 2018
Identity is as old as mankind and adapted very well to its changing environments. From a simple look that determines who you are to a high frequency of multi-factor vehicle-to-vehicle authentication in autonomous driving - with Digital Transformation, Identity in digital form has become the enabler of complex horizontal value chains and ecosystems. Without authentication, authorization, and consent, those digital ecosystems of our every-day journeys will be less secure, less convenient, and less beneficial. The “consent" part most especially needs new thinking - from pure...
Event Recording
Carmine Auletta - Identity & Digital Trust
May 15, 2018
Trust is essential for a society to function. It’s even more critical in a digital society where transactions take place between parties that can only rely on each other supplied digital Identity. eIDAS Regulation provides – for the first time – a clear, universal and comprehensive Trust framework for the digital world. Thanks to eIdas, EU is today the country with the most advanced regulatory framework for Digital Trust but, the Regulation is not able to cope with the new challenges introduced by AI, IoT or Distributed Ledger Technologies. Software increasing...
Event Recording
Lukas Praml - Your Mobile Identity: Blockchain Ain't no Swiss Army Knife
May 15, 2018
Digital identity solutions are very wide spread and everybody is using them on a day to day basis. Mainly it can be distinguished between state issued IDs/eIDs which lack usability and are therefore not as successful as hoped and self-claimed or self-established eIDs (sometimes stored in the blockchain) where service providers have to rely on the honesty of the user. Additionally, self-claimed solutions mostly focus on the eID and don’t cover traditional ID documents. In this presentation, a mobile ID solution is presented that shows a combination of traditional printed ID documents...
Event Recording
Christopher Spanton - Blockchain and the Business of Identity
May 15, 2018
Identity and Access Management (IAM) within an enterprise environment presents complex challenges for any business. While new technologies, such as blockchain, have the potential to help solve some of these challenges, today bringing blockchain into solution oriented discussions can merely add to that complexity. In this session we’ll explore the pillars of blockchain based identity, and how business can use blockchain as a keystone technology to simplify many of the traditional challenges of IAM.
Event Recording
Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation
May 15, 2018
The future of IT security will depend on CISOs who are brave enough to build a new security model that is both innovative and unconventional. Gas distribution company, SGN, is blazing a trail that every company can follow. As a UK, critical infrastructure company SGN’s cloud-first strategy, provided an opportunity to redefine the security model with privileged access zero-touch and zero-trust as key principles. This thinking is enabling secure adoption of the cloud, IoT and frictionless user experience. The result is redefining traditional thinking.
Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.
Webinar Recording
Access Management Leading the Cloud Transformation Drive
Apr 27, 2018
To survive the fierce market competition in the era of Digital Transformation, businesses strive to be as agile as possible, to quickly adjust to constantly changing customer demands, industry regulations and modern technologies. Driven by cloud transformation and digitalization, modern companies are becoming increasingly open and interconnected, with massive numbers of people, devices and applications forming millions of relationships across geographically and technologically diverse environments.
Webinar Recording
An overview of the Leadership Compass: Endpoint Security Anti-Malware
Apr 25, 2018
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to help their customer successfully defend against these attacks.
Webinar Recording
Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-Risiken
Apr 20, 2018
Eine der unglücklichen Folgen des fortschreitenden Digitaltransformationsprozesses ist die ständig steigende Komplexität der IT-Infrastrukturen von Unternehmen. Die Einführung von Cloud-Technologien, der Ausbau der mobilen Arbeitskräfte und die zunehmende Abhängigkeit von ausgelagerten IT-Mitarbeitern haben dazu geführt, dass der sichere Unternehmensbereich nahezu vollständig verschwunden ist und die Überwachung und Kontrolle privilegierter Zugänge sehr komplex und teuer geworden ist. 
Webinar Recording
Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
Apr 13, 2018
As companies continue to expand their adoption of cloud services for such benefits as improved flexibility and scalability, reduced time to market, and cost savings, protecting their sensitive data across a large number of SaaS platforms is becoming increasingly complicated. For heavily regulated industries, security and data protection have been the largest barriers to cloud adoption for years, but with the upcoming General Data Protection Regulation (GDPR)’s significantly tightened compliance controls and massive penalties for violations, protecting sensitive data in the cloud is becoming...
Webinar Recording
Acing the Upcoming GDPR Exam
Apr 11, 2018
With only weeks to go until the EU GDPR (General Data Protection Regulation) takes effect on May 25th, global businesses are scrambling to figure out how to avoid the hefty fines that loom for companies failing to achieve compliance. Sanctions for non-compliance are very severe with penalties of up to 4% of annual worldwide turnover.
Webinar Recording
Holistic Approach to Cyber Risk Governance in the GDPR Era
Mar 16, 2018
As we are getting closer to the dreaded May 25th deadline, when the General Data Protection Regulation will come into force, many companies are still struggling with implementing effective risk assurance programs that constitute a key requirement for any sensible cybersecurity and compliance strategy.
Webinar Recording
Faktor Mensch: Wie man das schwächste Glied der IT-Infrastruktur Ihres Unternehmens schützt
Mar 14, 2018
Um im hart umkämpften und sich ständig verändernden globalen Markt bestehen zu können, sind Unternehmen gezwungen, ständig neue Technologien und Plattformen einzuführen, die unweigerlich zu einer erheblichen Erhöhung der Komplexität ihrer IT-Infrastrukturen führen. Da sensible Geschäftsdaten über mehrere geografische Standorte verteilt sind, wird die Anzahl der Angriffsvektoren, die vor Cyberangriffen geschützt werden müssen, immer größer.
Digital Finance World 2018
19 videos
Videos from the Digital Finance World 2018
Webinar Recording
Best Practices and Essential Tools for GDPR Compliance
Mar 09, 2018
With just over three months until the General Data Protection Regulation (GDPR) comes into force in the European Union, many organizations are still struggling to prepare for the new regulation.
Event Recording
Martin Kuppinger - 2018 - The Year of Disruption: Why the Finance Business Will Never Be the Same Again
Mar 09, 2018
The year 2018 brings major changes to the financial industry. Two disruptive regulations (PSD2 and GDPR) come into effect early in the year and will have a far-reaching impact. Their implementation can be a challenge, but through these directives new opportunities will be created. Furthermore, the blockchain technology is becoming increasingly relevant and influential in the financial sector through its practical use. This Keynote will discuss the three game-changers, PSD2, GDPR and Blockchain impacting the industry and will give recommendations for the necessary actions. 
Event Recording
Urs Zurbuchen - Revised Payment Service Directive: Understanding Its Technical Requirements for a Smooth and Secure Customer Experience
Mar 09, 2018
PSD2 will require 2 major technology thrusts: exposing and securing APIs for banking functions, and presenting strong authentication options for financial customers. Banks have to open up many of their core banking functions to enable the PSD2 ecosystem where Third Party Providers (TPPs) can directly initiate payment transfers and aggregate account information. Urs Zurbuchen will present how important a combined approach of web application security and identity access management is to fulfill the necessary compliance requirements. Especially for strong customer authentication the market is...
Event Recording
Mark Stephen Meadows - Why Bots Need License Plates
Mar 09, 2018
The consumer experience is changing radically, and globally. Today, AI-powered bots in the form of chatbots, voice assistants, and avatars, are responsible for the majority of traffic on the web and conversational systems.  And CPA chatbots or accountant avatars are now telling us what to do with our money – what to buy, where to buy it, and where to invest.  How can we trust these bots? After all, they are made by humans, and sadly not all humans have your best interest at heart. These bots need license plates. Bots and AI need authentication. They need regulation,...
Event Recording
Dr. Khanh Dang Ngo - Improving Smart Contracts with Civil Code
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
John Erik Setsaas - A Blockchain Reality Check - Why Blockchain May Not Be the Answer to the Identity Challenges
Mar 09, 2018
Blockchain is everywhere, and blockchain promises to solve any kind of problem, including that of the digital identity. This presentation will take a critical look at the promises, and look at possible scenarios for identities on the blockchain, as well as why this may not be a good idea.
Event Recording
Balázs Némethi - How Blockchain Will Connect the Material Space to the Foundation of the Digital Space: Identity
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Yana Afanasieva - Licensing, AML and other Regulatory Requirements Applicable to Cryptocurrency Operators
Mar 09, 2018
Yana will address several of the most common misperceptions about cryptocurrency operations, and argue that they are, in fact, already regulated under existing rules,  such as PSD2, AMLD4, investor protection and consumer rights regulation. Yana will also make a case that transactions in cryptocurrencies do not necessarily increase AML risks of the operator, especially, not in comparison to transactions with cash. Several best practices of how to organize the compliance framework for a cryptocurrency-related service provider will be given.
Event Recording
Dr. Hans-Peter Güllich - Applying Artificial Intelligence for a New Age of Risk and Compliance Management
Mar 09, 2018
Misguided, mismanaged and misunderstood. How to provide easy to understand key information supporting fundamental C-Level decisions in the years ahead? Due to the sheer mass of available data organisations are missing an ongoing and real time monitoring of external and internal data and information allowing them to identify internal weak points (e.g. compliance failures, risk management issues, etc.), provide an early detection of risk relevant web content and comprehensively communicate the actual risk situation to all management levels.
Event Recording
Daniel Kjellén - Say Goodbye to the Service Formerly Known as Banking – A Case Study on the Changes We Expect to See Across Europe
Mar 09, 2018
  Everyone has been talking about how PSD2 will unlock retail banking, opening up the market to new entrants and decrease banks’ power on the market. But if you are looking at the future of finance, look no further than Sweden. Daniel Kjellén, CEO and co-founder of Tink, a Swedish fintech recently identified by UBS as ”the shape of the changes we expect to see across Europe in time”, will share a case study of Sweden’s journey from financial monopolies to a consumer led market which delivers money on autopilot.  Sweden is...
Event Recording
Michael Backes - CollectAI: How an Innovative Financial Service Leverages AI from the Start
Mar 09, 2018
Since 2012 Otto Group Digital Solutions, the Otto Group's company builder, has worked to build strategically-relevant business models in the financial industry, combining the assets of the corporate ecosystem with entrepreneurial know-how and cutting-edge technology. This keynote will showcase how we leveraged AI in our latest startup, collectAI, in order to create a value proposition that combines the best of "Man and Machine." In addition, we will look at the potential for continuous improvement moving forward.
Event Recording
Dr. Karsten Kinast - Preparing for GDPR: Key Aspects and Best Practices for Financial Services
Mar 09, 2018
The EU General Data Protection Regulation (GDPR) will be implemented in May 2018. It replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. To achieve ist ambition the GDPR will introduce several new concepts, rights and duties. Some of these have a significant impact on financial services and may require a change to both the handling and use of personal data. The Keynote will give an introduction to the...
Event Recording
Jason Boud - A Panorama of RegTech Trends and of the RegTech Market
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Guido Scholz - GDPR Is Not Only Law, It Is Also a Trusted Relationships with Customers
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Ivana Bartoletti - Meeting the GDPR Transparency Requirements in Digital Finance
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Parth Desai - Open Banking Challenges & Opportunities: Why AI is the Essential Business Enabler
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Panel - PSD2 and Open API Solutions
Mar 09, 2018
By giving access to customer’s online account (XS2A), PSD2 lays the foundation for new and exciting digital payments system. Many new opportunities arise through the innovative and wide-ranging usage of APIs which can be mutually beneficial for banks, TPPs and customers. In this session we will discuss the novel concepts for post-PSD2 financial ecosystem. 
Event Recording
Mike Small - PSD2 – Does the RTS Prohibit Secure Customer Authentication?
Mar 09, 2018
On January 13 th , 2018 a new set of rules for banking came into force that open up the market by allowing new companies to offer electronic payment services.  On November 27 th , 2017 the European Union published and press release and a draft Regulatory Technical Standard (RTS) on strong authentication. On the one hand the press release says that – “thanks to PSD2 consumers will be better protected when they make electronic payments or transactions because the RTS makes strong customer authentication (SCA) the basis for accessing one's payment account, as well as for...
Event Recording
Panel - PSD2 and the Identity Problem
Mar 09, 2018
Panel discussion at the Digital Finance World 2018 in Frankfurt, Germany
Event Recording
Matthias Reinwarth - You Are Here! Assessing Your Organisation‘s GDPR Readiness
Mar 09, 2018
Presentation at the Digital Finance World 2018 in Frankfurt, Germany
Webinar Recording
How to Make Your IAM Program a Success
Feb 23, 2018
Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.
Webinar Recording
The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance
Feb 21, 2018
Whenever people are talking about the Digital Transformation, they usually think about modern technologies like cloud computing. However, although adopting new technologies is important for staying relevant and competitive in the rapidly changing market, this transformation primarily reflects the growing volume of digital information that is powering key business processes and unlocking new business models. In many cases, digital data even becomes a company’s primary product and most valuable asset.