Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Identity & Access Management Predictions 2022
Dec 21, 2021
Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a different emphasis.
Webinar Recording
Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022
Dec 21, 2021
The increased importance of a frictionless user experience as a digital business success factor on the one side, and a big wave of ransomware and similar attacks with user credentials as a main entry point are forcing us to rethink authentication and finally get rid of the password. Interview guests of this session will be KC Analyst Martin Kuppinger, Paul Fisher and Jochen Koehler from HYPR.
Webinar Recording
Prediction #2 - The Convergence of IAM and how to Manage Complexity in a Multi Cloud, Multi Hybrid, Multi Identity World
Dec 21, 2021
It is the same set of drivers – first and foremost remote workforce requirements and seamless customer interaction, that make our infrastructure and service even more complex as they used to be, with multiple public and private clouds, on-site IT, all of them with identity silos. In this session, KuppingeCole´s Analyst Martin Kuppinger and Paul Fisher, will talk with André Priebe from iC Consult on how to leave silos behind and take advantage of global identity proofing networks, Decentralized (DID/SSI) or chain-agnostic (GAIN etc.) and how CIEM/DREAM can help...
Webinar Recording
Prediction #3 - Identity Proofing & Fraud Reduction Everywhere
Dec 21, 2021
The pandemic has dramatically accelerated the shift to online transactions in most industries, with the financial industry as an example for a heavily regulated sector being in the forefront of a movement to establish a global standard that leverages the assurance level of online identity vetting (the onboarding process of a digital identity) with traditional face-to-face methods. In this session, KuppingerCole Analysts Martin Kuppinger and Paul Fisher together with ForgeRock's Eve Maler will discuss the relevance of identity proofing for your enterprise and why it will be one of the key...
Webinar Recording
Prediction #4 - Identity & Access: The Big Efficiency Push
Dec 21, 2021
Workflows, integration, automation, low & no code – whatever reduces complexity and manual workload will be an even hotter topic in 2022. KuppingerCole Analysts Martin Kuppinger and Paul Fisher will discuss with Clear Skye´s Jackson Shaw on the new era of platform services and how they will help automating Identity & Access Management.
Webinar Recording
Prediction #5 - Zero Trust: The Next Level
Dec 21, 2021
Zero Trust will continue to play a crucial role in cybersecurity and identity management. In this session, KuppingerCole Analysts Martin Kuppinger and Paul Fisher will discuss with Sergej Epp from Palo Alto Networks on how to apply Zero Trust thinking to converge IAM, UEM, MDM, XDR, SIEM, SOAR to a seamless and holistic cybersecurity infrastructure.
Analyst Chat
Analyst Chat #106: 2021 - A Retrospective
Dec 20, 2021
Paul Fisher and Matthias present their very subjective summary of a really special and, in particular, especially challenging past year, 2021. They cannot do without the word 'pandemic' after all, but they also try to reach a first perspective on the year 2022 from the past 12 months.
Webinar Recording
Identity Security: A Top Priority for the Modern Enterprise
Dec 15, 2021
Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or challenging.
Interview
EIC Blog | Interview with David Pignolet
Dec 15, 2021
Webinar Recording
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Dec 10, 2021
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC) solutions alone are unable to meet the changing and dynamic IGA requirements of modern enterprises.
Webinar Recording
Lessons From a Journey Into a Real-World Ransomware Attack
Dec 08, 2021
Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.
Analyst Chat
Analyst Chat #105: A Deeper Dive into GAIN
Dec 06, 2021
The announcement of the GAIN initiative for the secure distribution of verified and assured identity data has been made at EIC in September. While the core concepts of this initiative have been discussed in earlier episodes, Martin and Anni sit down with Matthias to do a deeper dive into further aspects of GAIN, including the use beyond customer-related IAM and the challenge of privacy in such a hyper-connected network for PII.
Webinar Recording
Urgent Need to Protect the Most Critical Business Assets: Data & People
Dec 03, 2021
Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.
Interview
EIC Goes to Berlin | New Location, New Opportunities
Dec 02, 2021
Frontier Talk
Reinventing Government with Technology | Frontier Talk #8 - Sebastian Manhart
Dec 01, 2021
Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era. Tune in to this episode to learn how governments can transition from risk-averse waterfall approaches, improve human factors in public services and navigate through the government-private sector nexus to promote citizen access to essential services.
Analyst Chat
Analyst Chat #104: Edge Computing
Nov 29, 2021
Senior Analyst Graham Williamson joins Matthias from down under to talk about edge computing. Starting from the definition and relevant use cases, they focus on where the edge brings value. They discuss what the key criteria for a successful deployment are and what needs to be looked at to do edge computing while preserving security and privacy.
Webinar Recording
Combatting Fraud Proactively With Behavioral Biometrics
Nov 26, 2021
Digital businesses are facing an increasing onslaught of fraud enabled by malware, social engineering, and other cyber criminal activities. Strong authentication is essential, especially in the context of PSD2, but it can be challenging to achieve without adding friction to the user experience.
Digital ID & Identification
8 videos
Event Recording
Panel | Digital ID Best Practices Discussion
Nov 25, 2021
Event Recording
Risky business - Verifying identities in a digital world
Nov 25, 2021
Knowing who you are doing business with online has been and still is a major challenge. But why do you really need to know, and what are the pitfalls? The presentation will look at some of the important challenges of identifying, validating and authenticating people online.
Event Recording
Passwordless update - News from FIDO
Nov 25, 2021
Inconvenient and weak digital identity affects our digital economy.  Adding more band-aids to the legacy knowledge-based digital identity infrastructure isn’t effective anymore.   The FIDO Alliance introduced standards for possession backed authentication which are now supported by all major platforms.  Additionally,  the Alliance is developing new standards for document based ID verification and passwordless device onboarding. With standardized approaches supported by the ecosystem, we have all ingredients for a wholesale upgrade to the “fabric...
Webinar Recording
Engineering Successful IAM Projects to Support Digital Business
Nov 24, 2021
In the digital era, traditional approaches to Identity and Access Management (IAM) are ineffective. IAM is no longer just about managing employee identities, but about managing all kinds of identities across a wide variety of use cases. This requires a comprehensive and agile approach.
Event Recording
Verification as Fraud Prevention
Nov 24, 2021
Cybercrime, often driven by fraud, continues to plague organizations leading to data breaches and loss of revenue. Account takeovers and account opening fraud contribute to this. But as organizations transition to heavier dependence on digital identities, how do we deal with the rising and changing stakes? In this session, Anne Bailey will discuss the intersection of digital identity and fraud prevention: identity verification. Listen in to hear how identity verification can be integrated into digital identity management as a preventative measure against fraud.
Event Recording
Identity Management Protocols
Nov 24, 2021
Event Recording
Expert Chat | Interview with Kay Chopard
Nov 24, 2021
Event Recording
Digital Identity Wallets – How To Evolve SSI To Meet eIDAS 2.0 Regulations
Nov 24, 2021
The presentation will give context on the EU commission announcement of European Digital Wallets and explains what eIDAS 2.0 defines for member states when it comes to digital identities. SSI can be a potential solution, but currently does not meet the eIDAS 2.0 regulation fully. We will explain why and give an idea on how to evolve SSI and create an ecosystem that is compliant with eIDAS 2.0.
Event Recording
How to create decentralized trust around decentralized applications
Nov 24, 2021
It is no surprise that decentralization is key player in blockchain's role in disrupting every industry requiring trust. But how to do create trust around decentralised solutions? Creating 'Decentralised Trust' is how we solve this. Through Decentralised Name Systems, Decentralised Certificates, Decentralised Bots and more can we enable decentralised trust around decentralised solutions. Such solutions are key in embracing a truly digital society where this 'trustlessness' is key in the greater security, efficiency and trust of the public sector and all industries requiring trust.
Analyst Chat
Analyst Chat #103: Data-Centric Security
Nov 22, 2021
Lead analyst Alexei Balaganski joins Matthias for an episode on Data-Centric Security. Starting with a definition behind that term, they look at relevant technologies and market segments and discuss adequate ways of adding Data-Centric Security to an organization's cybersecurity strategy.
Analyst Chat
Analyst Chat #102: Impressions and Insights From the CSLS 2021
Nov 15, 2021
From November 9th to 11th, the Cybersecurity Leadership Summit 2021 took place in Berlin and virtually online. The Monday after, Martin Kuppinger and Matthias sat together to talk about some first impressions and insights from this event. The recordings and slide decks are available for participants and those interested.
Cybersecurity Leadership Summit 2021
72 videos
Event Recording
Why 20ms Is the New Ransomware Prevention Benchmark
Nov 11, 2021
Event Recording
Future of Work With Cisco
Nov 11, 2021
The Future of Work is coming. And it’s borderless, lightning-fast, highly creative.
Event Recording
Ransomware: What Happens When the Tech Stops?
Nov 11, 2021
Event Recording
BigFix - Manage Every Endpoint
Nov 11, 2021
Event Recording
Cybersecurity in the Software Supply Chain - The Adventure Is Just Beginning
Nov 11, 2021
Event Recording
Iot Security Policies and Standards - A Global Perspective
Nov 11, 2021
Event Recording
Panel | Industry 4.0 - How to Build a Dynamic Cyber Defence
Nov 11, 2021
Event Recording
Detection, Deception, and Response - The Role of NDR and DDP in Securing OT and ICS
Nov 11, 2021
Event Recording
Using AI to Precisely Detect Anomalies in the OT Process
Nov 11, 2021
Event Recording
OT Security - The Weak Point Is the Periphery
Nov 11, 2021
Event Recording
Cloud Security 2025 – Perspective & Roadmap
Nov 11, 2021
Event Recording
Cybersecurity Architectures in a Hybrid World
Nov 11, 2021
Event Recording
Implementing SASE: A Quickstart-Recommendation
Nov 11, 2021
Event Recording
Staff are one of your biggest cybersecurity risks, but also your first line of defense
Nov 11, 2021
 
Event Recording
Cybersecurity: The Operational Illusion
Nov 11, 2021
Event Recording
Three Major Reasons Why Your People Get Hacked
Nov 11, 2021
Event Recording
Be the Human Firewall - Evolution of an Awareness Program
Nov 11, 2021
Event Recording
Humans, the Exhaust Port of Cybersecurity
Nov 11, 2021
Event Recording
Insider Threat 3in1: New Normal for Corporate Security
Nov 11, 2021
Event Recording
Interview | Securing the Cloud in Hybrid Environments
Nov 11, 2021
Event Recording
AI’s Two-Faced Relationship With Ransomware
Nov 11, 2021
Event Recording
Ransomware in Focus
Nov 11, 2021
Event Recording
Ransomware – True Consequences to Business
Nov 11, 2021
Event Recording
Incident Response Management – Checklist for the First Steps in Case of an Attack
Nov 11, 2021
Event Recording
AI in Cybersecurity - Chance or Just Another Hype
Nov 11, 2021
Event Recording
Fighting the Ransomware Storm
Nov 11, 2021
Event Recording
Schrems II: Technical Possibilities and Opportunities for Compliance
Nov 11, 2021
Event Recording
How Cybersecurity Relates to GDPR
Nov 11, 2021
Event Recording
Looking Back at the Reporting Line of the CISO
Nov 11, 2021
The Right Reporting Line is the One that Works. Period.
Event Recording
Cybersecurity: Defence Is Made of Tools, Processes and Persons. How the Cyber Risk Estimations Changes if the Human Element Is Considered
Nov 11, 2021
Event Recording
Enhancing User On-Line Security With Improved Decentralized Identity Governance
Nov 11, 2021
Event Recording
Things We Talk About vs Things That Matter in Cloud Security
Nov 11, 2021
Event Recording
Security vs. Privacy: Why Do We Have to Choose
Nov 11, 2021
Emerging privacy-preserving frameworks for biometrics and identity limit the need to store personal data while still ensuring digital security.
Event Recording
Securing the Cloud - From the Inside Out
Nov 11, 2021
Event Recording
Old Dog:New Trick - Musings on Enterprise Identity Governance in a Cloud-First Zero Trust Ecosystem
Nov 11, 2021
Event Recording
5 Recommendations to Make your Work-from-Anywhere Environment More Secure
Nov 11, 2021
Event Recording
Mastering Complexity in Your Multi-Cloud & Multi-Hybrid IT
Nov 11, 2021
Dream - Policy-Driven Management of Security, Identity and Access for All IT
Event Recording
Different (Development) Stages of Cyber Risk Management
Nov 11, 2021
Event Recording
The Role of Trusted Identity in Cybersecurity - The Vision of an EU Trust Space
Nov 10, 2021
Event Recording
Cyber Council Panel | Cybersecurity Trends 2022
Nov 10, 2021
Event Recording
Utilizing Data Insights for Hiring Cybersecurity Experts
Nov 10, 2021
Event Recording
Cybersecurity Trends 2022 - A Small Insight Into What Will Threaten Us
Nov 10, 2021
Event Recording
Ongoing Training: Human Firewall
Nov 10, 2021
Event Recording
Panel | Fighting the Cybersecurity Jobs Crisis
Nov 10, 2021
Event Recording
Managing CSIRT With Agile Methods
Nov 10, 2021
Event Recording
Panel | Why Segmentation Must Be an Essential Part of Your Zero Trust Program
Nov 10, 2021
Event Recording
From Burden to Benefit - How Aligning on Business Purpose and Objectives Is Critical to Maximise the Value of Security
Nov 10, 2021
Event Recording
And Suddenly It Burns Without Fire - Impact of Cyber Attacks on Your Business
Nov 10, 2021
Event Recording
What Does a Passwordless Future Look Like?
Nov 10, 2021
Event Recording
Panel | The Roof Is on Fire - Ransomware Attacks and Their Impact on Companies
Nov 10, 2021
Event Recording
The Human Factor of a Security Culture in a Start-up
Nov 10, 2021
Event Recording
Transform Data Security in the Blink of an AI
Nov 10, 2021
Event Recording
Malware Hunting - Using python as attack weapon
Nov 10, 2021
Event Recording
Machine Learning: Cybersecurity’s Friend & Foe
Nov 10, 2021
Event Recording
Panel | Redefining Endpoint Security - The Role of AI & Machine Learning
Nov 10, 2021
Event Recording
Cybersecurity for AI & Automation in 5G Deployments
Nov 10, 2021
Event Recording
The Power of Convergence With Palo Alto Networks Prisma SASE
Nov 10, 2021
Event Recording
Endpoint Security in US Pharma Supply Chain
Nov 10, 2021
Event Recording
Panel | Comparing the Different Approaches to a Global Identity Layer for Commerce, E-Health, Finance & E-Government
Nov 10, 2021
Event Recording
Practical Approach to End Point Protection and end2end Encryption for Space and Drone Applications
Nov 10, 2021
Event Recording
The Impact of a Global Pandemic on People's Job Mindsets
Nov 10, 2021
Event Recording
Working at the Speed of Security
Nov 10, 2021
Event Recording
BSI Perspective On: Cyberattack Risks for Manufacturing Industries, Operational Technology, Industry 4.0 & Recommended Countermeasures
Nov 10, 2021
Event Recording
Fireside Chat with the CISO of Twitter: Transforming Security Culture
Nov 10, 2021
Event Recording
Post Schrems II Cloud Adoption
Nov 10, 2021
Event Recording
Successful and Unsuccessful Approaches to API Security at Ford Motor Company
Nov 10, 2021
Event Recording
Panel | Between Sugarcoating and Scaremongering - How to Position Your Governance & Risk Management Programme
Nov 10, 2021
Event Recording
How to Expose Apis Without Exposing Your Business to Risk
Nov 10, 2021
API Management & Security Market: Challenges, Solutions, Future Trends
Event Recording
Workshop | Your Path to Ransomware Resilience
Nov 09, 2021
Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Current surveys and KuppingerCole´s own research indicate a steep rise not only in the number of attacks, but as well in the average damage  per incident. The dark side of digital is industrializing itself, turning ransomware into big business The question is no longer if and when your organization will be attacked, but whether and how successful the attackers will be. “Sophisticated recent ransomware attacks are fully aware of standard backup strategies and corrupt or...
Event Recording
Workshop | Limitless XDR- Introduction and Demo - Part I+II
Nov 09, 2021
Event Recording
Workshop | Investigation & Threat Hunting - Part I+II
Nov 09, 2021
Event Recording
Workshop | Risk-Based Approach for Access Management Projects
Nov 09, 2021
Analyst Chat
Analyst Chat #101: DREAM - Policies and Automation for All of Today's IT
Nov 08, 2021
In the past, servers and applications were rather static, and entitlements too were static. But this has changed. Organizations must deal with a multi-cloud, multi-hybrid IT. Entitlements and access in today’s cloud environments are dynamic, just like workloads. Martin Kuppinger joins Martin to explore the area of Dynamic Resource Entitlement and Access Management (DREAM). Together they look at policies and automation as one key building block for managing today's volatile IT.
Webinar Recording
Delivering on the Promise of an Identity Fabric in a Modern Enterprise
Nov 05, 2021
Identity sprawl is a challenge facing most modern enterprises as a result of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work. This sprawl leads to tremendous technical debt and has turned identity and access management into a roadblock for many organizations.
Analyst Chat
Analyst Chat #100: A Perspective on "Everything as Code"
Nov 01, 2021
No big celebration, but at least a mention: this is the 100th episode of the KuppingerCole analyst chat. Martin Kuppinger joins Matthias to discuss the increasingly important topic of "everything as code" and how to define proper strategies for approaching this, especially in the context of the BASIS concept. For more on this, both recommend revisiting Martin's opening keynote from this year's EIC .
Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Oct 29, 2021
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.
Securing Industry 4.0
9 videos
Event Recording
Debbie Reynolds: Implications of IoT Security and Data Privacy with Connected Devices
Oct 28, 2021
Internet of Things (IoT) devices also known as connected devices like smart speakers or smart thermostats have become more common features in modern digital life. As IoT devices become more ubiquitous the concerns about security and privacy of the data captured become more pressing. This session will explore the following: What are IoT devices and what data can they collect Emerging data types that were not previously collected The legal, cyber, and privacy risks associated with connected devices What can be done to minimize the risks associated with connected devices
Event Recording
Dr. Michele Nati: Secure Connected Industries: The Role of Blockchain
Oct 28, 2021
Industry 4.0 is all about connected industries. However, more connectivity also brings more cyber-physical threats, in particular in relation to constrained IoT devices. Distributed Ledger Technologies (aka blockchain) and decentralized identities can help to re-establish trust, improve security and develop new business models. This talk will discuss the role of IOTA DLTs in securing connected industries and present some of the solutions and use cases currently being developed.
Event Recording
Graham Williamson, Dr. Michele Nati, Emanuel Salmona: Panel - Best Practices for Securing Industry 4.0
Oct 28, 2021
Event Recording
Graham Williamson: Avoiding Plan B – Doing It Right the First Time
Oct 28, 2021
Event Recording
Securing Industry 4.0: Thoughts on How Established Technologies from IAM and Cybersecurity Can Help
Oct 27, 2021
In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at security challenges in Industry 4.0 and how established technologies from IAM and cybersecurity might be utilized for improving security. His talk will also cover the wide range of themes to look at from a security perspective in Industry 4.0, including Edge Computing and SASE.
Event Recording
Cybersecurity for industrial connected objects
Oct 27, 2021
Event Recording
Getting to know your Unknown Unknowns in Industry 4.0
Oct 27, 2021
Event Recording
Expert Chat: Interview with Invited Expert
Oct 27, 2021
Event Recording
Data Securing and IoT Challenges
Oct 27, 2021
Webinar Recording
Why Continuous API Security Is Key to Protecting Your Digital Business
Oct 22, 2021
In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing only on the operational aspects is no longer enough.
Webinar Recording
Meeting the Identity and Access Challenges in a Multi-Cloud World
Oct 20, 2021
Multi-cloud deployments are becoming increasingly common as organizations seek to remain competitive in the digital economy and address demands for increased remote working. But while cloud migration is enabling business success, it is not without its identity and access challenges.
Webinar Recording
Understanding the Privileged Access Management (PAM) Market
Oct 19, 2021
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.
Analyst Chat
Analyst Chat #99: Protecting OT and ICS
Oct 18, 2021
John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused cybersecurity. Safeguarding Operational Technology (OT), Industrial Control Systems (ICS), and the Industrial Internet of Things (IIoT) is getting increasingly important. John explains that modern approaches like Network Detection and Response (NDR) and especially Distributed Deception Platforms (DDP) can be valuable building blocks in an overall strategy for defending, for example, the factory floor or...
Webinar Recording
Managing Risk in Ever-Changing As-a-Service Environments
Oct 15, 2021
In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure-as-code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure are. Often security is under-represented in this formula, and for good reason.
Enterprise Blockchain Day
9 videos
Event Recording
Joni Brennan: Verifying Assurance for Blockchain Enterprise Scenarios with a Pan-Canadian Trust Framework
Oct 14, 2021
Event Recording
Peter Busch: Opportunities and Challenges for Decentralized Identity
Oct 14, 2021
Event Recording
Sebastian Manhart: Decentralized Identity and Governments - Can It Work?
Oct 14, 2021
Covid19 has laid bare just how far behind most governments are in digitising public administration and services for citizens. As countries around the world scramble to catch up, digital identity has emerged as one of the key building blocks. The approach, however, varies greatly. Most governments fall back on a default pattern characterised by centralised approaches and a narrow focus on the public sector only. Other countries especially in Europe and most notably Germany,  are taking a different strategy and implementing user-centric, decentralised, self-sovereign digital identity...
Event Recording
Georg Jürgens David Mason: US Pharmaceutical Supply Chain adopts Decentralized Identity and Credentials
Oct 14, 2021
Event Recording
Timo Hotti: Automated Trust and Findy
Oct 14, 2021
Event Recording
Anne Bailey: Where Blockchain is Thriving
Oct 14, 2021
Blockchain is a revolutionary technology, but before it redefines the organization as we know it today, it will revolutionize the way we transact in small ways first. This presentation will discuss the use cases that where blockchain is moving beyond PoC to enterprise implementation.
Event Recording
Monica Singer: The Art of the Possible with Blockchain Technology
Oct 14, 2021
The explanation will enable CEOs and CFOs of any business to understand how this technology will impact their business.
Event Recording
Dr. Michele Nati: Blockchain and Telco: Opportunities, Challenges and Use Cases
Oct 14, 2021
Event Recording
Christoph Burger: The Age of Smart Contract - Illusion or Reality?
Oct 14, 2021
A short status review of Blockchain: The development so far and operational challenges • The race of application solutions     ○ Blockchain without tokenization     ○ Blockchain with tokenization • Hurdles of the future
Webinar Recording
Verifiable Credentials: A Fresh Approach to Identity in the Digital Era
Oct 13, 2021
Establishing a verified digital identity is crucial to successful business collaboration and customer engagement in the digital economy. Verifiable Credentials provide a highly secure way of establishing digital identity. However, knowing exactly how to begin using this approach can be challenging.
Analyst Chat
Analyst Chat #98: GAIN and Reusable Identities
Oct 11, 2021
Annie Bailey and Matthias take a deeper look at the emerging concept of the Global Assured Identities Network (GAIN) and also seek a broader perspective on the benefits and challenges of reusable identities in general.
Webinar Recording
Uncovering the Truth About SAP Identity & Access Management
Oct 08, 2021
Ensuring everyone has access to the right systems and data is critical for security and compliance, but often the management of identity and access in SAP is siloed. A survey by SailPoint Technologies and Turnkey Consulting uncovers the extent to which this is true and points to potential solutions.
Analyst Chat
Analyst Chat #97: Low-Code/No-Code and the Citizen Developer
Oct 04, 2021
The idea of low-code/no-code (LC/NC) application development is for end users to create their own custom applications, perhaps using a graphical design tool, selecting from a library of existing building blocks, or perhaps even with the assistance of artificial intelligence. Alexei Balaganski explains the concepts behind this new development, takes a look at the current market and, finally, highlights the challenges and security issues that may be hidden behind the use of such application development.
Webinar Recording
API Management & Security Key to Digital Business Success
Oct 04, 2021
Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. APIs are found everywhere because they are key to creating new business models and connecting with business partners and customers. But opening up APIs is risky without the right security strategy and infrastructure in place.
Webinar Recording
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
Oct 01, 2021
The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM requirements of hybrid IT environments, but finding the right IDaaS solution with a focus on Identity Governance and Administration (IGA) can be challenging.
Frontier Talk
The Decentralized E-Commerce Story | Frontier Talk #7 - Dr. Michele Nati
Sep 30, 2021
In this episode, Raj Hegde sits with Dr. Michele Nati - Head of Telco and Infrastructure Development at #IOTA Foundation to understand how decentralization offers a fresh perspective towards marketplace transactions. Tune in to this episode to explore how an international initiative comprising of banks, universities and telco providers comes together to safeguard the e-commerce ecosystem.
Webinar Recording
A Customer-First Approach to Identity-Based Authentication
Sep 30, 2021
Even though passwords can be compromised easily and are generally considered unsafe, they are still ubiquitous in a time when multi-factor authentication and biometrics are easily available. There’s little doubt that eliminating passwords improves security, but to effect fundamental change you must start with the customer experience and ask yourself where it’s possible to take it.
Webinar Recording
Disaster Planning Made Simple
Sep 29, 2021
In the digital era, as businesses become increasingly reliant on IT, a potentially devastating cyber-attack or other type of disruptive cyber incident is inevitable. Being prepared is the single most effective action that those responsible for information security can take.
Webinar Recording
Adding Certainty to Your Cyber-Attack Detection Capabilities
Sep 28, 2021
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.
Analyst Chat
Analyst Chat #96: How to Combine Security And Convenience (EIC 2021 Special)
Sep 27, 2021
While moderating and speaking at KuppingerCole's flagship EIC 2021 event in Munich, Matthias also took the opportunity to sit down one-on-one with his fellow analysts in the conference studio for some EIC special analyst chat episodes. In the third and final special episode, Martin Kuppinger and Matthias look at how current technologies and concepts complement each other to improve security and convenience for users of modern technologies at the same time.
Analyst Chat
Analyst Chat #95: Deconstructing the User Journey (EIC 2021 Special)
Sep 23, 2021
KuppingerCole's flagship event EIC 2021 took place very successfully in Munich and online in September. Of course, Matthias took the opportunity to sit down with his fellow analysts in person for some EIC Special Analyst Chat episodes. Building on the themes of his Opening Keynote, Martin Kuppinger explains the concepts behind "Deconstructing the User Journey".
European Identity and Cloud Conference 2021
157 videos
Analyst Chat
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
Sep 20, 2021
EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC special analyst chat episodes. In the first of three specials, Christopher Schütze talks to him about the findings from his pre-conference workshop on defending against ransomware, and they also turn their attention to a promising new approach to creating globally secured identities.
Event Recording
EIC 2021 - Impressions
Sep 19, 2021
Event Recording
EIC 2021 - Attendees Greetings
Sep 19, 2021
Event Recording
EIC 2021 - Venue, Sponsor Booths
Sep 19, 2021
Event Recording
EIC 2021 - Keynotes & Workshops
Sep 19, 2021
Event Recording
EIC 2021 - Networking Lounge & Buffet
Sep 19, 2021
Event Recording
Workshop | Move your Active Directory to the Cloud
Sep 16, 2021
Martin Kuppinger , Principal Analyst, KuppingerCole Patrick Parker , Founder and CEO, EmpowerID Matthias Reinwarth , Lead Advisor & Senior Analyst, KuppingerCole
Event Recording
Workshop | Zero Trust & Modern Digital Workplaces
Sep 16, 2021
Event Recording
Secrets in the Clouds: The Journey of Digital Vaults to Cloud
Sep 15, 2021
When we traditionally think of vaults, we expect them to be in the close vicinity of a user. In our rapidly digitising world, the nature of such vaults have transformed as well. Data *(or Password, whichever word you think is correct)* vaults which are expected to be located on premises are now digital, making ownership of these vaults and access to these vaults critical functions for an organisation. The Cloud hosts a lot of secrets and this journey of vaults becoming digital and part of Cloud Environments is nothing but fascinating. Anil Bhandari, Chief Mentor & Thought Leader,...
Event Recording
The Future of Blockchain in the Enterprise
Sep 15, 2021
Looking at the digital transformation in the industries and the relevance Blockchain / DLT will have. Moritz von Bonin, Head of Blockchain & DLT Solutions, Deutsche Bahn
Event Recording
Security & Identity: How Hindsight Helps Us Plan for the Future
Sep 15, 2021
Our approach to security across all aspects of our lives has changed considerably over the last 20 years. From firewalls to the cloud, Max Faun explores how security technology has evolved since the start of the millennium. One size no longer fits all but everything does come down to trust, or lack of it! Is Zero Trust the way forward for an identity-centric secure future? Max looks at four pillars that businesses and individuals can apply to gain trust back and reap the benefits.  Max Faun, Head of Consulting, Europe, Okta
Event Recording
Digital Keys and Secrets: When to Manage Them, When to Get Rid of Them
Sep 15, 2021
Hybrid IT environments are full of secrets, like tokens, passwords, certificates and encryption keys that open access to mission-critical information. The emergence of concepts like Zero Trust authentication, Just-in-Time access and Zero Standing Privileges suggests that these access secrets don’t need to be permanent. Instead they can be created on the fly and made to expire automatically, paving way for the future where secrets or passwords no longer need to be managed and vaulted at all. SSH.COM's CTO, Miikka Sainio, explores how reducing the number of permanent secrets...
Event Recording
Customer External Digital Identity, What is it, What can you use it for and Should you Play
Sep 15, 2021
The debate on Customer External Digital Identity has reached fever pitch. This session takes a step back and looks at how Customer External Digital Identity can enable Trust between individuals and organisations in many sectors, what that allows organisations and individuals to do and also looks at the different roles that you might choose for your organisation. Martin Ingram, Product Owner, Identity Services, NatWest
Event Recording
Proactive and Polymorphic Adaptation of Multi-Cloud Deployments
Sep 15, 2021
During the last couple of years, hybrid and multi-cloud solutions are becoming very popular. With the emerging cloud options, modern enterprises increasingly rely on hybrid cloud solutions to meet their computational demands by acquiring additional resources from public clouds dynamically as per their needs. Alicja Reniewicz , Team Leader, 7bulls.com Paweł Skrzypek , Chief Architect, 7bulls.com Sp. z o.o.
Event Recording
Programming People: How to implement 'AI for good'
Sep 15, 2021
Artificial Intelligence is a little bit like sex: Everyone talks about it, very few people actually do it and if you don't do it safely, the consequences can be devastating. This session will give you a basic understanding of what you (yes, you!) can do to implement "ethical" AI systems in your organization and enjoy the promising opportunities this new tool offers while being aware of its limitations and risks. Anita Klingel , Senior Consultant, PD
Event Recording
PAM 101
Sep 15, 2021
Paul Fisher , Senior Analyst, KuppingerCole
Event Recording
Clouds for all Seasons
Sep 15, 2021
Cloud services have  enabled  organizations to exploit leading edge technologies without the need for large capital expenditure.  In addition, to survive the COVID pandemic ,  organizations have had to accelerate their use of the se services .   The market for  these  services is forecast to grow significantly  as  organizations  complete their  digital transformation and  mov e , migrat e , or moderniz e their IT systems .   However, according to some estimates only around 4% of enterprise...
Event Recording
Panel | From Piecemeal to Strategic Priority: What CISOs need to know about CIEM
Sep 15, 2021
CIEM (Cloud Infrastructure Entitlement Management) is a SAAS delivered, converged approach to next generation, ideally AI driven multi-cloud security, managing access and privileges in the cloud. It is playing across the disciplines Identity Management & Governance, Access, Privilege Management and Authentication, addressing the complexity of multi-cloud adoption with privilege & access management working differently for each provider. Gerry Gebel , Head of Standards, Strata Identity, Inc David Higgins , EMEA Technical Director, CyberArk Jon Lehtinen , Director, Okta...
Event Recording
The Ethical Part of AI Governance
Sep 15, 2021
The Ethical Part of AI Governance – my personal learning journey This talk is about my personal learning journey in AI and AI Ethics together with Bosch. I want to share what brought me to AI and AI Ethics personally and professionally and what instrument is used at Bosch to bring AI Ethics to life. Sina Brandstetter , Software Engineer and Solution Architect, Robert Bosch GmbH
Event Recording
"That’s Not Fair!": Detecting Algorithmic Bias with Open-Source Tools
Sep 15, 2021
The harm that the misuse of AI/ML can have is obvious, from the ProPublica Recidivism piece from 2016 to the latest discovery of bias in facial recognition classifiers by Joy Buolamwini.   The need for tools to use AI/ML ethically is concentrated in two particular areas: transparency and fairness. Transparency involves knowing why an ML system came to the conclusion that it did—something that is essential if we are to identity bias. In some forms of ML, this is difficult. We’ll cover two tools to assist with transparency: LIME and SHAP. We’ll highlight where...
Event Recording
Security Automation in the Financial Sector: Research Findings, Best Practices, and Lessons Learned
Sep 15, 2021
This presentation combines the findings of a doctoral study into security automation in the financial sector with real-world experiences in implementing security automation. The research focused on strategies financial institutions need to reduce the gap between the attacker's time to compromise and the defender's time to detect and respond. Learn from the experiences of companies that have implemented or are implementing security automation. This session will look at what to expect from security automation (and what not to expect), how to decide what to automate, strategies to help ensure...
Event Recording
Why must CISOs and security leaders let IAM drive their cloud security adoption?
Sep 15, 2021
As organizations expand their cloud footprint to accelerate innovation and digital transformation, increased security risks pose an imminent and elevated threat to their growing cloud presence. The market is overwhelmed with numerous security technologies, approaches and frameworks for securing an organization’s cloud adoption journey, but security leaders and architects must meticulously assess the security risks associated with their cloud usage, migration patterns and digital interactions with customers, employees and partners to suite their business requirements and cloud...
Event Recording
Picos and Decentralized SSI Agencies
Sep 15, 2021
Picos (persistent compute objects) are an actor-model programming system with long-term persistent state. Each pico also has persistent identity and availability for a cloud-native developer experience. Picos are DIDComm-enabled agents supporting SSI. Consequently, picos are capable of running specialized application protocols for any given workflow in a secure, cryptographic environment. The architecture of picos makes them independent of the runtime they executed on, holding out hope of a decentralized SSI agency. This talk introduces picos, demonstrates their DIDComm capabilities, and...
Event Recording
Panel | Managing Zero Standing Access
Sep 15, 2021
Horst Bliedung , Head of IAM Product Management, Atos Paul Fisher , Senior Analyst, KuppingerCole Vadim Lander , Chief Technology Officer and Distinguished Engineer, Symantec Identity Security, Broadcom Brandon Nolan , Global Digital Identity Lead, Avanade Patrick Parker , Founder and CEO, EmpowerID
Event Recording
Cloudification of Access Management – Lessons Learned from the Migration of a Large-scale Production System
Sep 15, 2021
Access Management is a crucial capability in the IT infrastructure of any Enterprise. But it is even further crucial, when the whole application landscape is integrated, i.e., more than 1,800 applications used by millions of users. Back in 2017 we modernized the existing access infrastructure and set up ForgeRock as its successor on-premises in our data center. With rising demands regarding availability, scalability, and support for market-specific customizations, as well as more products and applications are going to the cloud, it became increasingly clear that project will...
Event Recording
Addressing Multi-cloud Identity Challenges with a New Standard: IDQL
Sep 15, 2021
The trend toward adopting multiple cloud providers means identity is now distributed, rendering traditional, centralized access policies and perimeters obsolete. As a result, the way we think about identity and access management (IAM) has to change. This session will present Identity Query Language (IDQL), a new standard for identity and access policy orchestration across distributed and multi-cloud environments. Gerry Gebel , Head of Standards, Strata Identity, Inc
Event Recording
Cloud Infrastructure Entitlement Management (CIEM): Advancing from Cloud First to Identity First
Sep 15, 2021
Matthias Reinwarth , Lead Advisor & Senior Analyst, KuppingerCole
Event Recording
Exploring the Future of AI
Sep 15, 2021
Anne Bailey , Analyst, KuppingerCole
Event Recording
Panel | Global AI Governance: World Stage
Sep 15, 2021
Recent years have seen significant Artificial Intelligence (AI) development across all domains of business and society. This panel aims to bring attention to societal impacts of AI – benefits and challenges, by bringing thought leaders and practitioners from different parts of the world to leverage diverse viewpoints around AI governance that continue to drive AI development across borders.  Anne Bailey , Analyst, KuppingerCole Armin Bauer , Managing Director Technology and Founder, IDnow GmbH Al Lynn , Vice President Emerging Technology and Incubation, Cisco
Event Recording
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Sep 15, 2021
Joseph Carson , Chief Security Scientist & Advisory CISO, Thycotic
Event Recording
Panel | Best Practices to Implement Security Automation
Sep 15, 2021
Alexei Balaganski , Lead Analyst, KuppingerCole Joseph Carson , Chief Security Scientist & Advisory CISO, Thycotic Christopher Schütze , Director Practice Cybersecurity and Lead Analyst, KuppingerCole
Event Recording
The Rise of An Identity-Native Web 3.0 World
Sep 15, 2021
Identity is a fundamental element in the traditional world to associate information to the same individuals. As we leave more and more digital footprints in the world of Internet, these information are giving birth to our digital profiles, raising issues of privacy protection, monetization of data, identity theft and more. While in this presentation, we revisit the manifestation and formation of identity in the incoming world of Web 3.0, and discover how the native citizens of Web 3.0 are forming their own identities and reputations with native behavior data that are distributed,...
Event Recording
Panel | A First-Person Account of Third-Party Identity Risk Management
Sep 15, 2021
In a 2018 study by Onus & Ponemon on data risk in the third-party ecosystem, more than 75% of companies surveyed said they believe third-party cybersecurity incidents are increasing. Those companies were right to believe that. As our world becomes more digitized, and thus more interconnected, it becomes increasingly more difficult to safeguard organizations from cybercrime. Tack on to that challenge a global pandemic that all but forced organizations to become “perimeter-less,” if they weren’t already, and the potential access points for bad actors through...
Event Recording
Panel | Digital Identities and IoT - How to Leverage OIDC and OAuth 2.0 for the Best User Experience and Security! IAM Related Experiences From the Automob
Sep 15, 2021
A lot of innovation around physical products is created by connectivity, allowing them to become part of the consumer's larger digital ecosystem and the providing enterprise. Gartner says in its megatrends for the next decade: "Anything costing more than a few USD will be "intelligent and networked". Examples are electronic wall boxes to charge cars or remote-control for dishwashers, cars, etc. Several compelling use cases require smart things to act not only for themselves but also on behalf of the end-user. OpenID Connect and OAuth 2.0 can be used to provide a user-friendly...
Event Recording
The Future of IoT Security
Sep 15, 2021
Speaker: Graham Williamson
Event Recording
Panel | From Smart Cities to Manufacturing – Securing Clouds of Things
Sep 15, 2021
Fulup Ar Foll , Founder and Lead Architect, IoT.bzh Graham Williamson , Director APAC / Senior Analyst, KuppingerCole
Event Recording
Fraud Controls for Digital Identity Ecosystems
Sep 15, 2021
To date, Digital Identity Trust Frameworks have generally been light touch regarding the specification of fraud controls, relying on the theoretical protection a Digital ID offers through more robust authentication. It is true that improvements in authentication methods, such as soft tokens and biometrics, mean the ID theft vector of phishing for a user’s password may be removed. However, ID fraudsters will continue to use stolen ID information to create an ID in the victim’s name. They will continue to create synthetic IDs. They will also continue to try and take over...
Event Recording
Panel | Bringing the Global Assured Identity Network (GAIN) to Reality
Sep 15, 2021
Donna Beatty , Digital Identity Industry Expert, Digital Identity Vittorio Bertocci , Principal Architect, Auth0 Daniel Goldscheider , CEO, yes.com Don Thibeau , Executive Director, OpenID Foundation
Event Recording
Managing Self-Sovereign Identities as an Institution with Lissi
Sep 15, 2021
The presentation explains how institutions can establish relationships with clients and manage their data. It will include a mixture of theoretical background knowledge as well as a practical demonstration of the "Lissi institutional Agent". The demonstration will include the following steps: - creation of schemas and credential definitions - Establishing an encrypted peer-to-peer connection - Requesting information from the user (self-attested, verified and Zero-knowledge proofs) - Issuance of credentials - Management of received costumer data Adrian Doerk , Business...
Event Recording
How can Decentralized Identities reshape the Future of eCommerce?
Sep 15, 2021
Dr. Michele Nati , Head of Telco and Infrastructure Development, IOTA Foundation
Event Recording
Implementing Identity Management on AWS
Sep 15, 2021
Identity on AWS may be well trodden ground, but that doesn’t necessarily make it any more inviting for enterprise practitioners who may not have had occasion to yet dive into the topic when tasked with an implementation. Jon Lehtinen , Director, Okta
Event Recording
The Proper Care and Feeding of Non-Human Identities
Sep 15, 2021
Non-human identities are crucial for managing access risk with IGA, especially for non-standard accounts that provide the most access risk for organizations. Brian Iverson , Chief Product Officer, Tuebora
Event Recording
Identity Management and Governance, in a Cloud Native World
Sep 15, 2021
Most enterprise infrastructure and software are in the later stages of cloud transformation. However Identity Management and Governance has lagged behind. First generation monolithic IAM solutions and providers do not provide agility into entitlement and risks in a cloud first world. The complexity of diverse infrastructure, security policies, and development velocity make it virtually impossible to provision, analyze and remediate at scale. Arun Binaykia , CEO, Sath Inc
Event Recording
Mission Possible or How to Implement Automated Identity Lifecycle in a 200 years old Enterprise
Sep 15, 2021
Identity Lifecycle automation project in Swedbank lasted for 4 years. During all those years I fulfilled business analyst role in IAM area. I collected requirements, draw process models, and did detailed analysis. I also defined minimum viable scope of the project and drove the team to reach the goal. Finally, I did acceptance testing. I can share key activities for business analyst throughout different phases of the project. Analysis * Get descriptions or describe yourself HR-processes, which are related to identity area. * Get descriptions/explanations of data feeds from...
Event Recording
Panel | The Modern Approach to Identity Governance
Sep 15, 2021
What if we took the traditional way of thinking of Identity Governance and reversed it completely? Putting together a successful IGA program has commonly been a long haul, A headache, A mess, A budget destroyer, And an expectation disappointer. There is a new way. Some call us crazy and some say its impossible. However, those who have experienced the new way call us visionaries. We have been presenting a modern ideology and process for IGA that drastically reduces the time to value, the total cost of ownership, and the economic impact of an Identity Governance...
Event Recording
The State of Strong Authentication
Sep 15, 2021
The FIDO Alliance was launched in 2013 with the audacious goal: to change the very nature of authentication. To move the entire world away from usernames and passwords and traditional multi-factor authentication with an open and free web standard that makes authentication simpler and stronger. It’s 2021, so why are passwords still persisting? The session will answer that question, and detail the progress that has been made towards standardizing strong authentication and the opportunity for companies to start on a journey past passwords. Join Andrew Shikiar, executive...
Event Recording
Panel | Identity in the Asia-Pacific - Untangling the Web
Sep 15, 2021
Do you want to launch or expand your identity-related business in the Asia-Pacific region but don’t know where to start? Linden Dawson , Director, Cybersecurity & Digital Trust, PwC Australia Allan Foster , Chief Evangelist, ForgeRock Graham Williamson , Director APAC / Senior Analyst, KuppingerCole
Event Recording
How Denmark is Building the Cyberprotection Bridge Between the Private and Public Sectors: The National Danish Cybersecurity Council
Sep 15, 2021
Denmark is among the most digitaized countries in the world and as the digitarization strategy moves forward, it is necessary to improve and enhance the nation's overall cyberprotection. In 2019, the Government appointed a new 20-member national Cybersecurity Council for the period of two years. The council’s role is to advise the government on new initiatives that can support both the private and public sectors by improving resillience and better cyberprotection; contribute to knowledge sharing, advisories and guidance on the strategic level; and look into the need for cyber...
Event Recording
Digital Identity in Germany
Sep 15, 2021
Explore the: - Landscape of digital identity in Germany - Success factors - Future Outlook Roland Adrian , CEO, Verimi GmbH
Event Recording
ADI Association: Bringing Accountability to Digital Identity
Sep 15, 2021
The Accountable Digital Identity (ADI) Association is a nonprofit organization dedicated to advancing an open framework for digital identity that focuses on accountability, privacy, and interoperability. The Association is a global coalition of private and public organizations spanning finance, government, healthcare, and technology parties. Ramesh Kesanupalli , Co-Founder, ADI Association
Event Recording
Case Study: How an Entire Industry adopts Digital Enterprise Identity
Sep 15, 2021
Back in November 2013 the U.S. congress enacted the Drug Supply Chain Security Act (DSCSA). Part of the regulation is that actors within the U.S. pharmaceutical industry must verify the U.S. state license, which is issued by the U.S. Drug Enforcement Administration (DEA), status (and thus the authenticity) of every trading partner within their supply chain. And this does not stop just by direct trading partners a pharmaceutical supply chain actor might have, the regulation states, that also indirect trading partner’s U.S. state license status must be proofed. Dr. Carsten...
Event Recording
IATA Travel Pass - Self Sovereignty in Action
Sep 15, 2021
Self-sovereign identity has been a hot topic at EIC since 2016. We've seen it rapidly go from concept to reality, with a massive increase in global interest from car manufacturers to banks to healthcare. We've seen innovative pilot projects, new software and exciting new privacy innovations.  But what happens when advanced new technology and protocols come into contact with the real world? In this talk, Andy will describe how SSI underpins the IATA Travel Pass ecosystem. He'll cover some of the implementation challenges, the do's and don'ts, and describe how the technology...
Event Recording
Decentralized Identity and the US Dept. of Homeland Security
Sep 15, 2021
Markus Sabadello , CEO, Danube Tech
Event Recording
Identity in Zero Trust model
Sep 15, 2021
Anoop Mangla , Cybersecurity Practice Director, Wipro
Event Recording
In-house OAuth/OIDC infrastructure as a competitive advantage
Sep 15, 2021
Leading service providers have started developing their software in-house to achieve competitive business advantages.
Event Recording
Solving the Access Challenge in Cloud Migration
Sep 15, 2021
Berno Snijder , Account Lead Security, Accenture
Event Recording
Digital Onboarding
Sep 15, 2021
Enterprise hiring in the time of Covid is putting greater emphasis on supporting remote on boarding of new employees. This creates new challenges for the IAM team as it is no longer self evident that new contractors and employees to show up at a physical helpdesk, provide ID and pick up their new accounts. How do you organize the remote onboarding and are there technologies and approaches that are used in digital customer onboarding and KYC processes that can be leveraged to also handle employee onboarding? Another important aspect is that remote working has become the norm...
Event Recording
Panel | Identity vs Authorization - Where to Draw the Line
Sep 15, 2021
We will look at OAuth protocol and its misusage for authorization purposes. What is the difference between client and user authorization and at which stage should each happen? We will revise what Identity is at its core and what should or should not be part of it. And what about Group Membership – a ‘domain-driven’ advise how to triage roles between Identity and Authorization. All these best practices are backed by real-life experience. - OAuth and its misusage as an authorization protocol - Essence of Identity - Difference between client...
Event Recording
Beyond Blockchain: New Frameworks for Data Privacy and Security
Sep 15, 2021
The reason to use biometrics as a form of identity is because they are unique, unchanging and are the one direct and unequivocal link to an individual. But what if these identifiers are compromised? This is not a hypothetical scenario as the U.S. Office of Personnel Management breach sadly taught us several years ago. For years, this has been a conundrum in the world of biometrics - to store the data in a centralized system that has to be protected or choose device-based biometrics that are not linked to a vetted physical identity. In this never-ending loop of having to choose between...
Event Recording
Digital Onboarding Game Change: Face Verification and Liveness Detection
Sep 15, 2021
2020 will be eternally known as “The Year of COVID.” It will also be known as the year remote digital onboarding was near instantaneously transformed from a strategic, forward-thinking business development objective to an urgent, mission critical business priority. This has accelerated the adoption of biometric face recognition and liveness detection to create secure, trusted, and frictionless onboarding experiences. The market landscape is being shaped by a range of innovators. From biometric face recognition and liveness technology providers to targeted digital onboarding...
Event Recording
Panel | Tackling the Identity Emergency
Sep 15, 2021
Paul Fisher , Senior Analyst, KuppingerCole C. Maxine Most , Principal, Acuity Market Intelligence Frances Zelazny , Co-Founder & CEO, Anonybit
Event Recording
Decentralized Identity: What's Been Happening and Why it Matters
Sep 15, 2021
Decentralized Identity is seeing a proliferation of activity -- so much that even experts struggle to make sense of it all. Even the names of the emerging specs have gotten wacky (or, technically, WACI...) Kim Hamilton Duffy , Director, Identity and Standards, Centre Consortium
Event Recording
Self-Issued OP and OpenID Connect for SSI (OIDC4SSI)
Sep 15, 2021
One crucial component to SSI is end-users being able to interact with verifiers directly, without relying on a third-party provider or having to operate their own hosted infrastructure. Kristina Yasuda , Identity Standards Architect, Microsoft
Event Recording
DIDComm and the Self-Sovereign Internet
Sep 15, 2021
DIDComm is the messaging protocol implemented in Hyperledger Aries that provides utility for DID-based relationships. Many may think DIDComm is just a way to exchange credentials, but it's more than that. DIDComm is a protocol layer capable of supporting specialized application protocols for any given workflow. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet, a secure internet overlay, that is much more private, enabling, and flexible than the one we've built using Web 2.0 technologies....
Event Recording
Hybrid cloud enablement: use cases, challenges, best practices
Sep 15, 2021
Cloud computing has become commonplace in recent years, it is almost inevitable for small to medium sized companies to leverage cloud services largely if not fully. However, it is not easy to run cloud enablement project in bigger and yet most importantly traditional companies, where there are hundreds of legacy applications, which expect data to be closer to the computing units, and which are dependent on bandwidth and reliable network availability. In this presentation, I am going to address cloud migration requirements, usual challenges, and lessons learnt and best practices from...
Event Recording
It takes a village...
Sep 15, 2021
As a byproduct of the current activity across industry, government, and regulatory sectors, digital identity leaders face unprecedented opportunities- and challenges. Covid has accelerated the global imperative to establish a strong and safe global digital economy that is enabled by a secure, interoperable,  digital identity ecosystem.   One of the most daunting challenges is how, where and when to start.  The reality is that the target global ecosystem will be years in the making despite the widely held view that better identity is crucial to achieving a...
Event Recording
Closing Keynote & Announcement of EIC 2021 Gamification Winners
Sep 15, 2021
Event Recording
From Day One to Hour One: IGA in the Era of Extreme Automation
Sep 15, 2021
Cloud capabilities are driving automation approaches that will upend traditional, linear templates for Identity Governance service delivery. This extends to everything from application/service on-boarding, provisioning and user lifecycle management workflows. In this session, Manoj will share his experience of working on automation approaches for cloud workloads and discuss what this means for the future of IGA in the era of continuous integration and delivery. Suganya Balan , Manager – Privileged Access Management, Philip Morris International Manoj Kumar , Director, Identity...
Event Recording
WHY ON PREMISE IGA IS THE NEW LEGACY
Sep 15, 2021
In this session Thomas Müller-Martin, Global Technical Lead at Omada will share his insights about the evolving IGA market and why companies today choose an enterprise IGA SAAS platform over an on-premise solution. Learn in this session how to transform your legacy or home-grown solution to a modern IGA solution without the hassle of long and cumbersome implementation and high maintenance costs. Based on best practices, we will demonstrate to you how organizations today can deliver fast value to their business to mitigate risk and increase efficiency. Join this interesting speech...
Event Recording
What are the benefits of handling external users in IGA?
Sep 15, 2021
Most of the companies today are handling all external users with HR processes using HR systems, which can cause friction and inefficiency when managing external users' lifecycle.  Lauri Reunamäki , Partner, Business Operations, Lempinen & Partners
Event Recording
Worlds Collide: The Importance of Convergence in IAM
Sep 14, 2021
Identity and privileged access management have existed in silos for decades. But cloud adoption and the rise in remote workers have introduced new vulnerabilities, and cybercriminals have noticed. As ransomware, breaches, and credential theft continue to make headlines, one thing is clear: We need to treat all access as privileged access and understand the context — and risk — of that access. In this session, Chris Owen, Saviynt Director of Product Management, will discuss how identity worlds collide through Saviynt Enterprise Identity Cloud. He will show how this...
Event Recording
Goodbye Dogmatism / Hellō Pragmatism
Sep 14, 2021
Disciples of decentralized identity have preached for years that DIDs are the only true path to giving users control over their identity, AKA self sovereign identity. The lack of widespread adoption is evidence that a more pragmatic approach is needed.
Event Recording
Why ‘Zero Trust’ is Driving an Identity Centric Security Strategy
Sep 14, 2021
As organisations continue to adopt and embrace new technology platforms, it also brings with it the requirement to reassess how these new environments are secured. The Assume Breach mindset, a key aspect of a Zero Trust, shifts the risk posture to that of applying defense against the concept that the perimeter has already been breached. In this session, we run through the Tactics, Techniques, and Procedures used in recent breaches and highlight the commonality across them; identity compromise and privilege elevation. This analysis will highlight the importance of taking an assume breach...
Event Recording
How to Thrive in an Accelerated Access management world
Sep 14, 2021
Research from 2020 has shown a phonemonal growth in the access management market. The pandemic, for all its impact, has enabled organisations to re-evaluate their working strategies and practices. But at what cost? Cybercrime on corporate applications has risen exponentially from the dispersed workforce and rapid cloud adoption has left organisations vulnerable to ransomware, malicious activity and internal subterfuge. Danna Bethlehem, Director Product Marketing Authentication at Thales discusses how organisations can accelerate their business with the right approach to their IAM...
Event Recording
Browser Features vs. Identity Protocols: An Arms Race?
Sep 14, 2021
In an attempt to protect users from excessive tracking and surveillance, the last couple of years have witnessed major browser vendors introducing increasingly restrictive anti-tracking measures. Identity protocols and features got caught in the crossfire, however, forcing identity software vendors and developers to hastily introduce changes to restore functionality that browser changes broke. Is this the new normal? What will we do when a change will break an identity feature beyond repair? This session will review the main browser changes that have affected identity over the last few...
Event Recording
The Changing Landscape of Consumer Identities
Sep 14, 2021
John Tolbert , Lead Analyst, KuppingerCole
Event Recording
Panel | CIAM During Covid - How to Better Secure the Identities of Your Customers
Sep 14, 2021
Max Faun , Head of Consulting, Europe, Okta Paul Fisher , Senior Analyst, KuppingerCole Jason Goode , Regional Director – EMEA, Ping Identity Dali Kilani , CTO, Lifen
Event Recording
Security and Anti fraudsters CIAM strategy for next years
Sep 14, 2021
In this lecture I present a reference architecture covering CIAM, API and PAM thinking about closing the main attack possibilities in modern contexts Reference architecture validated covering CIAM, PAM and API How to decrease frauds How to increase the user experience with security Alfredo Luiz dos Santos Junior , Senior IAM Architect, Farfetch
Event Recording
The Next Frontier: Why Decentralised Identity is only Base Camp
Sep 14, 2021
Over the past decade significant advancements have been made towards decentralised, self-sovereign and tokenised identity. Now that we can tokenise a unique value what is the new value we can enable? Katryna Dow , CEO & Founder, Meeco
Event Recording
Security and Privacy Challenges of Authentication, Verification and Authorisation of Customers
Sep 14, 2021
Sarb Sembhi , CISO, AirEye
Event Recording
Future proofing national eID
Sep 14, 2021
How to future proof a national eID scheme where 13 registered commercial IdPs, 1 government IdP and several brokers operate? Petteri Ihalainen , Senior Specialist, National Cyber Security Centre, Finland
Event Recording
Identity Management as a Service - What it is and How to Build One
Sep 14, 2021
I considered myself quite an experienced programmer and having some expertise in Identity management when I was hired by Swedbank to work as full time Identity engineer. Besides projects, I had assignment to describe an architecture of the IAM as a service from my manager. Honestly, I had no clue about how to envision it. I tried to assemble standards and squeeze something out from practices and papers. But these were not really all my ideas and I did not feel much confident. But something started to happen in few last years when we had a very hard time implementing our IAM...
Event Recording
Better Living Through Centralized IAM Policy Decisions
Sep 14, 2021
Stephen Hutchinson , Board Member & VP of Security Architecture, IDPro & MUFG
Event Recording
Best-Practice Approaches to Multi-Cloud IAM in the Enterprise
Sep 14, 2021
As more and more organizations go multi-cloud, the question arises how to integrate existing and compliance-proven enterprise IAM processes with the upcoming requirements of managing identity in the clouds. In this talk we will present two different approaches on how an organization can manage multi-cloud identities and access. The models are based on real life examples we have found to work out for organizations we work with. What we learn with these examples is that there is a wide spectrum between agility and control. Each organization has to find their own balance in this...
Event Recording
Bad things that Can Happen
Sep 14, 2021
Disclaimer: The speaker at this session has not been involved either directly or indirectly in the work in the aftermath of any of the Ransomware attacks described in this session. All of the information from the cases is based solely on data that is in public domain. Bjarke Alling, Chair, National Danish Cybersecurity Council
Event Recording
The Rise of the Machines
Sep 14, 2021
As processing power becomes cheaper, smaller, and more accessible, the issues of Identity in this automated space become increasingly relevant. We will discuss how machine learning (ML) can perform many traditional governance tasks previously the responsibility of managers – from ensuring appropriate access controls to automating the processing of access requests. We will also examine how intelligent devices are acting as agents for other identities and the challenges this brings to traditional identity management. Real-world examples will be presented of ML identifying security...
Event Recording
Panel | Mastering the Security Challenge for AI
Sep 14, 2021
Artificial Intelligence (AI) has been boosting innovation and creating a whole new wave of business models. With its rapid expansion into most use cases in many industries, a new threat landscape is evolving and as such presenting tough challenges to cybersecurity teams. With its huge impact on the way we interact with technology, the need for good practices and high standards in securing AI infrastructures is becoming a priority. In this panel session, we will     Identify and describe common AI security threats Talk about data quality, integrity and reliability...
Event Recording
Building Mindset for Privileged Access
Sep 14, 2021
For most companies, privileged access management is associated with creating borders or limitations. Often organizations are forced to implement PAM due to the legal regulations and do not see it as an investment but rather consider cybersecurity as a cost center. Moreover, most employees think of it as another layer of control and make an assumption that the company does not trust them.  Konstantin Krasovsky , Director EMEA, Indeed Identity
Event Recording
Staging & Release Management in IDM Environments
Sep 14, 2021
Ever since, Identity Management Environments do belong to the ‘more complex’ solution stacks in the world of IT. As a central component and the ‘spider in the web’, it must adopt to any evolutionary change made in connected applications and systems. Furthermore, new or modified business requirements or procedures do drive constant changes to IDM-Systems itself. Depending on traditional, agile or ‘mixed’ service delivery and maintenance approaches in conjunction with multi-tier environments for development, staging, pre- production and production (or even...
Event Recording
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Sep 14, 2021
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases. Richard Archdeacon , Advisory CISO, Duo Security
Event Recording
Panel | Best Practices to integrate AI in Identity Access
Sep 14, 2021
Anne Bailey , Analyst, KuppingerCole Fabrice Gürmann , Data & AI Specialist, Microsoft Tobias Oberrauch , Senior AI Consultant // Leader Group at Baden-Württemberg, CGI // AI PIONEERS // German AI Association
Event Recording
Integrated Intelligence – Combining Human and Artificial Intelligence for Competitive Advantage
Sep 14, 2021
Many companies from diverse industries increasingly rely on AI for strengthening their efficiency by automating jobs. Many of these advanced automation tools, however, currently become standard applications. Consequently, an isolated use of these tools will not enable companies to gain a competitive advantage. This presentation builds on an intelligence-based view of firm performance and the ‘Integrated Intelligence’ approach, which highlights the need to integrate AI with specific human expertise to outperform competitors and to transform a firm’s intelligence...
Event Recording
How to successfully rob a bank (and almost get away with it)
Sep 14, 2021
The majority of crimes in our industry are initiated with cyber-attacks on people - however, our people can also be our most valuable assets. This presentation start with a walkthrough of multiple "bank robbery" scenarios to focus on a real event from 2016, when in one of the largest cyber heist ever, $1 billion were at stake being stolen from a bank. And how human vigilance (as well as human mistakes by the criminals) finally prevented the worst. Kashif Husain , CISO, Vice President, Nomura
Event Recording
Malware Manipulated in Cloud Environments - Is it Dangerous?
Sep 14, 2021
During this presentation, I'll show how the effects can bring in inside the Cloud environment if was exploitable by Malware using PDF file, explaining how each session works within a binary, what are the techniques used such as packers, obfuscation with JavaScript (PDF) and more, explaining too about some anti-desassembly techniques, demonstrating as a is the action of these malwares and where it would be possible to "include" a malicious code. Filipi Pires , Security Researcher, THOR - Threat Hunting Offensive Researcher
Event Recording
One PAM - A Holistic Approach to PAM for the Shift to a Zero Trust Model
Sep 14, 2021
Join Peter Dulay, Symantec Identity Management Adoption Advisor, Broadcom, as he introduces One PAM, which brings together traditional proxy-based (credential vaulting) with agent-based (granular access controls) capabilities into one consolidated solution and approach, and how One PAM is better positioned to help customers shift to a Zero Trust model.   Peter Dulay , Security & Integration Adoption Advisor, Broadcom
Event Recording
Continuous ZeroTrust as a Way To Know Your User
Sep 14, 2021
Organisations perceive their users through data. In the world of fewer and fewer opportunities for physical contact, identity verification is going all remote. All online service providers need to model the risks related to user impersonation and user manipulation attacks. In this talk, we will dig through the classical methods of Knowing Your User through the static data: Authentication Coupling the session with the device Checking the network environment Next, I will present manipulation methods related to data spoofing to express the business impact. Usual scenarios are...
Event Recording
The human factor in Cyber Security - Creating a cyber aware culture
Sep 14, 2021
Alex Weishaupt , Practice Lead Cyber Security, Morgan Philips
Event Recording
What a CISO needs to know about GDPR
Sep 14, 2021
Stefan Hessel , Rechtsanwalt I Attorney-at-Law, reuschlaw Legal Consultants
Event Recording
Panel | Is Traditional MFA the Right Solution in a Post-COVID World?
Sep 14, 2021
The hybrid mix of remote and office work combined with digital transformation initiatives is driving the rapid adoption of cloud. This trend is also prompting organizations to rethink requirements for authenticating employees and other members of an organization supply chain. Companies are now exploring how to significantly improve both security and the end user experience. Unfortunately traditional multi-factor authentication is lacking in both areas.  Joni Brennan , President, Digital ID & Authentication Council of Canada Martin Kuppinger , Principal Analyst,...
Event Recording
Airbus Expert Perspective: Managing Third-Party Identity Risk in the Supply Chain
Sep 14, 2021
As a leader in innovative aerospace manufacturing with locations across the world, Airbus recognized the need to fortify its third-party identity management processes to better meet the operational efficiency and security needs of its evolving business and supply chain. Specifically, Airbus wanted to upgrade its identity management capabilities around lifecycle management, data quality, and obsolescence management for its third-party, non-employee users. Benjamin Gasperi , On/Offboarding Product Manager, Airbus Guillaume Lugat , Head of Identity & Access Management, Airbus
Event Recording
From a Business Centric Consent Management Paradigm to a User Centric One
Sep 14, 2021
I today's digital world (post EU DMA, DSA, DGA regulation proposals (now tabled in EU Parliament for legislative approval by 2023), GAIAx birth in Europe and eprivacy new regulations adoption, the hard line separation between personal and non personal data is blurring and companies have yet understood what this means for them. While they thought that only personal data needed to be consented, now it's all the data that need the consent log prof for each digital identity they get associated to. Europeans have also created a new "notion" of cloud (GaiaX). A cloud where data can...
Event Recording
Panel | Building Trust with CIAM
Sep 14, 2021
Armin Bauer , Managing Director Technology and Founder, IDnow GmbH Paul Fisher , Senior Analyst, KuppingerCole John Erik Setsaas , VP of Identity and Innovation, Signicat AS
Event Recording
From top-down ecosystems to collaborative ones
Sep 14, 2021
Traditional identity and access management solutions built so far on the trust for selected identity providers and their adoption from an ecosystem of identity owners and identity verifiers. The decentralized identity paradigm is disrupting these ecosystems and required more democratic collaboration and competition among a number of identity and credential issuers, identity owners, and verifiers selecting and using them. This requires not only to design and implement new technologies but also to identify new business opportunities and business models. Collaboration,...
Event Recording
Why We Need Guardianship in the Digital World, and How We Might Approach Delivering Guardianship Using Verifiable Credentials
Sep 14, 2021
  Guardianship is a condition of life in human societies. When we are young we may be looked after by parents until we become adults. When we are adults we on occasions need others to look after us, and sometimes we may need increasing levels of care as we age. In our physical world, we may recognise a guardianship role between parents and children and within families, and we may have more or less sophisticated laws to recognise instances where someone needs to take care of another for medical, financial or other needs. While the concept of Guardianship is...
Event Recording
Panel | The State of Decentralized Identity - World Stage
Sep 14, 2021
  Raj Hegde , Project Manager, KuppingerCole Dr. Michele Nati , Head of Telco and Infrastructure Development, IOTA Foundation John Phillips , Partner, 460degrees
Event Recording
Entitlement Management across Hybrid Cloud for Security & Compliance
Sep 14, 2021
Companies across the globe are undergoing digital transformation. The main challenge with this approach is the ability to securely manage access for on-premise, cloud and SaaS applications. Entitlement Management across this hybrid landscape requires management of cloud assets, IAM profiles, groups, roles and entitlements in support of Identity Lifecycle Management, Access Management, and Access Governance. Workloads have been running in the cloud since the last decade or so. AWS, GCP and Azure have replaced traditional data centers and companies continue to migrate their...
Event Recording
Zero Party Data - knowing without controlling
Sep 14, 2021
Applying the principles of self-sovereign identity to financial and social media sourced data points will enable businesses to make better and informed decisions about retention, acquisition and eligibility whilst relieving them of most of their obligations under GDPR. Julian Wilson , Founder, Valido Limited
Event Recording
Zero Trust Use Cases
Sep 14, 2021
Zero Trust Use Cases: a pragmatic look from well-known use cases to lesser known ones. Focus will be on real world examples and situations proven in practice rather than on formal compliance. Further on we will have some critical thoughts on this topic.   Key Topics: * What is Zero Trust? * Some appliances for Zero Trust               - Well-known use case: Web shop               - Current use cases: Bring-your-own-device,...
Event Recording
Siemens Zero Trust Architecture in 2021 and Beyond
Sep 14, 2021
Siemens AG drives the comprehensive Zero Trust program enabling most areas of Cyber Security, Enterprise and Product IT. In the presentation we are going to share our architecture vision as well as the implementation road map. We are going to share some lessons learned, which we gained on the way we passed so far. Dr. Jan Herrmann , Senior Cybersecurity Architect - Authorization Technologies and IAM, Siemens Dimitri Lubenski , Head of Technology and Innovation (IT Strategy), Siemens
Event Recording
The impact of agile on progressing Identity Security
Sep 14, 2021
After applying an agile way of working for the last three years the Rabobank Identity & Access Management service has gone through a transformation. The increased autonomy of teams, using backlogs with prioritized epics, applying agile rituals in order to create space for growth in applying agile principles, all of these have affected how IAM services are developed and delivered. Where the arena is uncertain and customers have a somewhat-defined request the agile, iterative approach works. Yet where the arena is regulatory governed and compliance driven an agile approach...
Event Recording
Improving IAM Success Rates with Rigorous Concepts
Sep 14, 2021
IAM programs in organizations have a reputation for difficulty and high failure rates. Through education and later through experience, professionals learn that communication is the most critical success factor in all human undertakings. We may have cutting-edge technology, generous budgets, and a competent team and still fail our project miserably. High-quality communication about IAM with our stakeholders is insufficient to succeed, but it is a necessary condition.  And what is the building block of communication? Words and concepts. Improving the IAM vocabulary's...
Event Recording
Journey from Enterprise Strategy to Identity Simplification
Sep 14, 2021
In an insurance sector not yet impacted by uberisation, AXA is moving toward its digital transformation. To achieve its key targets, including reduced time to market and improved user experience, AXA has launched several major programs: network, datacenter, workspace, .., and Identity and Access Management. Come discover how AXA leads the IAM program to support its digital transformation though improved agility, automation & business partnership capacity, both external and internal, while maintaining a high level of security. – Adapt your IAM program to...
Event Recording
Balancing User Experience, Privacy and Business Requirements – Learnings From Social CRM
Sep 14, 2021
Based on our research about critical privacy areas in Social CRM I could present solutions and discuss further potentials provided by upcoming technologies and resulting requirement on privacy management systems. Social CRM is a bit special as indeed many applications and processes areas are still in legally grey area, without established and accepted standards. Users tend to ignore this fact as many applications and process provide a value for them and/or are comfortable. Based on this specific setup I could build up the discussion and presentation. This presentation would be more a...
Event Recording
Data Privacy
Sep 14, 2021
Do people really care about data privacy? Jason Smith , Chief Commercial Officer, Meeco
Event Recording
Securing the Privacy of Non-logged in Devices
Sep 14, 2021
Many services across the web today allow users to consume the service without explicitly signing up. They generally identify users by a cookie containing a unique browser-id and store user data against it. George Fletcher , Identity Standards Architect, Verizon Media Group Deepak Nayak , Privacy platforms Architect, Verizon Media
Event Recording
Applying Zero Trust to Humans and Things
Sep 14, 2021
The pandemic has dramatically changed how we work, shop, meet and learn. Simple username and password credentials can no longer be part of this new world. They have become every user’s and every IT departments’ nightmare. Connected IoT things are for the first time outnumbering non IoT connections such as Tablet, Phones and PCs and many emerging business models will drive more revenue through IoT-enabled services than the products through which they’re delivered. Applying zero trust thinking to all identities including connected things and not just employees and their PCs...
Event Recording
Using Identity in a Zero Trust Architecture
Sep 14, 2021
Zero trust requires an enterprise to identify and monitor all the network identities used in the enterprise. NIST SP 800-207 refers to a zero trust deployment pattern called “enhanced identity governance”. The National Cybersecurity Center of Excellence (NCCoE) has a project on implementing a zero trust architecture that will include enhanced identity governance. This talk will be an overview of the role of network identities in zero trust and the current status of the NCCoE project. Scott Rose , Computer Scientist, National Institute of Standards and Technology (NIST)
Event Recording
Trust as the Key Concept in Future Mobility
Sep 14, 2021
The Internet and consequently the Internet of Things were built without a trust layer. Decentralized Digital Identities as basis for Connected Mobility may be one of the needed missing components to implement real data sovereignty and a trusted Economy of Things in future Connected Vehicles scenarios. Peter Busch , Product Owner Distributed Ledger Technologies Mobility, Robert Bosch Group
Event Recording
The #FutureOfMobility is decentralized
Sep 14, 2021
Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation. Ranging from eScooters, bicycles, ride-sharing to car-sharing, ride-hailing and public transport. Dr. Harry Behrens , Founder and CTO, Power & Mobility Ltd - bloXmove.com
Event Recording
A Primer for SSI in DE
Sep 14, 2021
Self-Sovereign Identity – or SSI in brief – is now a major thing. Germany has become one of the world’s key SSI accelerators. Countless people and organizations – small and large – are getting excited and actively involved. Now de facto driving forces are: 1. SSI Pilots by the German Federal Chancellery as first demonstrations of the Digital Identity Ecosystem. 2. IDunion – a solution-oriented research project co-funded by the German Federal Ministry of Economic Affairs and Energy in the cluster of showcases in Secure Digital Identity. This presentation...
Event Recording
FIDO for Developers - How Developers Can Master FIDO and Passwordless Authentication Without Adding Unnecessary Complexity.
Sep 14, 2021
The paradox of simplicity is that making things simpler is hard work. - Bill Jensen  Building strong passwordless authentication from scratch can be very time-consuming. Integrating the necessary infrastructure into a typical password-centric identity code base increases code complexity exponentially. Taking into consideration that well-known user flows have to be changed and enhanced with new authentication options may also pose significant challenges for developers. They have to get it right - and make it as simple as possible for the end user.  In this talk, we...
Event Recording
How Biometric Face Verification Enables Effortless IAM in a Zero Trust Environment
Sep 14, 2021
Now more than ever, the world is operating online. Governments and enterprises need a way of securely verifying an individual’s identity whilst providing an inclusive and positive customer experience. iProov is a world leader in cloud-based face biometric authentication technology. Our Genuine Presence Assurance™ technology, powered by flashmark, ensures that the individual is: the right person, a real person, and also confirms that they are authenticating right now. Tom Whitney , Global Head of Solutions Consultancy, iProov
Event Recording
Using Hypermedia to Adapt Client-side Login to Go Beyond Passwords
Sep 14, 2021
There are various ways that client applications may need to log in when going beyond passwords. With a username and password, client development is easy -- just collect a couple of inputs from the user and match them on the server. When going beyond these though, how can client applications be deployed and maintained in a way that the server still dictates what the client should present and obtain from the user when authenticating them? Travis Spencer , CEO, Curity
Event Recording
Four Steps to a Next Generation PAM Solution
Sep 14, 2021
Four simple steps to the perfect PAM. Stefan Schweizer , Vice President, Sales – DACH, ThycoticCentrify
Event Recording
Going Passwordless and Beyond - The Future of Strong Authentication
Sep 14, 2021
The onslaught of account takeover attacks from insecure passwords is driving the rapid adoption of passwordless solutions.  While the risk reduction benefits are substantial, eliminating passwords is just the first step on the path to fundamentally strong authentication.  In the “new normal” era of work from anywhere, and rapidly increasing cloud adoption, organizations are moving to a new risk-based authentication model.  Advanced organizations are validating users, their devices, and inspecting the security posture of the device for each login.  Strong and...
Event Recording
Panel | Prioritizing Identity - Identity-Centric Security Strategy
Sep 14, 2021
Identity management is critical for digital transformation and continues to evolve and gain importance as the business environment changes in today's hyperconnected world, where employees, business partners, devices, and things are all tightly interwoven. Deploying an identity security solution – regardless of your business size or industry is a fundamental requirement today to facilitate secure communications and reliable transactions. This panel explores identity security strategies that enable your business to take full advantage of your solution’s capabilities. Yvo...
Event Recording
Panel | APIs - Where Security Meets Identity Management
Sep 14, 2021
Traditional IAM models have focused on users, policies, and roles, which met the needs of web applications in years past but as application development has evolved to APIs, an innovative approach to identity management is required. It is no longer just users, roles, and permissions. APIs must be integrated into the identity and access management framework to ensure adequate governance and security. Within an API there is a requestor (often on behalf of a user), a service (API), and the data that is being passed. All these entities in the transaction require unique identity...
Event Recording
User Terms Engineering Layer for IEEE (The Institute of Electrical and Electronics Engineers)
Sep 14, 2021
Doc Searls , Co-founder and board member of Customer Commons, and Director of ProjectVRM, Harvard's Berkman Klein Center for Internet and Society
Event Recording
Panel | One Size Doesn't Fit All - Why Identity User Experience Matters More Than Ever in a Zero Trust World
Sep 14, 2021
Balancing usability and security is a well-known challenge in the field of identity. With increasing threats to personal and critical business data posed by nation-states and other bad actors, organizations are moving to a default posture of Zero Trust with more and more technology vendors and service providers delivering solutions in the form of complex monitoring and policies designed to keep the bad guys out. Knowledge workers, including an increasing population of frontline workers, require and expect seamless collaboration and productivity without barriers that waste time...
Event Recording
How to Stay Relevant in the Age of Conversational Banking
Sep 14, 2021
The age of conversational banking represents a transformation of how and when banks interact with their users. Şebnem Elif Kocaoğlu-Ulbrich , Founder, Contextual Solutions
Event Recording
How Secure is Your Multi-Factor Authentication?
Sep 14, 2021
Well-designed multi-factor authentication technologies, especially when paired with a mobile device or other token, mitigate security risks from single factor username/password authentication while still providing a positive user experience. Rebecca Nielsen , Director of Technology Integration, PKH Enterprises
Event Recording
Driving Business Value in the Enterprise with Zero Trust
Sep 14, 2021
With the merger of AOL+Yahoo, the newly formed Enterprise Identity team had the challenges of planning to support the cloud-first future of the new company Oath (which would become Verizon Media), building a new Identity ecosystem with Zero-Trust methodologies, and supporting a security-minded culture. Bryan Meister , Senior Principal Architect, Yahoo
Event Recording
Integrating IoT With SSI-Enabled Technologies For Healthcare
Sep 14, 2021
Dr. Christos Patsonakis , Postdoctoral Research Associate, The Centre for Research & Technology Hellas
Event Recording
Panel | Futureproofing Pharmaceutical Supply Chain Security
Sep 14, 2021
Bob Celeste , Founder, Center for Supply Chain Studies Jeffery Denton , Vice President, Global Secure Supply Chain, AmerisourceBergen Georg Jürgens , Manager Industry Solutions, Spherity David Kessler , President, Legisym David Mason , Supply Chain Compliance and Serialization Lead, Novartis Gena Morgan , Strategic Consultant, GS1 US Dr. Oliver Nürnberg , Chief Product Owner, SAP Life Sciences
Event Recording
Introducing ESSIF-LAB - The European Self-Sovereign Identity Framework Lab
Sep 14, 2021
Drs. Jacoba C. Sieders , Member Of The Board Of Advisors, EU SSIF-lab
Event Recording
Securing the Digital Double - The Path to a Trusted Digital Ecosystem
Sep 14, 2021
Digital life is a replication of the physical world in a digital ecosystem. As a result, people and things have an equal digital representation, which we call a digital double. Your digital double is active and involved in various activities, even when you take a nap. Therefore, securing the digital double is critical.  Asanka Abeysinghe , Chief Technology Evangelist, WSO2
Event Recording
Persistent digital reputation across industries, countries, and legal frameworks
Sep 14, 2021
Stepan Gershuni , VC Marketplace WG Lead, Decentralized Identity Foundation
Event Recording
Distributed Identity using the example of a digital vaccination card
Sep 14, 2021
Distributed Identity (DI) is less known to many and even less in connection with the pandemic. The concept that DI delivers is an excellent starting point for creating a digital vaccination record. Why DI is generally a good idea and what a digital vaccination record based on it can look like, is shown in this lecture. If you want to explain to your family in practical terms what IAM, IGA and PAM do: get vaccinated and (hopefully soon) apply for a digital vaccination certificate! Ingo Schubert, Global Cloud Identity Architect, SecurID, RSA Security
Event Recording
A Window Into Our Industry
Sep 14, 2021
Keeping up with the changes in our industry is no simple task. The rate of change for identity technologies, their applications, and their roles in the enterprise is simply too great. Since 2018, IDPro has conducted an industry survey to call attention to the skills that identity practitioners possess and employee to be successful. In 2019, the survey was expanded to explore enterprise priorities to highlight which areas of the identity industry were garning more attention and investment. And in 2021, IDPro expanded the survey again to include questions about diversity and inclusion. Join...
Event Recording
Evolution of User Centricity in Customer IAM
Sep 14, 2021
The transformation of the IAM landscape of a Multi Service Provider is taking shape. Rolf Hausammann , Head of Identity and Access Management, Swisscom
Event Recording
European Identity & Cloud Awards Ceremony 2021
Sep 14, 2021
Event Recording
Meeting Expectations – 5 pillars for IoT project success
Sep 14, 2021
Deployment of IoT installations are accelerating as organisations seek to expand their business by adding IoT functionality to their products/service, or reduce their costs by automating processes. Unfortunately, in many cases these initiatives are not adequately executed and, as a result, do not meet expectations. In this session we will look at 5 pillars of an IoT deployment: the Device pillar ensures we select the appropriate sensors and actuators, the Control pillar guides our decisions on controller functionality, the Communications pillar ensures we consider which options fit our...
Analyst Chat
Analyst Chat #93: Policies and Automation to Secure Your Agile and Dynamic IT Environment
Sep 13, 2021
Martin Kuppinger and Matthias discuss the high-priority topic of how to achieve automation of management and security across the entire multi-hybrid, multi-cloud IT infrastructure based on well-defined policies.
Event Recording
Introducing BASIS - Addition to Martin Kuppinger's Opening Keynote
Sep 13, 2021
Event Recording
Multi-Cloud Multi-Hybrid IT: How to Make your Digital Business Fly
Sep 13, 2021
IT has changed fundamentally in the past years. Multi-cloud environments mixed with private clouds and on-premises infrastructures (multi-hybrid) are the new normal. The high pace in transformation, modernization, and innovation required for success in the digital age requires these environments to work smooth and secure. In his talk, Martin Kuppinger will discuss where and how IT, IT Security, and IAM need to evolve to make the digital business fly.
Event Recording
Identity and the Rise of the Platforms
Sep 13, 2021
The first era of SaaS is ending, and we are entering a new era of convergence. This new era will result in new kinds of enterprise platforms that converge discrete functionalities into new systems of delivery. Best of breed solutions will all but disappear. Point solutions will fade away. The identity industry will fundamentally shift. The traditional IAM vendors you know are going to face competition from Salesforce, ServiceNow, Workday and others. You, the customer, are going to be influenced more and more by these players and their new systems of delivery. In this session, I will...
Event Recording
Where Stands the Sovereign Self?
Sep 13, 2021
When thinking about what SSI means for enterprises and providers of services to enterprises, it's easy to forget that SSI is about each of our sovereign selves. This means SSI should give us each a clear sense of independence, agency, and obvious freedom from the old centralized Identity Provider Relying Party model, and the federated one that followed from it. But we aren't there yet. What will it take to get us there—for our sovereign selves, and not just for hot new SSI businesses?
Event Recording
Hybrid. It’s Never Only One Thing
Sep 13, 2021
New technology is often seen as a total replacement for whatever came before. This is evident in the “Move to Cloud”! However, we are almost never in a greenfield position: we must interoperate with legacy systems and the demands of the business drive towards different and competing solutions for different problems. We will discuss the challenges of a hybrid deployment, addressing multi-cloud as well as on-premises components, and how a hybrid approach to identity is required to competently address these often conflicting requirements. We will use real-world examples of hybrid...
Event Recording
Identity, Privacy, Security - The European Perspective
Sep 13, 2021
In recent years, we have seen quite a few transatlantic policy issues with regards to Cybersecurity and the way how personal information is being treated by private and public organizations. The main areas where we see these differences are data protection/privacy, standards & certification and last but not least private-public information sharing.
Event Recording
Modernizing the Customer Journey
Sep 13, 2021
As organizations are recovering from the pandemic, the need to adapt to rapid technology, organization and social changes makes many of them embark on a digital transformation at high speed. Investments to drive online business, powered by customer insights and an attractive user experience, yet secure and compliant to rules and regulations, have never been bigger. Integrating Marketing and Customer Relationship Management (CRM) functions with Customer Identity & Access Management (CIAM), if done well, can help business owners achieve the ROI they are looking for. Join Gerald...
Event Recording
Identity’s evolving role in cloud security
Sep 13, 2021
As we emerge from the first wave of digital transformation, most organizations have embraced multi-cloud and hybrid environments. Companies increasingly use digital technologies to transform the actual products and services they sell to their customers, while modern service and app architectures drive adoption of containers and micro-services. These trends pose new challenges and opportunities for security. The number of machine-to-machine interactions is growing, as is the need to establish trust in real time across many distributed systems. In this thought-provoking session, Joy Chik...
Event Recording
The Dawn of Digital IAM
Sep 13, 2021
Join Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, Broadcom as he discusses the new realities that are driving the evolution of Identity and Access Management (IAM) and how organizations use IAM as a key pillar in the architecture for Zero Trust. Vadim will also highlight the future of the Symantec’s IAM suite of solutions and how they will help our customers build their own Identity Fabric.  
Event Recording
Identity is the New Blue
Sep 13, 2021
Blue is the world’s most popular color. But this was not always the case. Originally, it was little used in art and clothing, and in turn, had little symbolic cultural value. In the course of a few key decades, however, blue overcame obstacles of sourcing and production, and its popularity exploded—rising to represent some of the highest values of society.  Subsequently, a wave of innovation democratized the color, placing it in the hands of “normal people” and cementing its cultural legacy. Identity finds itself on a similar path. After a period of...
Event Recording
The Rise of the Developer in IAM
Sep 13, 2021
Everything is famously code today—cars are computers with wheels, appliances have Internet access, smart doors and houses are controlled from mobile phone apps. With all this code around, security is more of a challenge than ever. A central pillar of security is identity management: the technology that protects logins and controls access. This, too, is becoming code to work with all the other code. Libraries for developers are essential, including ID controls in mobile and Web applications for initial sign on, single sign-on, federated sign-on, biometric authentication systems, and...
Event Recording
Cloud without Compromise: Identity-Centric Security that Mitigates Modern Risks
Sep 13, 2021
Is your IGA strategy keeping up with modern threats? Novel attack methods are revealed daily, compliance requirements never stop evolving, and how and where we work has forever escaped the traditional office. As a result, organizations require more flexibility than ever to protect what matters most. You shouldn’t have to compromise functionality nor security levels because your IT resources and people operate on-premises, in the cloud or in a hybrid environment. The point is that you don’t need to. Don’t miss this 20-minute keynote address by One Identity’s Rima...
Event Recording
Introducing The Global Assured Identity Network (GAIN)
Sep 13, 2021
100 experts propose an interoperable scheme to create a virtual IDP.
Event Recording
COVID has Accelerated Public Demand for Digital ID
Sep 13, 2021
Digital ID and Authentication Council of Canada (DIACC) research finds that three-quarters of Canadians feel that it’s important to have a secure, trusted, and privacy-enhancing digital ID to safely and securely make transactions online. As federal governments focus on post-pandemic recovery, investing in digital ID makes strong economic sense, especially for small and medium-sized businesses (SMEs). For SMEs, the impact of digital identity could be used to improve processes that are difficult today. This is especially true in situations where businesses need to provide proof...
Event Recording
Give Me 10 Minutes, I'll Give You The Truth About Identity
Sep 13, 2021
User recognition and authentication is becoming the central element of companies' digitalisation strategy. Not only are user registration and login the first experiences users make, Identity and Access management will ultimately determine which company recognises and serves the needs of its users best and will be successful in the market. What you can expect A holistic view on identity and access management A forward-looking way of thinking and Progressive software architectures
Event Recording
Complexity has Reached a Tipping Point in IT – What Can we do About it?
Sep 13, 2021
"Act quickly; allow me to think less; protect me from risk." These incongruent objectives are being asked of IT departments and their staff. We are living through a great digital transformation that is rewriting our way of working and means of producing goods and services. Underlying and enabling this transformation is an increasingly complex, obscure, and challenging myriad of interwoven software systems spanning organizational and technological boundaries. IT complexity is no longer isolated to back-office nerds conversing in technobabble and pushing us aside to remedy our newb problems....
Speaker Spotlight
EIC Speaker Spotlight: Maarten Stultjens
Sep 09, 2021
Speaker Spotlight
EIC Speaker Spotlight: Vadim Lander
Sep 08, 2021
Webinar Recording
Making IAM Agile and a Business Enabler 
Sep 08, 2021
In the digital era, IAM is no longer just about employees. To become truly digital and tap into the new business benefits, organizations need IAM systems that can cater to partners, consumers and even things, as well as support IAM capabilities across all target systems, regardless of their deployment model.
Speaker Spotlight
EIC Speaker Spotlight: Kay Chopard
Sep 07, 2021
Analyst Chat
Analyst Chat #92: How the Cybersecurity Market Is Evolving
Sep 06, 2021
Cybersecurity is one of the areas where virtually every business will need to invest because of ever-growing cyber risks and ever-tightening regulations, and in the post-Covid era, the cybsersecurity market continues to evolve and grow, having gained even greater importance. Warwick Ashford joins Matthias to discuss the factors driving the trends in this market and what businesses should be considering when making cybersecurity investments.
Speaker Spotlight
EIC Speaker Spotlight: Joni Brennan
Sep 06, 2021
Speaker Spotlight
EIC Speaker Spotlight: Dave Mason
Sep 03, 2021
Frontier Talk
Bringing User-Centricity to Decentralized Identity | Frontier Talk #6 - Nat Sakimura
Sep 01, 2021
Raj Hegde sits with identity veteran, Nat Sakimura - Chairman of OpenID Foundation to understand how user-centric learnings from existing authentication protocols can be applied to future identity initiatives. Tune in to this episode to explore ways to navigate tradeoffs between privacy and accessibility in decentralized identity and learn about interesting user-centric approaches that can be applied to modern identity protocols. P.S.: You do not want to miss out on our little surprise at the end of this episode 😉
Speaker Spotlight
EIC Speaker Spotlight: Sadrick Widmann
Aug 31, 2021
Analyst Chat
Analyst Chat #91: Vulnerability Management
Aug 30, 2021
Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability management. Together with Matthias, he provides an overview of elementary aspects that need to be considered.
Speaker Spotlight
EIC Speaker Spotlight: Chris Owen
Aug 26, 2021
Webinar Recording
Trust No One: Zero Trust Strategy and Design
Aug 25, 2021
With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.
Speaker Spotlight
EIC Speaker Spotlight: Nat Sakimura
Aug 24, 2021
Analyst Chat
Analyst Chat #90: API Management and Security
Aug 23, 2021
The market segment of products and services that are designed to manage and secure APIs as essential resources in a multitude of different environments is constantly evolving. On the occasion of the publication of the latest edition of his Leadership Compass "API Management and Security", Alexei Balaganski explains the fundamentals and current developments of these products and services.
Speaker Spotlight
EIC Speaker Spotlight: Carsten Stöcker
Aug 21, 2021
Webinar Recording
Zero Trust Through Dynamic Authorization and Policy Driven Access
Aug 20, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Aug 18, 2021
Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch , to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to explore the concept of machine economy, understand the needs of machines and dive deep into the intersection of decentralized identity and the Internet of Things.
Speaker Spotlight
EIC Speaker Spotlight: Eric Newcomer
Aug 17, 2021
Analyst Chat
Analyst Chat #89: Next-Generation BI Platforms
Aug 16, 2021
Business Intelligence is the discipline of deriving business insights from raw enterprise data to inform decision making. Although this is a mature market, new trends are stirring up this market sector. Annie Bailey joins Matthias to explain what is changing and what 'Next-generation BI platforms' are.
Speaker Spotlight
EIC Speaker Spotlight: Mike Kiser
Aug 12, 2021
Speaker Spotlight
EIC Speaker Spotlight: Graham Williamson
Aug 10, 2021
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20 pm. at EIC 2021 . To give you sneak preview of what to expect, we asked Graham some questions about his planned presentation.
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
Aug 09, 2021
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei Balaganski join Matthias and share their views on this market, the existing offerings, and how it might evolve.
Speaker Spotlight
EIC Speaker Spotlight: Vittorio Bertocci
Aug 03, 2021
Analyst Chat
Analyst Chat #87: Data Governance Platforms
Aug 02, 2021
Paul Fisher has researched the topic of Data Governance Platforms extensively, and he published a Market Compass on this topic at KuppingerCole Analysts just a few weeks ago. In the current episode of Analyst Chat, he explains this market segment to Matthias and provides insight into current developments.
Speaker Spotlight
EIC Speaker Spotlight: Peter Busch
Jul 29, 2021
Speaker Spotlight
EIC Speaker Spotlight: Women in Identity
Jul 27, 2021
Analyst Chat
Analyst Chat #86: Zero Trust Means Zero Blind Spots
Jul 26, 2021
The path toward a Zero Trust architecture to improve cybersecurity for modern enterprises in a hybrid IT landscape often seems overly complex and burdensome. Alexei Balaganski is this week's chat partner for Matthias and he draws attention to an often overlooked benefit of such an infrastructure. One key idea of Zero Trust is to actually reduce complexity and unnecessary effort and instead focus on what really needs to be protected.
The Access Management Playbook
7 videos
Speaker Spotlight
EIC Speaker Spotlight: Doc Searls
Jul 22, 2021
Event Recording
The Future of Access Management: Beyond passwords, beyond static entitlements
Jul 22, 2021
In his talk, Martin Kuppinger will deconstruct the term Access Management and look at the various elements and concepts behind. Access Management is multi-facted and includes many concepts. On the other hand, many of the areas we should find being supported in Access Management are still missing in most implementations. So: What does it need for a modern, comprehensive Access Management? How will this look differently from now? Will we get rid of the burden of annoying authentication procedures or reviewing static entitlements we don’t understand? Which roles should policies play?...
Event Recording
The Path To Going Passwordless
Jul 22, 2021
Event Recording
Expert Chat: Interview with Josh Green
Jul 22, 2021
Event Recording
Visualizing IAM
Jul 22, 2021
Event Recording
Everything Will Be Tokenized: The Future of Identity
Jul 22, 2021
We're on track towards a world where everything that can be, will be tokenized. Tokenization plays a critical part in enabling more equitable value creation for people, organisations and things. Providing the means to issue and store value, trace provenance, and most importantly achieve consensus to instantly trust. However, in order for this tokenized world to emerge we first need the infrastructure for people and their digital twins to participate in equitable and fair ways. This will include digital identity, verifiable credentials and payments. This session will feature some...
Event Recording
Sabotage protection - How to double-secure internal company secrets
Jul 22, 2021
How do you protect secret information from sabotage? You should consider two possible scenarios when answering this question: Sabotage can be caused from the outside as well as from the inside. In principle, a potential threat can also come from people within your own company. An essential step is therefore to make sensitive documents and directories accessible only to employees who really need them for their work: Following the need-to-know principle. In the case of facilities that are vital to life or defense, these employees must also be instructed in how to protect themselves against...
Event Recording
Panel: The Future of Access Management
Jul 22, 2021
Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.
Speaker Spotlight
EIC Speaker Spotlight: Gerald Horst
Jul 20, 2021
Analyst Chat
Analyst Chat #85: Hybrid IT 4 - Hyperconverged, Edge and Cloud in a Box
Jul 19, 2021
This episode concludes the four-part series on hybrid IT. To wrap things up, Mike Small and Matthias focus on the latest developments in hybrid infrastructures, between containers, hyperconverged, edge and cloud in a box.
Webinar Recording
Identity Verification: Why It Is Needed and How It Can Benefit the Business
Jul 16, 2021
The COVID-19 pandemic has transformed the way customers engage with brands and led to increased digital interaction. But this has increased the incidence of fraud during the account creation process. As a result, businesses now face the challenge of verifying customer identity and verifying that those entities interacting with their brand are human and who they claim to be.
Speaker Spotlight
EIC Speaker Spotlight: Anne Bailey
Jul 15, 2021
Webinar Recording
IT-Herausforderungen in der Digitalen Transformation
Jul 15, 2021
Die Digitale Transformation und die Notwendigkeit, von überall aus arbeiten zu können, nehmen massiven Einfluss auf die Unternehmensinfrastruktur. Das Ergebnis: Anwender, Applikationen und Daten sind nun überall und fordern bestehende Sicherheitslösungen heraus, sowohl einen umfassenden und konsistenten Schutz als auch eine performante User Experience zu bieten.
Frontier Talk
Building the Future of Identity | Frontier Talk #4 - Doc Searls
Jul 14, 2021
"Progress is the process by which the miraculous becomes mundane.” says Doc Searls, the next guest on our popular podcast series - Frontier Talk. In this episode, Raj Hegde sits down with one of the most prolific technology thinkers of our generation to understand the problems of the identity status quo and to determine the boundary conditions required to usher in a new era in identity - one that gives individuals independence and better ways to engage with businesses.
Speaker Spotlight
EIC Speaker Spotlight: Michele Nati
Jul 13, 2021
Analyst Chat
Analyst Chat #84: Hybrid IT 3 - Managing and Governing
Jul 12, 2021
Part three of the four-part series on hybrid IT looks at approaches to appropriately manage and evolve hybrid architectures. Mike Small and Matthias put the focus not only on technical management, but also on appropriate governance in particular.
Webinar Recording
Zero Trust Means Zero Blind Spots
Jul 09, 2021
The traditional model of enforcing security at the network perimeter is no longer effective. The nature of the corporate network is changing with mobile and cloud computing. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But deciding how best to adopt Zero Trust can be challenging.
Cloud Strategy Optimization
9 videos
Speaker Spotlight
EIC Speaker Spotlight: Patrick Parker
Jul 08, 2021
Webinar Recording
The Path to Going Passwordless
Jul 07, 2021
Password-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been widely recognized for some time, but going passwordless is also challenging and continues to be elusive for many organizations.
Event Recording
A Cloud for all Seasons
Jul 07, 2021
Even though the pandemic has been the main driver for digital workplace productivity as a strategic requirement, this topic will not go away after it is over. The Digital Business workforce needs to be “anywhere-enabled”. In order to support this Secure & Flexible Infrastructures for the Digitally Transformed Enterprise is necessary. Developing a digital workplace strategy contains several layers: Collaboration, EX (Employee Experience) and connectivity to forge productive business relationships within and beyond natural workgroups.  Workplace Technology -...
Event Recording
Optimizing the Cloud Strategy for Successful Transformation
Jul 07, 2021
Event Recording
Managing Cloud and Container Security Risk
Jul 07, 2021
 Modern cloud apps are built using CI/CD and run as containerized microservices. Do you have effective security and compliance controls in place? Legacy tools can't shift security left, validate configurations and compliance, or provide detection and response for production workloads. This session will share: How security organizations are evolving to meet cloud, container and CI/CD requirements Ways today's security stack needs to change to manage risk How open-source is impacting security innovation Where organizations are in the journey to a new secure DevOps...
Event Recording
Creating a Collaborative and Secure Software Development Lifecycle
Jul 07, 2021
Attendees will learn what steps to take to build collaboration in the software development lifecycle - and it goes far beyond tools.  How to put in place a strategy that fosters continuous improvement of the security posture.  A guide for how any organisation can get started, improve, and how to be able to adapt to changing technologies and security threats.
Event Recording
Expert Chat: Interview with Invited Expert
Jul 07, 2021
Event Recording
Panel: Ensuring Efficient and Secure Collaboration on Cloud
Jul 07, 2021
Event Recording
CCAK - Aim for the Clouds
Jul 07, 2021
The knowledge and skills gap in the cybersecurity industry is a problem that has been identified and discussed for the past 20 years. However, with the rapid acceleration of technology development, the skills gap seems to worsen as time goes by and may soon become a systemic deficiency. In this presentation, I will talk about the first-ever, technical, vendor-neutral credential for cloud auditing. It fills a gap in the industry for vendor neutral, technical education for competent professionals to help their organizations reap the full benefits of cloud environments.
Event Recording
Segmenting Enterprise Cloud Services
Jul 07, 2021
Event Recording
Confidential Computing and Why This Matters for Cloud
Jul 07, 2021
Speaker Spotlight
EIC Speaker Spotlight: Jackson Shaw
Jul 06, 2021
Analyst Chat
Analyst Chat #83: Hybrid IT 2 - The Challenges
Jul 05, 2021
Mike Small and Matthias continue their four-part series on hybrid IT, looking at the increasing complexity: they look at multiple dimensions of the challenges that come with deploying and operating hybrid IT architectures.
Webinar Recording
The IAM Cloud Journey
Jul 02, 2021
In the digital era, IT is increasingly being provided and consumed as cloud-based services, including Identity and Access Management (IAM). As more workloads and IT services move to the cloud, it makes sense to move IAM to the cloud as well. The most common path is to opt for an Identity as a service (IDaaS) solution, but this is not without its risks and challenges.
Webinar Recording
A Unified Approach to Modern Data Protection
Jul 01, 2021
Data is the lifeblood of business and government. Therefore, data breaches can be devastating in terms of disruption, damage to reputation, remediation costs, and data protection fines. But the ongoing high number of breaches shows that what many organizations are doing to protect their data is not working.
Webinar Recording
Accelerate Your Digital Transformation Through Identity
Jun 30, 2021
Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster digital transformation, better customer journeys, and improved security, privacy, and compliance.
Analyst Chat
Analyst Chat #82: Hybrid IT 1 - The Basics
Jun 28, 2021
This is the kickoff of a four-part series of podcast episodes around hybrid IT. Mike Small and Matthias explore the fundamentals of modern architectures between the cloud and the traditional data center.
Webinar Recording
Access Risk Management for SAP and Beyond
Jun 28, 2021
Organizations are increasingly under pressure to deliver security, identity, compliance, governance, and risk management for all types of business applications. This challenge is exacerbated by the fact that most organizations have a heterogeneous landscape of business applications both in terms of vendors and deployment models.
Digital Workflows with ServiceNow
7 videos
Webinar Recording
A Fresh Look at the Business Value of PAM in the Work-From-Anywhere World
Jun 23, 2021
As businesses continue their digital transformation journey, managing privileged users has taken on a new and greater importance. Privileged Access Management (PAM) has never been more important, with increased remote working and employees increasingly getting privileged access to data and services.
Event Recording
Exploring the Intersection of ITSM and ServiceNow
Jun 23, 2021
Christopher provides a deep-dive on the intersection of ITSM and ServiceNow
Event Recording
Enrich Your Digital Workflows with Identity: How to Use Identity to Design and Automate Modern Business Processes
Jun 23, 2021
Clear Skye shares how organizations benefit from digital workflows and identity on the Application as-a-Service delivery platform ServiceNow. Learn how organizations can use an identity workflow strategy to improve their business agility by making more informed decisions while reducing effort and total spend.
Event Recording
Expert Chat: Interview with Paul Walker
Jun 23, 2021
Expert Chat Interview Series with Martin Kuppinger
Event Recording
Addressing the challenges of the pandemic with ServiceNow platform capabilities
Jun 23, 2021
The last 14 month with the pandemic have been extremely challenging for all kind of organisations, but especially for the IT departments. They had and will continue to make the impossible possible, enabling a remote workforce without any significant interruption and often with a reduced manpower. This talk will focus on how this was made possible with ServiceNow and how organisations can prepare and embrace the new normal with standard features of the ServiceNow platform.
Event Recording
How Finning International set up for success with ServiceNow
Jun 23, 2021
David Izon takes us through how Finning International utilized ServiceNow's capabilities.
Event Recording
Panel - Best Practices for Managing Digital Workflows on ServiceNow
Jun 23, 2021
Panel Discussion on Best Practices for Managing Digital Workflows on ServiceNow.
Event Recording
When Identity becomes core to security - How to achieve integrated identity management at mega-scale
Jun 23, 2021
Analyst Chat
Analyst Chat #81: Fraud Reduction Intelligence Platforms Revisited
Jun 21, 2021
In episode seven of this podcast, John Tolbert and Matthias first looked at Fraud Reduction Intelligence Platforms more than a year ago. Much has happened in this market segment since then, and on the occasion of the release of the updated Leadership Compass, they look at the latest innovations.
Webinar Recording
Technological Approaches to a Zero Trust Security Model
Jun 18, 2021
The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices and workloads move outside the corporate network. A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.
Webinar Recording
Does Increased Security Still Mean Added Complexity?
Jun 18, 2021
We’re all accessing more goods and services online than we ever thought possible, which has presented a huge opportunity for cyber criminals. Rapid digital transformation has left some businesses exposed, and fraudsters are looking to exploit new weaknesses. Strong digital identity verification and authentication is essential, but has traditionally come with increased complexity at the expense of a good user experience. But is this still true?
Webinar Recording
Privileged Access Management: Cloud Delivery Without Compromise
Jun 16, 2021
Privileged Access Management (PAM) solutions are critical cybersecurity and risk management tools for just about every business to address the security risks associated with privileged users and privileged access, but not everyone can afford expensive on-prem deployments.
Analyst Chat
Analyst Chat #80: AI Service Clouds
Jun 14, 2021
Anne Bailey has just completed extensive research into the new market segment of AI Service Clouds. In this episode, she explains this innovative concept, which aims to overcome the lack of qualified personnel and bring artificial intelligence and machine learning to more companies.
Video
Zero Trust & SASE: Ohne IAM geht nichts
Jun 10, 2021
Zusammenarbeit und neue Arbeitsformen ermöglichen, IT-Modernisierung unterstützen IAM (Identity und Access Management) ist ein Kernelement jeder Strategie im Bereich der Cybersicherheit. Kontext- und risikobasierte Zugriffssteuerung und adaptive Authentifizierung sind Kernelemente jeder funktionierenden Sicherheitsstrategie. Gerade für Zero Trust mit seinem Grundsatz „Nicht vertrauen – überprüfen!“ ist ein gutes, modernes IAM essentiell, um eben diese Überprüfung durchführen und Zugriffe in Abhängigkeit vom Risiko steuern zu...
Event Recording
Warum Zero Trust kein Schlagwort ist
Jun 10, 2021
Sie kennen das Sprichwort mit dem Tier, das durch das Dorf getrieben wird. Zero Trust könnte mal wieder dieses Tier sein. Doch Zero Trust gehört nicht in diese Kategorie und ist ein absolut notwendiges Sicherheitskonzept in Zeiten, in denen Unternehmen mit extrem kostenintensiven Angriffen wie Ransomware konfrontiert werden. Daher beleuchten wir in diesem Vortrag ganz aktuelle Szenarien und was es braucht, um derer Herr zu werden.
Event Recording
Interview mit Goetz Walecki, Okta
Jun 10, 2021
Event Recording
Kunden-Identitätsmanagement als Fundament Ihrer Innovation
Jun 10, 2021
Customer Identity and Access Management (CIAM), die Verwaltung und Kontrolle der Kunden-Identitäten, hilft Firmen, die Nutzung der Kundendaten sicher und datenschutzkonform zu gestalten, ohne den Blick auf ihr Business zu verlieren. Erfahren Sie von Auth0 wie man einfach, schnell, und sicher eine Identity Plattform integrieren kann und sparen Sie wertvolle Zeit um Ihr Kern-Geschäft weiter zu entwickeln und zu innovieren.   Features einer modernen CIAM-Lösungen und die Vorteile von Standardlösungen Mehrwert der Integration von...
Event Recording
Sicherheitsherausforderungen einer Multicloud-Welt – Privileged Access & Identities
Jun 10, 2021
 Viele Unternehmen nutzen heute mehrere Cloud-Dienste, wobei ihre Enduser regelmäßig Dutzende oder sogar Hunderte verschiedener SaaS-Anwendungen verwenden. Diese große Cloud-Migration hat erfolgreich eine Ausweitung des mobilen Arbeitens ermöglicht und beschleunigt Initiativen zur digitalen Transformation. Eine steigende Anzahl an Cloud-Diensten bedeutet allerdings ebenso einen Anstieg an IT-Sicherheitsherausforderungen. Neben den grundlegenden Cloud-Sicherheitsaspekten entsteht eine zusätzliche Komplexität sowie Interoperabilitätsprobleme, die sich aus...
Event Recording
Secure Remote Work: IT-Risiken vermeiden, Passwörter schützen & Kosten mindern
Jun 10, 2021
Im „New Normal“ und mit dem Anstieg von Remote-Work hat sich Vieles geändert. Ganz oben auf der Liste: IT-Sicherheit. IT-Abteilungen haben die Herausforderung, den gestiegenen Sicherheitsanforderungen gerecht zu werden und trotzdem für ein gutes Nutzererlebnis – auch im Home-Office – zu sorgen. Die wachsende Bedrohungslage für Unternehmen hat dabei nachvollziehbar sehr oft mit Engpässen bei der IT zu tun. Hier einige Lösungsansätze: Sicheres Passwortmanagement unternehmensweit einführen Produktivität für...
Event Recording
KI zur Überwindung des Daten-Problems
Jun 10, 2021
Event Recording
IT'S ALL ABOUT ACCESS - Identity & Access Management
Jun 10, 2021
Event Recording
Warum Privileged Access Management? Hacker knacken keine Firewalls mehr, sie loggen sich ein
Jun 10, 2021
Event Recording
Zero Trust Anwendungsfälle
Jun 10, 2021
Event Recording
Wahre Identitäten in einer digitalen Welt verankern
Jun 10, 2021
In einer Welt, in der Sie Kund/innen oder Mitarbeiter/innen nie persönlich treffen, ist es entscheidend realen Identitäten mit digitalen zu verankern. Nur so können Sie als Unternehmen sicher online Zugriff gewähren, Aktionen mit hohem Risiko verifizieren und ein Nutzererlebnis bieten, das ihre Kund/innen begeistert. In dieser Session wird Olli Krebs (VP Central EMEA bei Onfido) erläutern, wie Dokumenten- und biometrische Verifikation nahtlos Vertrauen über den gesamten Identitäts-Lebenszyklus ermöglichen kann.  
Event Recording
Eine mögliche Weiterentwicklung
Jun 10, 2021
Der Vortrag geht auf die mögliche Weiterentwicklung ein, die Sicherheitsorganisationen durchlaufen müssten, um mit der modernen Welt und den daraus resultierenden Anforderungen Schritt zu halten. Als Ausgangspunkt werden die IAM-Methoden genommen, aber auch wichtige Aspekte eines Sicherheitsprogramms durchgespielt. Die treibende Kraft für diese Veränderungen wird in der Digitalisierung gesehen. (Kürzung: Es werden kurze Einblicke in moderne Ansätze des IAM, des Risikomanagements, der Organisation von Sicherheit, der Sicherheitsarchitektur und weiterer...
Event Recording
Expertengespräch mit Dominik Achleitner
Jun 10, 2021
Im Expertengespräch unterhalten sich Dominik Achleitner und Daniel Holzinger über Passwörter und Passwort-Gewohnheiten. Darüber hinaus werden aktuelle Fragestellungen thematisiert, wie beispielsweise die Passwortsicherheit gemessen werden kann und wie es mit der grundsätzlichen Zukunft von Passwörtern aussieht. Grundlage des Gesprächs ist ein starker Praxisbezug unter Einbindung der TeilnehmerInnen.
Event Recording
Self Sovereign Identity – Wie die aufkommende Technologie die Digitalisierung beflügelt
Jun 10, 2021
Event Recording
Sichere Identität für offene cyberphysikalische Systeme
Jun 10, 2021
Cyber Access Summit 2021
19 videos
Webinar Recording
Smart IAM Services for the Modern Digital Enterprise
Jun 09, 2021
The identities of employees, appropriate authorizations in processes and systems, and a permanent control and monitoring of access to prove compliance are becoming increasingly important for organizations. However, the management of these things remains less than optimal.
Video
Zugriff für alle und dennoch die Kontrolle behalten
Jun 09, 2021
Event Recording
Identity und Access im Digitalen (Cloud) Arbeitsplatz
Jun 09, 2021
Identity im Bereich Digitalen Arbeitsplatz am Beispiel von Microsoft 365.  
Event Recording
Distributed Identity am Beispiel eines digitalen Impfpasses
Jun 09, 2021
Distributed Identity ist vielen eher weniger bekannt und noch weniger in Verbindung mit der Pandemie. Die Konzepte, welche DI liefert, sind aber ein hervorragender Ausgangspunkt einen digitalen Impfpass zu erstellen. Warum DI generell eine gute Idee ist und wie darauf basierend ein digitaler Impfpass aussehen kann, wird in diesem Vortrag dargestellt. Wer seiner Familie mal praktisch erklären möchte was IAM, IGA und PAM so machen: impfen lassen und (hoffentlich bald) einen digitalen Impfpass beantragen können!
Event Recording
Passwordless and Beyond - Die Zukunft des Identitätsmanagements
Jun 09, 2021
Analyst Chat
Analyst Chat #79: DNS and Privacy
Jun 07, 2021
Your DNS server knows what websites you use, what the name of your mail server is, and which corporate services you use while working from your home office. And there are even broader challenges when it comes to protecting sensitive personal data in that context. Alexei Balaganski and Matthias continue their conversation about a fundamental Internet resource, the Domain Name System, this time walking the fine line between technology and trust.
Webinar Recording
Digital Trust: Critical to Digital Business Success
Jun 02, 2021
2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. It also forced many organisations to overcome long-standing reservations about trusting their employees to work from home and placing their faith in digital channels to serve customers.
Analyst Chat
Analyst Chat #78: DNS and DNS Security
May 31, 2021
Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System. Alexei and Matthias discuss the basics of DNS, look at current cybersecurity threats targeted at it, and explain how they can be mitigated.
Event Recording
Matthias Reinwarth: The Future of IAM: Towards a Unified, Modular, Trusted, and Connected Identity Ecosystem
May 27, 2021
Identity and access management is evolving. Originating in centralized enterprise systems, IAM must now reflect the complex realities of modern organizations and our post-pandemic society. It is driven by the need for a seamless user experience for all types of identities with all types of devices while maintaining security, compliance and governance. Matthias Reinwarth, Director of KuppingerCole's IAM Practice, exemplifies the path to a big picture for IAM that combines federated and decentralized IAM with traditional IAM and promotes trust through verifiable credentials and the concept...
Event Recording
Ian Lowe: Trust Arrives on Foot But Leaves in a Ferrari
May 27, 2021
Inspired by this quote from Mark Carney, the former Governor of the Bank of Canada (2008-2013) and the Governor of the Bank of England (2013 -2020), we will take a look at how identity and trust are intimately connected, yet how fragile they are in the digital world. And, using two customer examples, we’ll show you how critical identity is to establishing trust and enabling seamless digital experiences in our daily lives.
Event Recording
Expert Chat: Interview with Ian Lowe
May 27, 2021
Event Recording
Tim Bedard: Mitigating Risks and Reducing Costs with IAM Hyperautomation
May 27, 2021
Event Recording
Frances Zelazny: Enabling the Future of IAM with Zero Knowledge Authentication
May 27, 2021
Event Recording
Francois Lasnier: The Key to Post Covid Success - Aim to Thrive Not Merely Survive
May 27, 2021
Event Recording
Expert Chat: Interview with Francois Lasnier
May 27, 2021
Event Recording
Panel - What's Next for IAM: Building for the Future
May 27, 2021
Event Recording
Jas Sagoo: The Business Balancing Act: User Experience and Security
May 27, 2021
In today’s digital environment, the bar has been reset when it comes to remote working, e-commerce, e-learning, e-health and streaming services. The demand for simple and secure digital experiences for customers has never been higher. And while logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organisations become responsible for the user’s digital identity. Combined with the current, fast evolving landscape and the continuous innovation in, and use of technology to deliver products...
Event Recording
Alan Bachmann: Bringing Accountability to the Digital Identity While Preserving Privacy and Security
May 27, 2021
Enabling the Future of IAM
10 videos
Analyst Chat
Analyst Chat #77: Don't Manage Access in Active Directory Groups
May 25, 2021
Maintaining finer grained access by administering AD groups through dedicated and delegated application administrators is the reality in many organizations. Martin Kuppinger and Matthias discuss these types of indirect authorization management and why they are no good choice, even more when AD becomes legacy.
Webinar Recording
Remote-Angestellte mit starker Authentifizierung schützen
May 25, 2021
Hacker schlagen Kapital aus Unsicherheit, Angst, Ablenkung, Isolation und Verwirrung. Die Verlagerung auf Remote-Arbeit hat viele dieser Eigenschaften, daher ist es entscheidend, das Vertrauen der Benutzer wiederherzustellen. Die Schulung der Mitarbeiter ist unerlässlich, schützt aber nicht zuverlässig vor Angriffen, eine Lösung kann die Integration starker MFA in die Sicherheitsinfrastruktur.
Essentials
IAM Essentials: Identity Proofing and Verification
May 20, 2021
Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.
Analyst Chat
Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)
May 17, 2021
CIEM is one of the latest entries to the set of 3- and 4-letter acronyms in IAM technology. Martin Kuppinger and Matthias take a look at the functionality behind it and its role within an Identity Fabric.
Identity-Centric Security
7 videos
Frontier Talk
Decentralizing Provenance in an Industry 4.0 World | Frontier Talk #3 - Dr. Carsten Stöcker
May 12, 2021
In this episode, Raj Hegde sits down with Dr. Carsten Stöcker, Founder & CEO of Spherity to understand how #decentralized identity is transforming the end-to-end supply chain lifecycle. Tune in to this episode to explore the increasingly important role of provenance in helping build a better world and learn about the intersection of exciting concepts such as non-fungible tokens (NFTs) and decentralized identifiers (DIDs).
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
May 12, 2021
Event Recording
Robert Byrne: IGA in the Cloud without Compromise
May 12, 2021
Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity Governance and Administration strategy. There is no single right way to do cloud-based Identity and Access Management services. Not only is every organization at a different place in their journey, and each will prioritize cloud benefits differently. So, no matter where you are on your cloud journey, modular and integrated solutions can strengthen your identity security, help you achieve governance...
Event Recording
Interview with Robert Byrne
May 12, 2021
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
May 12, 2021
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
May 12, 2021
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
May 12, 2021
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
May 12, 2021
Analyst Chat
Analyst Chat #75: Get Rid of IAM Siloes
May 10, 2021
Martin Kuppinger joins Matthias for a first hybrid audio plus video episode of the Analyst Chat. They talk about horizontal (capabilities like AM, IGA, and PAM) and vertical siloes (identities like things, robots, customers, partners, or employees). And they lay out a proper approach to strategically get rid of these siloes in the long run.  
Webinar Recording
Die Angriffsfläche Ihres Unternehmens aus den Augen eines Hackers
May 07, 2021
Mit zunehmender Digitalisierung und der Nutzung von Cloud-Services steigt das Angriffspotenzial auf die digitale Infrastruktur von Unternehmen. Hacker nutzen neuste Technologien, um Schwachstellen ausfindig zu machen und starten mit diesem Wissen Ihre Angriffe.
Webinar Recording
Are You Ready for Security Automation?
May 06, 2021
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations Centers (SOCs). But SOAR is not only for large enterprises. The benefits for smaller organizations should not be overlooked.
Analyst Chat
Analyst Chat #74: The Influence of PAM on WfH, and its Influence on PAM
May 03, 2021
Building on the first three podcast episodes of this series with Annie and Shikha, Paul Fisher and Matthias turn their attention to the Privileged Access Management aspect in the context of WfH and its Cybersecurity Threat Landscape. They look at the role PAM plays in the particular WfH use cases for administrators, as well as for business users. And they look at the potential changes that this will bring for the further development of PAM in the future.
Operationalizing PAM
9 videos
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
Apr 29, 2021
The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we be doing about their security? Join Thom from SentinelOne and Alexei as they discuss what AI and IoT really are to learn how many IoT devices Alexei has at home and how long we have to wait until "The Terminator" will be al real thing.
Event Recording
Joseph Carson: Your Journey to Privileged Access Security Maturity and Success
Apr 29, 2021
Privileged Access Management (PAM) continues to be a top priority for many organisations throughout the world. It is one of the most important   solutions   to help organisations reduce the risk from cyberattacks that target their privileged accounts   and help move passwords into the background reducing cyber fatigue . A compromised privileged account enables an attacker to move around the network undetected, download malicious payloads, stage compromised servers and cause significant financial losses to their victims.  Almost all users are now...
Event Recording
Paul Fisher: Privileged Access Management in a Changing World
Apr 29, 2021
In this keynote address, Senior KuppingerCole Analyst Paul Fisher will explain how PAM will further develop to become a central component of modern IT infrastructures and enable frictionless but secure access to data and services. Included in this talk: Changes in the PAM vendor landscape and impact on the market How innovation by PAM vendors is creating a new generation of PAM platforms The importance of managing secrets and the role that PAM must play in this Why Endpoint Privilege Management should be top of mind for every CISO and CIO
Event Recording
Filipi Pires: PAM: Is it a Culture? Project? Mindset or Platform?
Apr 29, 2021
Event Recording
Paul Simmonds: Why Your Business Needs a Strategic Approach to PAM
Apr 29, 2021
Often missed as a niche part of IT, “admin” access is the holy grail for the bad-guys attacking your business. Thus, its crucial to understand why a strategic approach to PAM and Credential management will improve your corporate security posture.  This talk will look at:  The approach management should take to PAM  The role of an HSM (High Security Module) in your PAM Strategy  Why missing the “Sec” out of Dev-Ops make you the next target 
Event Recording
Insights of a CISO: Interview with Frank Fischer
Apr 29, 2021
Event Recording
Marcus Scharra: Why PAM is crucial for DevOps security compliance
Apr 29, 2021
Event Recording
Sean Kennedy: Best Practices for a PAM Deployment
Apr 29, 2021
Event Recording
Panel: Quo Vadis PAM?
Apr 29, 2021
Event Recording
Raghu Dev: PAM for today’s Hybrid Enterprise – Practical Considerations
Apr 29, 2021
Analyst Chat
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
Apr 26, 2021
Shikha Porwal and Matthias Reinwarth have a coffee conversation over the security risks of working remotely. They talk through the vulnerabilities of a home network, and touch base with the pandemic related end point security threats, employee behavior and finally, Zero trust.  
Frontier Talk
Decentralized Biometrics and Next-Generation Authentication | Frontier Talk #2 - Frances Zelazny
Apr 22, 2021
Raj Hegde sits down with Frances Zelazny, Co-founder & CEO of Anonybit, to understand the novel concept of decentralized biometrics. Tune in to this exciting episode for a deep dive on biometrics, explore the relevance of decentralized biometrics as an alternative to centralized honeypots, and discover next-generation authentication mechanisms.
Webinar Recording
Consumer Identity Management Evolution
Apr 20, 2021
Consumer Identity & Access Management (CIAM) is about managing access to customer-facing systems. While organizations have typically focused on using CIAM to collect, store, and analyze consumer data to create sales opportunities and inspire brand loyalty, other potential business benefits are being overlooked.
Analyst Chat
Analyst Chat #72: WfH Global Technology Trends 2021
Apr 19, 2021
Annie and Matthias continue their conversation on the COVID-related trends in 2021. They conversate about different technology and internet usage trends, and also mention some potential topics that will become more prominent in the future as a learning from these trends.
Balancing SAP Security
11 videos
Event Recording
Martin Kuppinger: Beyond SAP Security & SAP GRC: Reflecting the Changing Business Workloads
Apr 14, 2021
Defining strategies on governance, risk management, compliance, security, and identity beyond the SAP silo Business applications are under change. While some remain on-premises and in traditional architectures, others have shifted to the cloud – and several of these being provided by specialist vendors such as Workday or Salesforce. The established vendors such as SAP also are changing their platforms, applications, and delivery models, while also acquiring SaaS vendors such as SuccessFactors and Ariba. The days of homogeneous, vendor-focused, one-stop-shopping business...
Event Recording
Arndt Lingscheid: How to Build a Strong Security and Compliance Foundation for Your SAP Landscape
Apr 14, 2021
Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks increasingly focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black box,” and they view the security of SAP applications as the responsibility of their Basis or SAP application colleagues, leaving these applications at risk. Securing an SAP S/4HANA business application environment involves more than roles and authorizations. The loss of sensitive data can lead to...
Event Recording
Britta Simms: Next Generation Cyber Resilient S/4HANA Transformations
Apr 14, 2021
Companies are under attack. More and more attacks result in costly and/or high-profile security breaches. The world is currently experiencing a wave of digital transformation, that brings with it not only new levels of complexities such as these, but also offers opportunities for organizations to strengthen their cyber resiliency. Accenture, together with strategic partner Onapsis, have developed an integrated approach to deliver security by design to our clients, at any phase of their digital SAP transformation journeys. This Accenture methodology has embedded security concepts as an...
Event Recording
Jochen Fischer: SAP Applications Under Attack! How to Enforce the Three Lines of Defense
Apr 14, 2021
Event Recording
Mastering Today’s SAP Threat Landscape - Joint Interview with Accenture & Onapsis
Apr 14, 2021
In order to effectively protect organizations, the constantly changing threat landscape needs to be understood. Threats could initiate from inside or outside of the organization, targeting the infrastructure, applications or users to obtain business critical data. Our panel discussion will focus on the most recent SAP threats, what’s different with the move to S/4, and valuable lessons learned on the importance of an integrated approach. We will talk with Dr. Rene Driessel – SAP Security Lead DACH at Accenture and Frederik Weidemann – Chief Technical Evangelist at...
Event Recording
Insights of a CISO: Interview with Markus Weißensel
Apr 14, 2021
Event Recording
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
Apr 14, 2021
With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of Duties (SOD) risks, weak access controls and lack of identity management and governance. Today, a holistic approach to security in SAP—and other business systems—is not a nice-to-have but a must-have. This session will give attendees a deep understanding of the current threat landscape and a 360 0  perspective on what is needed for not only integrated security but also audit and...
Event Recording
Marco Hammel: How to Avoid Costly SAP Security Pitfalls. Why to Make Security Start With People and Not With Tools
Apr 14, 2021
Event Recording
Hernan Huwyler: Security and Governance Done Right
Apr 14, 2021
Event Recording
Interview with Hernan Huwyler
Apr 14, 2021
Event Recording
Panel: SAP Security in Context of a Corporate IT
Apr 14, 2021
Interview
Accelerate your Identity's Digital Transformation
Apr 13, 2021
Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.
Analyst Chat
Analyst Chat #71: Cybercriminal Behavior in the COVID Era
Apr 12, 2021
While the world tries to cope up with the on-going pandemic, cybercriminals have got their hands on a gold mine. Annie and Matthias sit down again to chat about the overall picture of cyberattacks, including COVID-related lures.
Frontier Talk
Decentralizing Mobility, Coopetition and Platforms | Frontier Talk #1 - Dr. Harry Behrens
Apr 07, 2021
Raj Hegde sits down with Dr. Harry Behrens, Head of Blockchain Factory at Daimler Mobility, to discuss how decentralization is transforming the fragmented mobility industry. Tune in to this exciting episode for a deep dive on decentralized identity, explore the rise of the platform economy and access the playbook required to kick start decentralization initiatives at your organization.
Analyst Chat
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Apr 06, 2021
Annie Bailey and Matthias continue their conversation around privacy, targeted marketing and the end of the era of the 3rd party cookie, that they started two weeks ago. They discuss the characteristics and the pros and cons of upcoming approaches, while this technology area is still continuing to evolve.
Frontier Talk
Introducing Frontier Talk - The World’s First Podcast on Decentralized Identity
Mar 31, 2021
Frontier Talk goes beyond technical jargon to stimulate conversations that matter. In this series, we take you inside the minds of influential leaders, innovators, and practitioners from eclectic areas (enterprise, startups, academia, venture capital, etc.) to extract their experience working with emerging technologies such as Blockchain and AI. Join Raj Hegde on this journey to redefine the ‘I’ in Identity!
Analyst Chat
Analyst Chat #69: IAM Awareness in Daily Life
Mar 29, 2021
Dr. Phillip Messerschmidt is an experienced practitioner with extensive background knowledge in all things IAM. He helps us to take a step back and look at IAM in daily life. Drawing on simple, understandable definitions, he provides practical recommendations for successful and efficient identity and access management.
SOARing Towards an Enhanced SecOps Strategy
10 videos
Webinar Recording
Identity ist kein Selbstzweck – Unternehmenskritische Applikationen mit Identity Security absichern
Mar 26, 2021
Die Corona-Pandemie hat die Digitalisierungsbemühungen in der DACH-Region angetrieben, aber auch Grenzen aufgezeigt. Die digitale Identität von Angestellten steht immer häufiger im Fokus des Interesses – sowohl von Sicherheitsbeauftragten als auch von Hackern. Identity Security ermöglicht Compliance über Plattformen und Anwendungen hinweg; sie hilft Komplexität und Kosten in den Griff zu bekommen.
Event Recording
John Tolbert: Why Enterprises are Choosing SOAR for SOCs
Mar 26, 2021
Event Recording
Dr. Eric Cole: 5 Security Metrics To Track Your Cyber Security Success
Mar 26, 2021
Event Recording
Insights of a CISO: Interview with Thomas Tschersich
Mar 26, 2021
Event Recording
Thom Langford: CISOs, Complexity, Containment (and other C-words)
Mar 26, 2021
The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide. This presentation looks at three fundamentals:   Why traditional protective approaches are no longer effective enough. How complexity has made the...
Event Recording
Hemant Dusane: SOAR Use Cases for Effective Threat Response.
Mar 26, 2021
Event Recording
Stefan Schinkel: Tomorrow's SOC, Enabled Today with AI-Powered Detection, Prevention and Automation
Mar 26, 2021
Event Recording
Anett Mádi-Nátor: Let's Talk Cyber Threat Intel - How Does it Fit in SOAR?
Mar 26, 2021
Event Recording
Panel: Best Practices to Get Started on Your SOAR Journey
Mar 26, 2021
Event Recording
Filipi Pires: #WhoIs: An Emerging Class of Incident Response Platforms Using Open Source Tools
Mar 26, 2021
Event Recording
Yaron Mazor: The Interplay between SOAR and PAM
Mar 26, 2021
Analyst Chat
Analyst Chat #68: FloC and the Death of the 3rd Party Cookie
Mar 22, 2021
Tracking of users via 3rd party cookies has been a constant issue regarding compliance and user privacy. This is about to change, as 3rd party cookies are being more and more blocked in browsers like Firefox and Safari. And Google has announced the same step for Chrome in upcoming versions. What does this mean for the ad business, what are new approaches for addressing targeted marketing in a potentially more privacy preserving manner? Annie Bailey joins Matthias to discuss recent developments in this field.
Webinar Recording
Maturing a Zero-Trust Strategy for the Extended Enterprise
Mar 19, 2021
In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.
Interview
How Can Privileged Access Management Help Securing the Enterprise?
Mar 18, 2021
How can PAM technologies fit into a Zero Trust architecture and model? How could a PAM technology help us sleep better at night, as many are anxious about falling victim to an attack similar to the Solar Winds attack? Is there a future in deploying PAM in DevOps environments? And how can PAM technologies help to address regulatory compliance? Join Paul and Jim as they talk about different current topics around PAM - Privileged Access Management.
IGA for Successfully Managed Identities
8 videos
Event Recording
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
Mar 16, 2021
IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market, and technologies have matured. However, 20 years of maturity are a lot for IT, also indicating that some concepts may benefit from modernization. In his talk, Martin Kuppinger will look at four areas: What is the right approach for future IGA deployment models? What must change in role and entitlement management, to remain complaint but reduce complexity and workload? How to reduce...
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Mar 16, 2021
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle
Mar 16, 2021
Event Recording
Joakim Hardell: Cloud Strategy vs. National Security. Telia's Road to IGA Systems Modernization
Mar 16, 2021
We will give you a sneak peek on Telia Company’s current journey towards IGA system modernization. After the presentation you will have a good overview and some insight in what is cooking right now and where we are going with focus on Cloud strategy VS National Security which is the next challenge after our Phase 1 Go-live this year.
Event Recording
Insights of A CISO: Interview with Dr. Ralf Schneider
Mar 16, 2021
Event Recording
Pooja Agrawalla: Are You Building a Legacy IGA?
Mar 16, 2021
Event Recording
Flemming Hartwich: IGA - the Right Place for Identities?
Mar 16, 2021
Event Recording
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Mar 16, 2021
Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you adequately protecting the identity and access administration capabilities at the center of your security architecture?   In this session, former CTO and CISO Darran Rolls will provide a unique perspective on the critical steps required to secure your Identity Governance and Administration infrastructure.  Whether you employ on-prem or SaaS technology to meet your provisioning and...
Analyst Chat
Analyst Chat #67: Ensuring Business Continuity for the Cloud
Mar 15, 2021
As organizations go through digital transformation, they increasingly turn to using cloud services. One aspect of the digital transformation plan that is often forgotten is ensuring business continuity. Mike Small joins Matthias to explain why business continuity is essential for cloud services, especially in light of current events.
Analyst Chat
Analyst Chat #66: Enterprise Authentication - an Updated Look at That Market Segment
Mar 08, 2021
John Tolbert has just recently completed an updated Leadership Compass research document in the market segment of Enterprise Authentication. He joins Matthias for this episode to talk about recent developments and trends in that important area of the Identity Fabric for both IAM and CIAM.
Identity Fabrics - Future-Proofing IAM
16 videos
Event Recording
Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink
Mar 04, 2021
Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM. IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance requirements. It is a business enabler, as well as an IT enabler. It is a central element of every cybersecurity strategy. It enables managing and access control for everyone from employees to consumers and everything from things to software robots. It is a foundation for your success in digital transformation. It...
Event Recording
Manoj Kumar: Cloud-delivered IAM: Promises and Challenges
Mar 04, 2021
Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the IAM capability of the future. The speaker will share his experiences in deploying a native cloud-based IAM solution at scale, the challenges, pitfalls, and the watch-outs. 
Event Recording
Simon Moffatt: The Road to CIAM Success: Why an Identity Fabric Powers Digital Transformation
Mar 04, 2021
Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs.  A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling way.  What does success look like in the CIAM world and how do identity fabrics enable it?
Event Recording
Martin Kuppinger: Interview with Simon Moffatt
Mar 04, 2021
Event Recording
Tobias Urban: The Balance Between User Experience and Security
Mar 04, 2021
Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver products and services, there is an explosion in the number of sources from which users can gain access. Overlaying all of that is the constant evolution of the threat landscape and regulations that inevitably follow. Tech leaders who want to grow their position in the market must balance two goals:...
Event Recording
Vilma Blomberg: No Compromises, No Mercy – IAM’s Inevitable Role in Safeguarding The Organization
Mar 04, 2021
Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a set of security solutions and processes to safeguard and protect the business, and nowadays the teams are expected to deploy those faster and more efficiently than ever. The presentation will go through how to implement an efficient, centralized IAM approach that makes no compromises and shows no mercy for...
Event Recording
David Doret: TOME: Strengthening the Semantic Foundations of IAM
Mar 04, 2021
We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are: a manager trying to explain its IAM strategic program to top management, an architect trying to make IAM efficiently and securely serve the information system, an engineer trying to explain IAM technological challenges to colleagues, a vendor trying to increase the value of its IAM product for his customers, a researcher trying to push forward our understanding of IAM, …the one critical thing we are all...
Event Recording
Sylvie Vandevelde: From a Centralized Digital ID Towards a Hybrid Model
Mar 04, 2021
Event Recording
Oliver Krebs: Anchoring Real Identity in a Digital World
Mar 04, 2021
In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one. It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them engaged. In this session, Olli Krebs (VP Central EMEA at Onfido) will examine how document and biometric verification can seamlessly enable trust throughout the identity lifecycle. 
Event Recording
Petteri Ihalainen: Switching the Whole Country From Legacy to Open Standards
Mar 04, 2021
In the early years of this millennia Finland was already at the forefront in utilizing strong authentication for online services. Banks had been issuing two-factor authenticators to their customers already in the '90s. These means of strong authentication were quickly adopted by public and private sector services that required more than passwords. Mobile network operators began to offer PKI based SIM authentication. These two solutions and their somewhat legacy protocols conquered the strong authentication market and were the de-facto methods subscribing to or accessing services. Advances...
Event Recording
Matthias Reinwarth: User & Authorization Management. Real Benefits For The Business, Effective Projects, Efficient Operation And A High Level Of Acceptance
Mar 04, 2021
Event Recording
Panel: Tackling the Legacy IAM - Towards Future- Proof Identity Fabric
Mar 04, 2021
Event Recording
Christine Owen: Identity-Centric IAM For Enhanced Integration Into Emerging Security Models
Mar 04, 2021
Event Recording
Vinay Dabas: Securing the Digital World - Identity Verification and Authentication
Mar 04, 2021
Event Recording
Akhilesh Rajendran: Automation in Identity and Access Management Operation
Mar 04, 2021
 An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation technology, CISOs can bring down the risk involved in IAM operations; Robotic Process Automation (RPA) being one among them.
Event Recording
Rakesh Tripathi: Future of Identity Management
Mar 04, 2021
Video
How to Find the Right Strategy for Access Control Management
Mar 03, 2021
Analyst Chat
Analyst Chat #65: A First Look at Homomorphic Encryption
Mar 01, 2021
Alexei Balaganski covers a broad range of security-related topics: from database, application and API security to information protection, cryptography and AI-based security automation. He joins Matthias to give a first insight into a fascinating new approach towards access encrypted data "in use", while maintaining privacy and security of data and processing. He explains the concepts behind homomorphic encryption, the current status, the technology required and he talks about first pioneering use cases.
Analyst Chat
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Feb 22, 2021
Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins Matthias to talk about the importance of extending Zero Trust to cover software security, for software in any form (embedded, COTS, as-a-service) and regardless of whether it’s home-grown or externally procured.
Event Recording
Insights of a CISO: Interview with Thomas Malta
Feb 22, 2021
Making Zero Trust a Reality
15 videos
Event Recording
Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents
Feb 18, 2021
Event Recording
Expert Chat: Interview with Stefan Würtemberger
Feb 18, 2021
Event Recording
Paul Simmonds: Alignment of Zero Trust with Business Strategy
Feb 18, 2021
Event Recording
Dimitri Lubenski, Dr. Jan Herrmann: The Role of IAM within Zero Trust Architectures at Siemens
Feb 18, 2021
Event Recording
Roger Halbheer: Zero Trust - Security Through a Clearer Lens
Feb 18, 2021
Join us to understand how Zero Trust transforms your security strategy and makes you more resilient to a range of attacks. We will share a roadmap for leaders, architects, and practitioners, as well as talk about some quick wins and incremental progress on this journey.
Event Recording
Eleni Richter: Zero Trust Use Cases
Feb 18, 2021
Event Recording
Panel - Zero Trust in the Enterprise
Feb 18, 2021
Event Recording
Henk Marsman: From Trust to Zero - Lessons from Halfway in a Large Enterprise Environment
Feb 18, 2021
Event Recording
Filipi Pires: Trust or Not Trust? Is there new mindset about CyberSecurity using Zero Trust?
Feb 18, 2021
Event Recording
Scott Rose: Zero Trust 101
Feb 18, 2021
Event Recording
Rebecca Nielsen: What is Strong Authentication in a Zero Trust Environment
Feb 18, 2021
Event Recording
Panel - Zeroing in on Zero Trust: A Paradigm Shift in Cybersecurity
Feb 18, 2021
Event Recording
Bryan Meister: Navigating Enterprise Enablement and Zero Trust
Feb 18, 2021
Event Recording
John Tolbert: Zero Trust for Reducing the Risks of Security Incidents
Feb 18, 2021
Interview
Privileged Access Management from a CISO Perspective
Feb 16, 2021
Privileged user accounts are significant targets for attacks as they have elevated permission, access to confidential data and the ability to change settings. And if compromised, the amount of damage to an organization can be disastrous. No wonder that this is on the mind of our chief information security officers. Join our CEO Berthold and Rob Edmondson, Technology Strategist at Thycotic in this conversation!
Video
Where to Start Your IAM Modernization Journey
Feb 16, 2021
Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex. In this video blog post, Martin gives practical advice on how enterprises can get their priorities straight.
Analyst Chat
Analyst Chat #63: The Need For New Drivers to Improve Cybersecurity
Feb 15, 2021
The press, security vendors, politicians and analysts alike currently often focus only on the recent SolarWinds security incident and its exceptional features and effects While this is in fact an extremely important topic to learn from and to clean up, the shadow of this hype causes that at the same time it is often neglected that even very basic cybersecurity aspects are poorly addressed in many organizations. Alexei and Matthias look beyond the hype and discuss the need for new initiatives to achieve an actual adoption of proper measures to improve basic cybersecurity hygiene in...
Analyst Chat
Analyst Chat #62: The SOCaaS Market Segment - A First Look
Feb 08, 2021
The Security Operations Center-as-a-Service (SOCaaS) market has emerged and continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. KuppingerCole Analyst Warwick Ashford joins Matthias for this week's episode and shares some insights into this evolving market segment he gained during his recent research.
Unlocking Decentralized Identity
15 videos
Event Recording
Raj Hegde, Lauren Zuber: Welcome Session
Feb 04, 2021
Event Recording
Anne Bailey: Market Compass: What does the Future Require of Identity?
Feb 04, 2021
There are several external drivers that are putting pressure on the way we manage identity, made especially clear over the last year: digitalization, privacy, user-centricity, and reuse. Rather than resist the change, let us consider what would happen to identity if we translated these pressures into requirements. Which capabilities are accelerated from the sidelines to being star players? What approaches best fit these future requirements? And how does decentralized identity come into play? In this talk, Anne Bailey will pull from the insights of the upcoming Market Compass...
Event Recording
Christoph Burger: Blockchain: From Processes to Hybrid Platforms - The Case of the Energy Industry
Feb 04, 2021
Event Recording
Helge Michael: IDunion - How to Build a Decentralized Identity Ecosystem
Feb 04, 2021
Event Recording
Dr. Harry Behrens: How Cryptographically Verified DID-Based Credentials will Transform KYC, Access Control and Ticketing?
Feb 04, 2021
Event Recording
Panel - Decentralizing the Enterprise: Getting Started
Feb 04, 2021
Event Recording
Kim Hamilton Duffy: Decentralized Identity: A Quick Survey of the Standards, Use Cases, Approaches, and Pitfalls
Feb 04, 2021
Event Recording
Pamela Dingle: Timely Disruption - Why is Decentralized Identity Different?
Feb 04, 2021
Event Recording
Panel - Navigating the Decentralized Identity Landscape: Opportunities and Challenges in the Next Decade
Feb 04, 2021
Event Recording
Dr. Matthias Artzt: Blockchain and GDPR – Tensions between Blockchain Technology and Data Protection Principles
Feb 04, 2021
Event Recording
Bruce Pon: Data Monetization Model for the Decentralized Web
Feb 04, 2021
Event Recording
Marleen Oberheide: Data Ethics: Moving Beyond Privacy into Data Ethics & Trust
Feb 04, 2021
Event Recording
Oliver Terbu: Beyond the Status Quo: Secure Trusted P2P Messaging
Feb 04, 2021
Event Recording
Dr. Carsten Stöcker: Digital Identity for Enterprises
Feb 04, 2021
Event Recording
Ken Ebert: A Stepwise Approach to Deploying Decentralized Identity
Feb 04, 2021
Analyst Chat
Analyst Chat #61: Post-SolarWinds Software Security Strategies
Feb 01, 2021
More than a month into the post-SolarWinds-incident era Alexei joins Matthias to discuss further lessons learned and strategic approaches towards improving security in organizations depending on diverse cyber supply chains and their imminent threats. But they go beyond and look at the necessary changes between management awareness and software development security.
Webinar Recording
IT-Sicherheitsberatung hinter den Kulissen: Die Top 5 Herausforderungen, die Cloud Modelle mit sich bringen
Jan 28, 2021
Der Bedarf nach Cloud-Lösungen ist heute so stark wie nie zuvor. In den letzten Monaten konnten wir weltweit eine steigende Akzeptanz von Cloud Plattformen und Cloud-Diensten beobachten. Sogar die Deutsche Bahn verlagert ihre komplette IT in die Cloud.
Webinar Recording
The Evolution of Access Control
Jan 27, 2021
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process.
Interview
Security in Financial Services
Jan 27, 2021
Join Simon Keates (Head of Strategy and Payment Security at Thales) and Dr. Udo Milkau (Fellow Analyst at KuppingerCole) talking about Security Issues in the FinTec Industry!
Analyst Chat
Analyst Chat #60: The 2021 Trends in DevOps and Security
Jan 25, 2021
Although not really brand new, there are still a lot of interesting developments around DevOps when it comes to cybersecurity and more. Paul Fisher shares some trends and insights with Matthias and tells us what to expect in this rapidly evolving segment.
Webinar Recording
Accelerating Your Digital Transformation: Secure and Successful Cloud Migrations
Jan 21, 2021
The use of cloud services is one of the key enablers of digital transformation - accelerating time to value, providing more access to powerful IT resources in a more cost-effective manner and removing the management costs associated with commodity services. However, these benefits come with some risks. Migrating your business applications to the cloud without creating security vulnerabilities, unnecessary risks to your data and ensuring compliance, is critical for a successful digital transformation.
Analyst Chat
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
Jan 18, 2021
The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at this stage and which measures to look at first.
Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
Jan 15, 2021
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the market for solutions designed to detect attacks on endpoints and respond accordingly has grown significantly. These Endpoint Detection & Response (EDR) solutions look for evidence and effects of malware that may have slipped past Endpoint Protection (EPP) products. EDR tools also perform evaluation of threat intelligence, event correlation, and often allow interactive querying, live memory analysis,...
Interview
Encrypt Everything
Jan 13, 2021
Watch this Videocast with our Analyst Alexei and Todd Moore from Thales to learn why and how to encrypt everything!