Event Recording

Eve Maler - The Connected Consumer – Risks and Rewards

Show description
Speaker
Eve Maler
CTO
ForgeRock
Eve Maler
Eve Maler is ForgeRock’s CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Jason Rose - Balancing Personalization and Trust in the Age of the Customer
May 23, 2016

In this session, find out how customer-obsessed businesses are increasing their audiences and creating trusted, customized experiences across devices and platforms in exchange for first-party data. We provide case studies of how leading brands are leveraging customer identity and access management (CIAM) to create personal relationships at scale while maintaining high degrees of data privacy and security.

Event Recording
John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway
May 22, 2016

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
May 25, 2016

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both manufacturing and non-manufacturing. That’s why it’s important to understand the differences between Industry 4.0 and the "Industrial Internet of Things" and where our mindset and approaches best fit.

Event Recording
Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
May 25, 2016

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls presents the anatomy of a typical cyber attack and explains where and how IAM controls should be applied to better enable close-loop cyber protection for enterprise systems. You may not be able to prevent an attack, but you can minimize the damage and your exposure.

Event Recording
Lessons learnt from the Ukraine's ‘Lights Out’ Attack
May 11, 2016

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change.

Michael Kleist of CyberArk explains more.

Event Recording
Dr. Emilio Mordini - In a Wilderness of Mirrors: Do we still need Trust in the Online World?
May 11, 2016

Trust always involves some level of vulnerability on the actions of another. When we trust others, we are relying on them and consequently we are making ourselves more vulnerable. A bit naively, some scholars argue that trust decisions are based on a cost/benefit analysis, which is maybe theoretically true but it rarely happens in real life. In reality, many other elements play an important role, and they are critical in the case of the blockchain.  "In a wilderness of mirrors. What will the spider do?" (Gerontion, T.S. Eliot 1920)

Event Recording
Patrick Parker - Reimagining Identity and Access Management Processes with Algorithms
May 23, 2016

We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine. The machine-reengineering revolution will leverage powerful algorithms and the immense lakes of organizational data to drive changes in business processes that will fundamentally change the way security is managed. This session provides an overview of machine learning and big data technologies as they apply to Identity and Access Management.

Event Recording
Dr. Sridhar Muppidi - Security Starts with Identity and Access
May 11, 2016

People are the weak link in security. Most data breaches start with bad actors using stolen user credentials and this is fundamentally an identity problem. For too long Identity & Access Management has been viewed as silo often walled off from the security group but this must change. Now, more than ever Identity & Access Management must be viewed as a key security control that can help minimize and mitigate security intrusions.

Event Recording
André Durand - Navigating a Moment of Change, Disruption & Inflection in Identity & Security
May 11, 2016
Event Recording
Sebastien Meunier - Blockchain – a New Compliance Paradigm?
May 24, 2016

One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Event Recording
Thom Langford - Making Security the Competitive Advantage for your Enterprise
May 11, 2016

Security is as Security does. It is it’s own benefit and it’s own justification. We need to use shock and awe tactics to get the business to do what we want to ensure the security of the business.
Right?

NO! We are not the special flower of the business, we are just one part of it, working in harmony with the others. We help the business do more, better, and for less just like everyone else. So if we can’t shock and awe, and if we no longer have special privileges, how can we be more effective?

Event Recording
Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower
May 23, 2016

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.