Event Recording

Jason Rose - Balancing Personalization and Trust in the Age of the Customer

Show description
Speaker
Jason Rose
VP Marketing
Gigya
Jason Rose
Jason leads Gigya's global marketing initiatives. He has experience in marketing technology platforms and applications for both start-ups and large enterprises. Most recently, Jason led marketing at DataSift, and prior to that led business intelligence and advanced analytics marketing efforts at...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity
May 24, 2016

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things, identity and the need for privacy "collide". Has blockchain been the missing link to put the "platform" thought away from "Life Management Platforms" to make it a universally available privacy by design representation of humans in a digital world?

Event Recording
Kim Cameron - The Cloud is Rewiring the World: What Does it Mean for Identity?
May 23, 2016

The Cloud is turning out to have important “emergent properties” – features not previously observed in computing systems, never imagined by cloud architects, and not yet widely discussed or understood.  They will be key to determining which strategies prevail in meeting cloud era challenges. Kim Cameron discusses how this impacts the world of identity – leading to better applications and simpler identity solutions for people and things.

Event Recording
The Future of Authentication - Killing the Password
May 19, 2016

We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the password obsolete?

Event Recording
Ivan Niccolai - Blockchain, Identity, Cybersecurity
May 24, 2016

How is trust established without trusted third parties? Although it is not possible to offer a prediction of how distributed ledger technology with change society, the assertion that new and publically-accessible technology such as the internet, file sharing and social networks would empower individuals and lead to a more transparent and equitable society has been made before. While the advent of the internet has led to unparalleled global communication capabilities, it has also allowed for a situation of total, mass surveillance. The blockchain offers a trustless information security model, replacing human judgement with proof-of-work algorithms and perimeter security with total transparency.

Event Recording
John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway
May 22, 2016

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Event Recording
Martin Kuppinger - The new role of the CI(S)O 2020: Enable disruptive innovation
May 12, 2016

Don’t only survive the Digital Transformation. Become the Transformational Leader.

There rarely has been so much disruptive change driven by innovations in IT ever before. Distributed Ledgers and Blockchain are at the forefront of these changes and will massively impact the business models of many organizations, well beyond the Finance industry and FinTechs. IoT is becoming a standard element, closely connected to Smart Manufacturing and Industry 4.0. Again, business processes and business models will change massively in the hyper connected world.

Event Recording
What’s so special about the EIC?
Oct 29, 2015

What’s so special about the EIC? This is what our attendees say!

Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower
May 23, 2016

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.

Event Recording
Impressions of the European Identity & Cloud Conference 2016
May 12, 2016

Thank you for attending the European Identity & Cloud Conference 2016. See you next year!

Event Recording
Eve Maler - The Connected Consumer – Risks and Rewards
May 11, 2016

Everyone operates on the risk-reward continuum. It's true for CEOs, CMOs, CPOs, CIOs...and consumers. What does this mean for each of them in a digitally connected world, when the lines have blurred not only between organization A and organization Z, but also between cars and clouds, washing machines and webs, cradles and cybernets? With new consent regulations, standards, and tools on the scene, now is the time to think strategically about solutions that don't force awkward compromises when it comes to privacy, business growth, and consumer trust.

Event Recording
Lessons learnt from the Ukraine's ‘Lights Out’ Attack
May 11, 2016

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change.

Michael Kleist of CyberArk explains more.