Event Recording

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World

Show description
Speakers
Kim Cameron
Chief Identity Officer
Convergence.tech
Kim Cameron
Kim Cameron is a Canadian computer scientist and engineering leader who has worked since the emergence of the Internet to create a humanistic system of Digital Identity. Kim moved to Seattle to join Microsoft in 1999 when it acquired Toronto-based Zoomit Corporation, a software company dedicated...
View profile
Pamela Dingle
Director of Identity Standards
Microsoft
Pamela Dingle
Pamela Dingle has 15 years of experience in implementation and architecture of identity standards for web access management, provisioning, and federation. As Director of Identity Standards at Microsoft, Pamela leads a team of experts dedicated to collaboration within the industry to imagine,...
View profile
Mia Harbitz
Advisor
World Bank Group
Mia Harbitz
Mia Harbitz is an identity management professional with extensive project management experience in developing countries. She is the former Lead Specialist in identity management and registries with a focus on governance for the Inter-American Development Bank (IADB), and is presently...
View profile
Dr. Sridhar Muppidi
IBM Fellow & CTO
IBM Security
Dr. Sridhar Muppidi
Dr. Sridhar Muppidi is an IBM Fellow and Chief Technology Officer at IBM Security. He leads the technical strategy, architecture and Research for IBM Security, focused on both securing digital transformations as well as security threat & fraud management. He is a technical leader with 20...
View profile
Balázs Némethi
CEO
Taqanu
Balázs Némethi
Balázs Némethi is a wholehearted young entrepreneur working in fintech. With a degree in architecture, he is harnessing his system thinking mindset to look beyond currently existing solutions and create a positive impact with the use of technology. Currently he is building a...
View profile
Joerg Resch
Co-Founder & Management Board Member
KuppingerCole
Joerg Resch
Joerg Resch is Co-Founder & Managing Director at KuppingerCole. He looks back on over 20 years of experience in Identity Management related projects and their implementation in large corporations. His areas of expertise are blockchain and digital transformation.
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
PATECCO's Thoughts on IAM in Relation to B2B and B2C
May 11, 2016

Tune in to PATECCOs interview with Martin Kuppinger in regards to managing Customer and Partner Identities in a hybrid world.

Listen to some Do’s and Don’ts out of previous projects.

Event Recording
Impressions of the European Identity & Cloud Conference 2016
May 12, 2016

Thank you for attending the European Identity & Cloud Conference 2016. See you next year!

Event Recording
Dr. Karsten Kinast - Making Sense of the EU General Data Protection Regulation
May 12, 2016

The cloud is coming to your business, like it or not. With cloud-based systems come inherent challenges. These are further complicated as personal data subject to privacy regulation inevitably moves into the cloud. This combination, putting private information into the cloud, creates risk which must be understood and managed. Is data privacy in the cloud a business issue? We will de-mystify the complexity of cloud-based systems and their inherent risks, enabling appropriate technical and administrative safeguards to be put in place.

Event Recording
Jason Rose - Balancing Personalization and Trust in the Age of the Customer
May 23, 2016

In this session, find out how customer-obsessed businesses are increasing their audiences and creating trusted, customized experiences across devices and platforms in exchange for first-party data. We provide case studies of how leading brands are leveraging customer identity and access management (CIAM) to create personal relationships at scale while maintaining high degrees of data privacy and security.

Event Recording
Paul Simmonds - The Trust Conundrum
May 22, 2016

It's all too easy to pretend to be someone else, whether it's organised crime, social engineers, hackers or paedophiles. The financial impact of this impersonation runs to 100's of billions of dollars per annum. As a result business costs increase, not only because of the increasing losses, transactional friction increases as do the processes that business implements to increase their level of trust.

Event Recording
Eve Maler - The Connected Consumer – Risks and Rewards
May 11, 2016

Everyone operates on the risk-reward continuum. It's true for CEOs, CMOs, CPOs, CIOs...and consumers. What does this mean for each of them in a digitally connected world, when the lines have blurred not only between organization A and organization Z, but also between cars and clouds, washing machines and webs, cradles and cybernets? With new consent regulations, standards, and tools on the scene, now is the time to think strategically about solutions that don't force awkward compromises when it comes to privacy, business growth, and consumer trust.

Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience
May 23, 2016

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building blocks of cyber attack resilience through better collection and analysis of very large sets of log and transaction data, real-time analysis of current events and potentially also prediction of future behavior.

Event Recording
Dr. Emilio Mordini - In a Wilderness of Mirrors: Do we still need Trust in the Online World?
May 11, 2016

Trust always involves some level of vulnerability on the actions of another. When we trust others, we are relying on them and consequently we are making ourselves more vulnerable. A bit naively, some scholars argue that trust decisions are based on a cost/benefit analysis, which is maybe theoretically true but it rarely happens in real life. In reality, many other elements play an important role, and they are critical in the case of the blockchain.  "In a wilderness of mirrors. What will the spider do?" (Gerontion, T.S. Eliot 1920)

Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
May 25, 2016

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both manufacturing and non-manufacturing. That’s why it’s important to understand the differences between Industry 4.0 and the "Industrial Internet of Things" and where our mindset and approaches best fit.

Event Recording
John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway
May 22, 2016

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Event Recording
European Identity & Cloud Awards 2016
May 12, 2016

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security. Do not miss this glamorous ceremony where KuppingerCole honors the winners of seven categories and one Special Award.