Event Recording

The Future of Authentication - Killing the Password

Show description
Speakers
Stina Ehrensvärd
CEO & Founder
Yubico
Stina Ehrensvärd
Stina Ehrensvard is the CEO and Founder of Yubico, and co-inventor of the YubiKey – a small device that makes strong two-factor authentication easy and affordable for everyone. She is visionary IT entrepreneur with proven track records of creating and bringing new technology innovations to...
View profile
Ian Glazer
Founder
Weave Identity
Ian Glazer
Ian Glazer is an accomplished IT Thought Leader and Product Management Executive with extensive experience in identity management, privacy, compliance, and access governance. He is a strategic leader who has directed and executed product strategy, managed partner relationships, and driven...
View profile
Anthony Nadalin
Chief Security Architect
Microsoft
Anthony Nadalin
Anthony Nadalin is a partner architect in the Government Engagement Team leading the Standards and Public Policy practice. Anthony had spent the last 27 years with IBM where he was the Chief Security Architect responsible for the security strategy for software group products. Anthony...
View profile
Nat Sakimura
Chairman
OpenID Foundation
Nat Sakimura
Nat Sakimura is a well-known identity and privacy standardization architect and the Chairman of the OpenID Foundation. He is a co-author of many of the frequently used international standards such as OpenID Connect, JWT, JWS, OAuth PKCE, etc. He is currently editing ISO/IEC 29184 Guidelines for...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Trends & Innovation Panel: What Are the Most Important Innovations and Who Are the Innovators?
May 25, 2016

The idea of this trends & innovation panel is to give each panelist the opportunity to tell the audience what company or companies out there are doing something innovative, what it is, why it is important and why the audience should care track the company. For example, one of the panelists might talk about how the perimeter is disappearing and it’s important to be thinking about governance, security and privacy for cloud properties like Salesforce, Workday, etc. The only restriction on panelists is that they are not allowed to talk about their own products or products from anyone on the panel.

Event Recording
Kim Cameron - The Cloud is Rewiring the World: What Does it Mean for Identity?
May 23, 2016

The Cloud is turning out to have important “emergent properties” – features not previously observed in computing systems, never imagined by cloud architects, and not yet widely discussed or understood.  They will be key to determining which strategies prevail in meeting cloud era challenges. Kim Cameron discusses how this impacts the world of identity – leading to better applications and simpler identity solutions for people and things.

Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
May 25, 2016

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both manufacturing and non-manufacturing. That’s why it’s important to understand the differences between Industry 4.0 and the "Industrial Internet of Things" and where our mindset and approaches best fit.

Event Recording
Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience
May 23, 2016

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building blocks of cyber attack resilience through better collection and analysis of very large sets of log and transaction data, real-time analysis of current events and potentially also prediction of future behavior.

Event Recording
Ian Glazer - The Moments Ahead for Identity
May 11, 2016

Remember when we used to pay for a TCP/IP stack? It’s hard to believe that companies used to pay for networking stacks, but we did. And once network stacks became free, the networking profession didn’t die out… instead it flourished. Today, the identity industry is going through a similar transformation, one which will present a series of moments upon which we must capitalize.

Event Recording
European Identity & Cloud Awards 2016
May 12, 2016

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security. Do not miss this glamorous ceremony where KuppingerCole honors the winners of seven categories and one Special Award.

Event Recording
Eve Maler - The Connected Consumer – Risks and Rewards
May 11, 2016

Everyone operates on the risk-reward continuum. It's true for CEOs, CMOs, CPOs, CIOs...and consumers. What does this mean for each of them in a digitally connected world, when the lines have blurred not only between organization A and organization Z, but also between cars and clouds, washing machines and webs, cradles and cybernets? With new consent regulations, standards, and tools on the scene, now is the time to think strategically about solutions that don't force awkward compromises when it comes to privacy, business growth, and consumer trust.

Event Recording
Jason Rose - Balancing Personalization and Trust in the Age of the Customer
May 23, 2016

In this session, find out how customer-obsessed businesses are increasing their audiences and creating trusted, customized experiences across devices and platforms in exchange for first-party data. We provide case studies of how leading brands are leveraging customer identity and access management (CIAM) to create personal relationships at scale while maintaining high degrees of data privacy and security.

Event Recording
Brendan M. Peter - How Regulation is Driving Digital Transformation and Putting a New Perspective on Identity
May 12, 2016

We see a development towards the open enterprise with multiple access points to critical information. At the same time, customers and consumers want to make sure their information is kept confidential and secure. As result, there is an increasing focus on identity and access management. Cyber security and data privacy have become an imperative for any organization.

Governments can use policy to drive market behavior. When it comes to the issue of Trust, those policies have been on the increase globally. The EU PSD2, Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) combined with the US Cyber Threat Info Sharing are just some examples.

Event Recording
What’s so special about the EIC?
Oct 29, 2015

What’s so special about the EIC? This is what our attendees say!

Event Recording
Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
May 25, 2016

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls presents the anatomy of a typical cyber attack and explains where and how IAM controls should be applied to better enable close-loop cyber protection for enterprise systems. You may not be able to prevent an attack, but you can minimize the damage and your exposure.

Event Recording
Isabel María Gómez González - The Secret Keys for the New Age of the CISO
May 22, 2016

How many times do you change your hat per day? In the new age, the CISOs will change their roles as much as they can for making decisions about how to affront new risks. Compliance, Governance, legislation, data protection, cybersecurity, intelligence, cyberdefense, cyberfusion…. how can we deal with them?