Event Recording

Doc Searls - When the Customer Becomes the First Party

Show description
Speaker
Doc Searls
Board Member, Co-Founder
Customer Commons
Doc Searls
Doc Searls is author of  The Intention Economy: When Customers Take Charge  (Harvard Business Review Press, 2012), co-author of  The Cluetrain Manifesto  (Basic Books, 2000 and 2010), one of the world's best-known and widely read bloggers and tweeters, and former...
View profile
Playlist
European Identity & Cloud Conference 2017
Event Recording
Prof. Dr. Udo Helmbrecht - Cybersecurity Strategies in the EU
May 09, 2017

Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on Network and Information Security (NIS). The keynote will provide an outline on emerging EU policy legislative context addressing improved capabilities, cooperation, crisis management and preparedness at EU Level. The second part of the keynote will focus on initiatives and synergies to support EU policy implementation that will on the one hand stimulate the competitiveness and innovation of Europe's cybersecurity industry and on the other increase the levels of trust and security in EU products and services.

Event Recording
Nishant Kaushik - At the Intersection of Security, Innovation and Privacy: Invisible Identity
May 11, 2017

We’ve reached an interesting crossroads in identity management, as it transitions from being a niche area of interest to a major pillar in corporate IT. Balancing competing but complementary concerns of security, innovation and privacy requires a rethink of how we’ve traditionally used identity in IT. Invisible Identity is an architectural and functional imperative to make identity simply disappear from people’s sight, moving into the background as a silent protector and enabler. But this move is fraught with challenges, whether they be concerns about privacy or choices of technology. To help navigate these waters successfully, this talk will present the 4 Core Principles of Invisible Identity that provide a framework to help guide organizations on the road to adopting an identity-based security model - one that never loses focus on the symbiotic partnership between security and usability.

Event Recording
Richard Struse - Let Them Chase Our Robots
May 09, 2017

The economics of cybersecurity have long favored the attacker. Adversaries skillfully harness automation to increase their advantage while benefiting from their victim’s fragmented and uncoordinated defenses. Automated Cyber Threat Intelligence (CTI) ecosystems hold the promise of changing these economics in favor of the defender. This keynote will highlight the promises of CTI along with the challenges we still must overcome if we are to realize the full potential of this opportunity.

Event Recording
Jackson Shaw - When will Identity and Access Management be Digitally Transformed?
May 09, 2017

Tired of paying hundreds of thousands or millions of dollars for IAM projects that don’t show benefit or eventually are considered failures? Us too! So we decided to do something about it. “Digital transformation is the profound and accelerating transformation of business activities, processes, competencies and models to fully leverage the changes and opportunities of digital technologies.” We took this to heart and radically changed our approach to our own customer IAM, how we (and our customers) connect to SaaS properties and how we leverage machine learning, advanced analytics and bots to not only serve our company but to also serve our customers. In this session I will detail how we are digitally transforming IAM within our own company and for our customers.

Event Recording
Prof. Dr. Sachar Paulus - Closing Keynote
May 11, 2017
Event Recording
Scott Carlson - Just trust everyone and we will be fine, right?
May 11, 2017

Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls?  In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.

Event Recording
PATECCO's Thoughts on IAM in Relation to Service Based Digital Business Technologies
May 09, 2017

An interview during the European Identity & Cloud Conference 2017

Event Recording
Victor Ake, Allan Foster - Digital Identity for the Internet of Things: Security, Privacy and Consent Challenges
May 10, 2017

IoT is a new digital channel to provide more products and services. However Security, Privacy and Consent in such environment are a major concern. To provide a secure interaction we need a “Holistic Identity” strategy, where identities represent humans, devices, things and their relationships; and privacy and consent management are also part of the strategy. Without Identity there are no security nor privacy, and this goes for all kind of entities! To implement a Digital Transformation strategy, it is necessary to provide more channels to face customers and citizens. The IoT is the perfect channel to interact with the end user and its environment, however this needs to be done in a secure way.

Event Recording
Balázs Némethi - Financial Inclusion & Disenfranchised Identification
May 10, 2017
Event Recording
Martin Kuppinger - Opening Keynote
May 09, 2017
Event Recording
Prof. Dr. Heiko Beier - Know your Customer: Deep Level Understanding of Customer Interaction with Smart Data Analytics
May 11, 2017
Event Recording
Luca Martelli - The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Jun 14, 2017

Data, People and Software security: how does them relate to the GDPR security principles? In this new attack landscape, network-centric security is no longer enough because threats come from inside and outside the network. Oracle Identity SOC is an identity-centric, context-aware intelligence and automation framework for security operations centers, backed by advanced user behavior analytics and machine learning to spot compelling events that require automated remediation.