Event Recording

Pamela Dingle - The Age of Federated Accountability

Show description
Speaker
Pamela Dingle
Director of Identity Standards
Microsoft
Pamela Dingle
Pamela Dingle has 15 years of experience in implementation and architecture of identity standards for web access management, provisioning, and federation. As Director of Identity Standards at Microsoft, Pamela leads a team of experts dedicated to collaboration within the industry to imagine,...
View profile
Playlist
European Identity & Cloud Conference 2017
Event Recording
Analyst Panel: The Future Role of Identity in Digital Transformation
May 09, 2017
Event Recording
Victor Ake, Allan Foster - Digital Identity for the Internet of Things: Security, Privacy and Consent Challenges
May 10, 2017

IoT is a new digital channel to provide more products and services. However Security, Privacy and Consent in such environment are a major concern. To provide a secure interaction we need a “Holistic Identity” strategy, where identities represent humans, devices, things and their relationships; and privacy and consent management are also part of the strategy. Without Identity there are no security nor privacy, and this goes for all kind of entities! To implement a Digital Transformation strategy, it is necessary to provide more channels to face customers and citizens. The IoT is the perfect channel to interact with the end user and its environment, however this needs to be done in a secure way.

Event Recording
Welcome to the European Identity & Cloud Conference
Dec 22, 2017

Learn all you need to know about the future of information security today!

Event Recording
European Identity & Cloud Awards Ceremony
May 10, 2017

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security.

Event Recording
Prof. Dr. Udo Helmbrecht - Cybersecurity Strategies in the EU
May 09, 2017

Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on Network and Information Security (NIS). The keynote will provide an outline on emerging EU policy legislative context addressing improved capabilities, cooperation, crisis management and preparedness at EU Level. The second part of the keynote will focus on initiatives and synergies to support EU policy implementation that will on the one hand stimulate the competitiveness and innovation of Europe's cybersecurity industry and on the other increase the levels of trust and security in EU products and services.

Event Recording
Mia Harbitz - Motivations and Constraints of Actors in the Field of Identity Management
May 09, 2017

An identity of some sort is necessary for almost all daily interactions in developed countries, and is becoming increasingly necessary in many developing nations. To interact with the public sector, it is imperative for an individual to have a legal identity that is anchored in a legally established, standardized, verifiable, and trustworthy source. All countries in the world have such repositories, and they exist either as civil registries or civil identification registers (or both). The 198 countries reviewed in this study have a civil registry and 171 have civil identification registers that issue identity cards. Only 27 lack a civil identification and do not issue identification credentials. And of those 27 countries, four are currently in the process of establishing such systems to uniquely identify citizens and residents.

Event Recording
Dr. J.R. Reagan - Designing Industry 4.0
May 09, 2017

Around the world, industries are experiencing a digital transformation that is accelerated by exponentially growing technologies. The networking of ’internet of things, services, data and people’ will fundamentally change the future of individual companies, as well as transform market dynamics across a whole range of industries. This talk how to design for success in this new environment and the impact technology will have in shaping it.

Event Recording
Doc Searls - When the Customer Becomes the First Party
May 09, 2017

The time is coming when customers have the upper hand, and companies agree to their terms rather than the other way around. Doc Searls, leader of the VRM (Vendor Relationship Management) movement, co-author of "The Cluetrain Manifesto", and author of "The Intention Economy: When Customers Take Charge", will explain how customer independence and empowerment will make the GDPR’s dreams come true—for both regulators and companies, as well as for customers themselves.

Event Recording
Dirk Backofen - Managed Secure Identity for Enterprises, IoT & Consumers
May 09, 2017

Secure and unambiguous identities will be the next currency in the online world. Whether for information exchange or for online commerce in the consumer and the business segment, a secure identity will become more and more relevant over the coming years. A broad range of new services can be built up on this central element. This talk will provide information about the relevant technologies and the future business models.

Event Recording
Patrick Parker - Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows
May 09, 2017

Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today. In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques such as Micro-Segmentation, Zone-Based Security, Defense in Depth, Least Privilege and others. We will also highlight the central role of IAM in delivering on these strategies.

Event Recording
Joni Brennan - Accelerating Canada’s Digital ID Ecosystem Toward a More Trusted Global Digital Economy
May 10, 2017
Event Recording
Jackson Shaw - When will Identity and Access Management be Digitally Transformed?
May 09, 2017

Tired of paying hundreds of thousands or millions of dollars for IAM projects that don’t show benefit or eventually are considered failures? Us too! So we decided to do something about it. “Digital transformation is the profound and accelerating transformation of business activities, processes, competencies and models to fully leverage the changes and opportunities of digital technologies.” We took this to heart and radically changed our approach to our own customer IAM, how we (and our customers) connect to SaaS properties and how we leverage machine learning, advanced analytics and bots to not only serve our company but to also serve our customers. In this session I will detail how we are digitally transforming IAM within our own company and for our customers.