Event Recording

Federated Directory meets Minimal Disclosure: Mortal Enemies or Soul Mates?

Show description
Kim Cameron
Chief Identity Officer
Kim Cameron
Kim Cameron is a Canadian computer scientist and engineering leader who has worked since the emergence of the Internet to create a humanistic system of Digital Identity. Kim moved to Seattle to join Microsoft in 1999 when it acquired Toronto-based Zoomit Corporation, a software company dedicated...
View profile
Top related content
Cloud Identity and Synchronization
Mar 27, 2012
Event Recording
We’re Gonna Need an even Bigger Boat: How Pervasive Digital Transformation, Nation State Actors, and Open Code Repositories Mandate a Reinvention of Identity
May 11, 2022
Event Recording
Ralf Knöringer - ONE Identity – Heaven or Hell? Do we need more than one “ME”?
Jun 05, 2013

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Event Recording
Pre-Conference Workshop | How OpenID Standards are Enabling Secure & Interoperable Digital Identity Ecosystems
May 10, 2022

OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while also enabling a collaborative platform to openly address current trends and market opportunities. The OpenID Foundation Workshop at EIC includes a number of presentations focused on 2022 key initiatives for the Foundation.

Executive View
PingIdentity’s PingDirectory
Jun 20, 2017
Minimal disclosure becoming reality
Jan 21, 2015
Event Recording
EIC 2012 Session: Exchanging Metadata through Different Federations on a Global Scale
May 15, 2012

Nicole Harris, Head of Identity Management, JISC Advance

April 19, 2012 15:40

Executive View
RadiantOne: Radiant Logic’s Federated Identity Suite — It’s Not Your Father’s Directory
Apr 26, 2018
Event Recording
How to Work Together in a Privacy Preserving Way to Mitigate Risks
Sep 19, 2017

Digital identity is central to all electronic transactions. Prevention of credential misuse is the first responsibility of identity management professionals today. Proper identity management includes identity vetting, issuance of credentials, risk-appropriate authentication and authorization, auditing, and more. Regulations such as GDPR also mandate that identity management systems must work to preserve the privacy of users. This session explores contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.