Event Recording

Katryna Dow - Customer Personalisation: Bridging CIAM and SSID

Show description
Speaker
Katryna Dow
CEO & Founder
Meeco
Katryna Dow
Katryna Dow is the founder and CEO of  Meeco ; a personal data platform that enables people to securely exchange data via the API-of-Me with the people and organisations they trust  Katryna has been pioneering personal data rights since 2002, when she envisioned a time when...
View profile
Playlist
European Identity & Cloud Conference 2019
Event Recording
Joy Chik - Identity-Driven Security: The Key to Digital Privacy
May 15, 2019

In today’s world, organizations and people manage a complex web of digital relationships. To keep everyone safe, each digital interaction must be validated. Strong tools and technologies are now available to help organizations protect their resources, employees, business partners, and customers. But there are no similar tools—beyond legislation—for individuals trying to protect their private information. As an industry, we have a responsibility to provide technology tools that ensure privacy for individuals even while they strengthen security. This means supporting citizens’ rights by putting them in control of their data and providing standards-based solutions for interoperability, portability, and protection for the entire data lifecycle.

Event Recording
Impressions of the AI Innovation Night at EIC 2019
May 17, 2019
Event Recording
Dr. Karsten Kinast - The Global Race for AI – Is it Time to Regulate Now?
May 16, 2019

Not only is there no form of AI that understands what it says, can draw conclusions from it, and can base decisions on it, but it is not even known how such a synthetic intelligence could be created. In our time, let's say in the next two and a half decades, it is not primarily a question of developing an ethical code within which AI's can unfold as independent subjects, but rather of a far more profane view of responsibilities. If a self-propelled car decides to drive against a traffic light pole without any action on my part, who is responsible for the damage?

Are there already solutions in our current legal system for the regulation of such matters, in which only the former of the "basic manifestos" of injustice - the constituent elements of the offense, illegality, and guilt - still plays a role, or must a new category be devised for this?

This keynote will offer an interesting reflection on the current and future situation.

Event Recording
Henk Marsman - Blockchain & IAM: A Perfect Fit or a Squared Peg and a Round Hole?
May 16, 2019

Blockchain to some is the future solution for everything, or at least for managing identity information. Rabobank is piloting extensively with blockchain. In his presentation Henk will use a few cases on blockchain to see what works well and what doesn't, and where blockchain could be applied to managing identities, whether these are customer identities or employee identities. Or both.

Event Recording
Jim Taylor - Learning to Fly – Taking Infrastructure Software to the Next Level
May 15, 2019

Do you build your own car?  Do you buy all the components and put them together yourself?  Of course you don't.  You find vendors who have already assembled all of the pieces into a finished car, and then select the options for the car that fits it perfectly to your wish list.  Don't you think it’s time that you bought your software the same way?  Why spend your time and money running around trying to find all of the best pieces, and even more money trying to put them together.  Broadcom believes that there is a better way, and we intend to deliver it to our customers.  Come hear how we are merging DevOps with Security to deliver a one-stop shop for purchasing everything you need to deliver apps and services to your customers.  

Event Recording
Patrick Parker - Applying Microservice Design Principles to Cloud Security Management
May 15, 2019

The old paradigm of a centralized directory for security has been shattered into a thousand pieces and scattered across the Cloud. Identities, sensitive data and resources, and the management of who may access them are now distributed across hundreds of on-premise and Cloud systems each with its own idiosyncratic security model and none designed to be managed in unison. The shift to Microservices has accelerated the pace of this change. Given this monumental new challenge what is the solution for identity professionals?

The answer lies in embracing this change and applying Microservice design patterns to Identity and Access Management. As an example, IAM can play a key role in an organizations Microservices design by acting as what is known as an "Anti-Corruption Layer". The Anti-Corruption Layer Design pattern isolates systems having different models by translating communications between them, allowing one system to remain unchanged while the other can avoid compromising its design and technological approach. In this case, IAM can be the glue that translates between an organizations security practices and the multitude of ever-changing Cloud applications and their local security.

Event Recording
Ivana Bartoletti - AI and Identity Management: Considerations for Deployment
May 15, 2019

With Identity Management increasingly moving to Access management, this talk will explore how permitting access on the basis machine learning is the logical next step on from biometric ID, and to provide for improved security to implement access control.  The session will explore the necessary steps to undertake to deploy AI systems in a secure, privacy compliant and ethical manner. 
Key takeaways:

  • The potential of AI in digital identity and access management
  • Assessing algorithms, an example of Algorithmic impact assessment
  • Main privacy and ethical issue
  • Getting the security right and mitigating risks
Event Recording
Kim Cameron - Turning the Web Right Side Up – Giving People What Is Theirs
May 15, 2019

A steady stream of trends has built up over the years fueling a growing momentum around Decentralized Identity.  Kim Cameron will report on why early adopters – enterprises both large and small – are already beginning to make Decentralized Identity part of their strategy for digital transformation.  He will argue that the underlying trends will only intensify – and that enterprises which figure out how to benefit early will benefit the most.

Event Recording
Impressions of the European Identity & Cloud Conference 2019
May 17, 2019
Event Recording
European Identity & Cloud Conference 2019 Wrap-Up
May 17, 2019
Event Recording
Simon Moffat - Bot, Human, Friend or Foe?
May 15, 2019

Modern authentication and authorization services need to generate more than the traditional allow or deny result. Developing user discovery flows that capture and store contextual information, can allow authorization services to  deliver dynamic and fine grained data redaction and resource protection. It enables organizations to digitally transform their business and to develop future proof identity models and ecosystems focusing on zero trust and continually secure infrastructures.

Event Recording
Dr. Sridhar Muppidi - Identity + Blockchain: Next Generation IAM is Closer Than You Think
May 16, 2019

Over the past 12-18 months, there has been a mounting interest in how Blockchain technology might support the next generation of IAM systems. The promises of decentralized and self-sovereign identity, which promote a frictionless user experience and improved privacy controls, are very appealing to any organization looking to reduce both costs and risks. But how do you get started? Many organizations are just starting their journey to cloud, so the idea of Identity + Blockchain may seem too futuristic. In this session, experts from IBM will share how clients are progressively moving towards a decentralized identity solution today while maintaining and integrating it into their existing identity management systems. Learn, how use cases like passwordless authentication for law enforcement personnel and digital job credentials are becoming a reality. Moving to cloud-based IAM is the first step in the process, and with the right strategy, the next generation IAM is closer than you think.