Event Recording

Christian Goy - Is Data Really The New Oil?

Show description
Speaker
Christian Goy
Managing Director
Behavioral Science Lab
Christian Goy
Christian Goy, is the co-founder and managing director of the Behavioral Science Lab. Business transformation and innovation leader, opera-lover, former professional athlete, two-time Hall of Fame inductee, and sub-four-minute miler, Christian was raised in East Germany, overcame adversity and...
View profile
Playlist
European Identity & Cloud Conference 2019
Event Recording
Impressions of the European Identity & Cloud Conference 2019
May 17, 2019
Event Recording
Maximilian Möhring - The Future of Digital Identity is Decentral, But Not Blockchain
May 16, 2019

This interdisciplinary talk will lead you through on why not just identities, but any identity-related information should not be stored on a blockchain. The main technical reason being that none of the blockchain USPs is applicable when it comes to identity (-related) data, especially assertions.The legal and business reason being that blockchain is not (yet) compatible with and accepted in our legal and regulatory framework. So what is the way to go?

There's not many other areas where security and decentralisationis as important as when we're dealing with identity data. Max will explain how to take advantage of already-existing technology (even edge technology) to ensure convenience for the enterprises as well as cost reduction while at the same time making sure there is maximum convenience for the identity owners (humans, machines and other enterprises).

Event Recording
European Identity & Cloud Conference 2019 Wrap-Up
May 17, 2019
Event Recording
Thom Langford - Facing the Post-GDPR Reality
May 14, 2019
Event Recording
Patrick Parker - Applying Microservice Design Principles to Cloud Security Management
May 15, 2019

The old paradigm of a centralized directory for security has been shattered into a thousand pieces and scattered across the Cloud. Identities, sensitive data and resources, and the management of who may access them are now distributed across hundreds of on-premise and Cloud systems each with its own idiosyncratic security model and none designed to be managed in unison. The shift to Microservices has accelerated the pace of this change. Given this monumental new challenge what is the solution for identity professionals?

The answer lies in embracing this change and applying Microservice design patterns to Identity and Access Management. As an example, IAM can play a key role in an organizations Microservices design by acting as what is known as an "Anti-Corruption Layer". The Anti-Corruption Layer Design pattern isolates systems having different models by translating communications between them, allowing one system to remain unchanged while the other can avoid compromising its design and technological approach. In this case, IAM can be the glue that translates between an organizations security practices and the multitude of ever-changing Cloud applications and their local security.

Event Recording
Todd Peterson - Rightsizing IGA – One Size Does Not Fit All
May 16, 2019

The Holy Grail of identity and access management is identity governance and administration (IGA). Unfortunately, getting IGA right is much easier said than done. From access request through provisioning and into identity lifecycle management; and from user access governance, through data governance, and into privileged access governance, the sheer volume of users, systems, and scenarios that must be addressed can be overwhelming.

In this session, One Identity will discuss what IGA truly means, how to determine where to start, and where to go next once you are on the path. Don’t be fooled by vendors pitching a myopic or siloed approach to IGA, or a heavy-handed solution that may be more complex and expensive than you can handle. To get IGA right takes designing a program that satisfies YOUR objective and fits within YOUR budget and skillset. It can be done, but it takes a fresh look at the age-old challenge.

Event Recording
Kelley Mak - Emerging Venture Capital Trends in Enterprise Cloud and Cybersecurity
May 14, 2019

For the past five years at Work-Bench, we’ve been investing in a total reimagining of the enterprise technology stack. The enterprise infrastructure stack that powers Fortune 1000 organizations is in the midst of a tectonic shift. This talk will highlight key trends in cloud and cybersecurity affecting the enterprise and where disruption lies for VC investment and corporate innovation. While there remains a lot of buzz around emerging technology, such as ML/AI and new infrastructure patterns like serverless, this keynote will cut through the noise and marketing hype and help bring to the fore what's truly transforming the enterprise technology landscape.

Event Recording
Katryna Dow - Customer Personalisation: Bridging CIAM and SSID
May 15, 2019

With the rapid fusion of physical, biological and digital, identity is now more personal than ever. At the same time, data breaches, hacking and centralised honey pots mean that customers are more vulnerable than ever before.

How we collect and process data in order to personalise services may be the difference between gaining trust or getting fined. Distributed ledger, Self-Sovereign Identity and Zero Knowledge Proofs offer new opportunities to build a trusted data and identity stack. Taking the best of CIAM together with increasing the rights and protections for customers will drive connected use-cases, lower costs and enable new business models.

This session will focus on how incorporating SSID, ZKP and progressive disclosure enables enterprise to personalise products and services without putting customers at risk. Bridging CIAM and SSID means less data and more insight.

Event Recording
Joy Chik - Identity-Driven Security: The Key to Digital Privacy
May 15, 2019

In today’s world, organizations and people manage a complex web of digital relationships. To keep everyone safe, each digital interaction must be validated. Strong tools and technologies are now available to help organizations protect their resources, employees, business partners, and customers. But there are no similar tools—beyond legislation—for individuals trying to protect their private information. As an industry, we have a responsibility to provide technology tools that ensure privacy for individuals even while they strengthen security. This means supporting citizens’ rights by putting them in control of their data and providing standards-based solutions for interoperability, portability, and protection for the entire data lifecycle.

Event Recording
Simon Moffat - Bot, Human, Friend or Foe?
May 15, 2019

Modern authentication and authorization services need to generate more than the traditional allow or deny result. Developing user discovery flows that capture and store contextual information, can allow authorization services to  deliver dynamic and fine grained data redaction and resource protection. It enables organizations to digitally transform their business and to develop future proof identity models and ecosystems focusing on zero trust and continually secure infrastructures.

Event Recording
Mark Stephen Meadows - That Robot Overlord Is in Your Kitchen. Her Name's Alexa
May 16, 2019

If we look under Alexa’s hood and read between the technologies we find a disturbing reflection of our own identities and personal data. In your home Alexa is always listening and influencing your options. In your company’s product deployment Alexa is influencing your brand, your customers, and your user data.  We will discuss why this represents a geo-political shift more significant than the rise of social media. As a previous developer of Alexa skills and other AI systems I will share with you my lessons learned.

And we will examine alternatives.

Event Recording
Nat Sakimura - OpenID in the Digital ID Landscape: a Perspective from the Past to the Future
May 28, 2019

Digital identity has been under a constant evolution for the last 30 years. It started from a simple access control via user account within a system to a shared credential among the systems, then to the federated identity and bring-your-own-identity (BYOI). Modern usages are not only for access control but include such purposes like digital on-boarding (account opening), employee and customer relationship management. Among the many technologies out there, OpenID seems to have gained popularity in the market that you are probably using it without knowing it. This session explains the positioning of OpenID in the digital ID landscape and explores the future potential for both corporations and individuals for the coming years.