Event Recording

Mike Kiser, David Lee - Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Show description
Speakers
Mike Kiser
Director, Strategy and Standards
SailPoint
Mike Kiser
Mike Kiser has held a panoply of industry positions over the past 20 years—from the Office of the CTO to Security Strategist to Security Analyst to Security Architect—that might imply otherwise. In spite of this, he has designed, directed, and advised on large-scale security...
View profile
David Lee
Senior Identity Strategist
Sailpoint
David Lee
14 years typing letters and numbers into a computer screen and waiting for the magic to happen. Most of that time the magic was helping enterprises figure out how to manage all the accounts and access they have in a reasonable manner, by yelling at software created by a number of companies....
View profile
Playlist
European Identity & Cloud Conference 2019
Event Recording
Nat Sakimura - OpenID in the Digital ID Landscape: a Perspective from the Past to the Future
May 28, 2019

Digital identity has been under a constant evolution for the last 30 years. It started from a simple access control via user account within a system to a shared credential among the systems, then to the federated identity and bring-your-own-identity (BYOI). Modern usages are not only for access control but include such purposes like digital on-boarding (account opening), employee and customer relationship management. Among the many technologies out there, OpenID seems to have gained popularity in the market that you are probably using it without knowing it. This session explains the positioning of OpenID in the digital ID landscape and explores the future potential for both corporations and individuals for the coming years.

Event Recording
Impressions of the AI Innovation Night at EIC 2019
May 17, 2019
Event Recording
Joy Chik - Identity-Driven Security: The Key to Digital Privacy
May 15, 2019

In today’s world, organizations and people manage a complex web of digital relationships. To keep everyone safe, each digital interaction must be validated. Strong tools and technologies are now available to help organizations protect their resources, employees, business partners, and customers. But there are no similar tools—beyond legislation—for individuals trying to protect their private information. As an industry, we have a responsibility to provide technology tools that ensure privacy for individuals even while they strengthen security. This means supporting citizens’ rights by putting them in control of their data and providing standards-based solutions for interoperability, portability, and protection for the entire data lifecycle.

Event Recording
Todd Peterson - Rightsizing IGA – One Size Does Not Fit All
May 16, 2019

The Holy Grail of identity and access management is identity governance and administration (IGA). Unfortunately, getting IGA right is much easier said than done. From access request through provisioning and into identity lifecycle management; and from user access governance, through data governance, and into privileged access governance, the sheer volume of users, systems, and scenarios that must be addressed can be overwhelming.

In this session, One Identity will discuss what IGA truly means, how to determine where to start, and where to go next once you are on the path. Don’t be fooled by vendors pitching a myopic or siloed approach to IGA, or a heavy-handed solution that may be more complex and expensive than you can handle. To get IGA right takes designing a program that satisfies YOUR objective and fits within YOUR budget and skillset. It can be done, but it takes a fresh look at the age-old challenge.

Event Recording
Andrea Rus - SAP Customer Experience: Delivering Trusted Relationships for Your B2B Customers and Partners
May 16, 2019

Driving growth through customer and partner engagement is critical for B2B business success. Yet, too often, companies struggle to meet this vital need. Why? For partner organizations, managing the end-to-end partner lifecycle is difficult using legacy technologies and manual practices. Each partner has varying needs for security roles, authorizations, and application permissions, and these elements must be handled efficiently so partners get to market quickly and so users can easily go about their day-to-day work. Meanwhile, the business’ most sensitive data must be protected against breaches in order to not risk breaking the partner’s trust. For B2B marketing and sales teams, business customers today are accustomed to more relevant and transparent experiences as consumers and expect that same treatment in their B2B buyer journeys. This means that marketing and sales teams must deliver personalized, content-driven digital experiences, transparency around data collection and processing, and meaningful control for prospects and customers over their personal data. Finally, many B2B businesses have been slow to respond to the European Union’s General Data Protection Regulation (GDPR) and, as a result, are losing ground to more compliant competitors while putting their brand reputation in jeopardy.

To overcome these challenges, you need a single solution to centrally manage the entire lifecycle of external digital identity, consent, authentication, and authorization, to help reduce risk, lower costs and improve customer and partner user experience. Does this sound too good to be true?

Learn how the new SAP® Customer Identity and Access Management for B2B (SAP CIAM for B2B) solution can help your business achieve measurable results through enhanced B2B customer and partner engagement.

Event Recording
Impressions of the European Identity & Cloud Conference 2019
May 17, 2019
Event Recording
Ian Glazer - The Most Forgotten Thing in Identity Management
May 15, 2019

Passwords? No, it’s not passwords. I’ll give you a hint: we all use them. Everyday. Many many times a day. Still don’t know? It’s the humble username. The “middle child” of identity management, the username doesn’t get the same attention that its big brother “Password” and its little sister “Password-less” get. Instead, just does his job without thanks or recognition. But, failing to pay attention to username can have major negative impact in both B2B and B2C scenarios. In this talk, Mr. Glazer explores the critical aspects of usernames, highlights downsides of getting username wrong, and offers some best practices when designing username schemes.

Event Recording
Kim Cameron - Turning the Web Right Side Up – Giving People What Is Theirs
May 15, 2019

A steady stream of trends has built up over the years fueling a growing momentum around Decentralized Identity.  Kim Cameron will report on why early adopters – enterprises both large and small – are already beginning to make Decentralized Identity part of their strategy for digital transformation.  He will argue that the underlying trends will only intensify – and that enterprises which figure out how to benefit early will benefit the most.

Event Recording
Dr. Emilio Mordini - "Das Sterben der Pythia" - On Humans, Artificial Intelligence and Oracles
May 14, 2019

Very often we hear the argument, that the way the internet has been influencing our lives can be compared to Gutenberg´s invention of the printing press. Emilio Mordini - Psychiatrist and one of the world´s most distinguished thought leaders on how future technology will change the way we think and live, says that the transition from analog to digital is much closer to the transition from the spoken to literacy than the printing press ever was, because it is changing the medium in which human thoughts are materialized. In his keynote, Dr. Mordini will refer to Dürrenmatt´s Short Story "Das Sterben der Pythia" and describe why he thinks that "digital predictions" are always and unavoidably self-fulfilling prophecies. 

Event Recording
Paul Fremantle - Open Source IAM: Strengths and Opportunities
May 18, 2019
Event Recording
Jim Taylor - Learning to Fly – Taking Infrastructure Software to the Next Level
May 15, 2019

Do you build your own car?  Do you buy all the components and put them together yourself?  Of course you don't.  You find vendors who have already assembled all of the pieces into a finished car, and then select the options for the car that fits it perfectly to your wish list.  Don't you think it’s time that you bought your software the same way?  Why spend your time and money running around trying to find all of the best pieces, and even more money trying to put them together.  Broadcom believes that there is a better way, and we intend to deliver it to our customers.  Come hear how we are merging DevOps with Security to deliver a one-stop shop for purchasing everything you need to deliver apps and services to your customers.  

Event Recording
Jochen Werne - HUMAN. DIGITAL. CULTURE - Disruption or just Progress? Impacts of Artificial Intelligence on Business and Society
May 14, 2019