Event Recording

How Denmark is Building the Cyberprotection Bridge Between the Private and Public Sectors: The National Danish Cybersecurity Council

Show description
Speaker
Bjarke Alling
Member
National Danish Cybersecurity Council
Bjarke Alling
Group Director of Liga, Member of the National Danish Cybersecurity Council and Chair of the IT Security Committee at The Danish IT Industry Association. Years of experience with Enterprise IT services. In-depth knowledge and understanding of IT systems, integration challenges, and cybersecurity...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Evolution of User Centricity in Customer IAM
Sep 14, 2021

The transformation of the IAM landscape of a Multi Service Provider is taking shape.

Rolf Hausammann, Head of Identity and Access Management, Swisscom
Event Recording
Goodbye Dogmatism / Hellō Pragmatism
Sep 14, 2021

Disciples of decentralized identity have preached for years that DIDs are the only true path to giving users control over their identity, AKA self sovereign identity. The lack of widespread adoption is evidence that a more pragmatic approach is needed.

Event Recording
Four Steps to a Next Generation PAM Solution
Sep 14, 2021

Four simple steps to the perfect PAM.

Stefan Schweizer, Vice President, Sales – DACH, ThycoticCentrify
Event Recording
The Future of IoT Security
Sep 15, 2021

Speaker: Graham Williamson

Event Recording
Meeting Expectations – 5 pillars for IoT project success
Sep 14, 2021

Deployment of IoT installations are accelerating as organisations seek to expand their business by adding IoT functionality to their products/service, or reduce their costs by automating processes. Unfortunately, in many cases these initiatives are not adequately executed and, as a result, do not meet expectations.

In this session we will look at 5 pillars of an IoT deployment: the Device pillar ensures we select the appropriate sensors and actuators, the Control pillar guides our decisions on controller functionality, the Communications pillar ensures we consider which options fit our required functionality and budget, the IT pillar determines the level of integration between our IT and OT environments, and the Security pillar guides our protection strategy.

A holistic approach is a success-indicator for our IoT projects.

Graham Williamson, Director APAC / Senior Analyst, KuppingerCole
Event Recording
EIC 2021 - Venue, Sponsor Booths
Sep 19, 2021
Event Recording
Airbus Expert Perspective: Managing Third-Party Identity Risk in the Supply Chain
Sep 14, 2021

As a leader in innovative aerospace manufacturing with locations across the world, Airbus recognized the need to fortify its third-party identity management processes to better meet the operational efficiency and security needs of its evolving business and supply chain. Specifically, Airbus wanted to upgrade its identity management capabilities around lifecycle management, data quality, and obsolescence management for its third-party, non-employee users.

Benjamin Gasperi, On/Offboarding Product Manager, Airbus
Guillaume Lugat, Head of Identity & Access Management, Airbus
Event Recording
Entitlement Management across Hybrid Cloud for Security & Compliance
Sep 14, 2021

Companies across the globe are undergoing digital transformation. The main challenge with this approach is the ability to securely manage access for on-premise, cloud and SaaS applications. Entitlement Management across this hybrid landscape requires management of cloud assets, IAM profiles, groups, roles and entitlements in support of Identity Lifecycle Management, Access Management, and Access Governance.

Workloads have been running in the cloud since the last decade or so. AWS, GCP and Azure have replaced traditional data centers and companies continue to migrate their production workloads to cloud at blistering pace. So, what changed? Firstly, we are starting to realize that this cloud infrastructure model necessitates a different type of identity and access management solutions as native solutions don’t cover multi-cloud IaaS model and traditional IGA solutions fall short in their scope. Secondly, business goals and priorities are driving engineering teams to work on initiatives without formal approval and oversight. With IaaS it is easy to spin up an instance, assign various resources. As organizations aren’t centrally controlling these spin offs, any vulnerabilities in this growing shadow IT is a target for hackers.

SecurEnds enables entitlement management across hybrid cloud assets for security and compliance.

1. Provide visibility over hybrid-cloud assets
Discover all identities, service accounts, IAM users, roles and policies within single or hybrid cloud the IaaS infrastructure.
See the granular permissions held by IAM Users, Roles and Service Accounts. This is important to define least privilege policies.
2. Provide governance over hybrid-cloud assets
Enforce least privilege policies across all cloud identities to avoid privilege creep.
Routine audits of configurations across cloud environments helps with policy enforcement and compliance.
3: Provide remediation over hybrid-cloud assets
Post identity review kick off automation to rectify privileges

Austin Baker, Director of Sales, SecurEnds
Event Recording
The Ethical Part of AI Governance
Sep 15, 2021

The Ethical Part of AI Governance – my personal learning journey

This talk is about my personal learning journey in AI and AI Ethics together with Bosch. I want to share what brought me to AI and AI Ethics personally and professionally and what instrument is used at Bosch to bring AI Ethics to life.

Sina Brandstetter, Software Engineer and Solution Architect, Robert Bosch GmbH
Event Recording
Persistent digital reputation across industries, countries, and legal frameworks
Sep 14, 2021
Stepan Gershuni, VC Marketplace WG Lead, Decentralized Identity Foundation
Event Recording
Addressing Multi-cloud Identity Challenges with a New Standard: IDQL
Sep 15, 2021

The trend toward adopting multiple cloud providers means identity is now distributed, rendering traditional, centralized access policies and perimeters obsolete. As a result, the way we think about identity and access management (IAM) has to change. This session will present Identity Query Language (IDQL), a new standard for identity and access policy orchestration across distributed and multi-cloud environments.

Gerry Gebel, Head of Standards, Strata Identity, Inc
Event Recording
EIC 2021 - Attendees Greetings
Sep 19, 2021