Event Recording

Managing Self-Sovereign Identities as an Institution with Lissi

Show description
Speaker
Adrian Doerk
Business Development Manager
neosfer
Adrian Doerk
Adrian Doerk is specializing on digital Wallets for identity management. He build up the IDunion Consortia and manages the business development for Lissi. He is also sharing insights from the decentralized identity community via SSI Ambassador.
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Why must CISOs and security leaders let IAM drive their cloud security adoption?
Sep 15, 2021

As organizations expand their cloud footprint to accelerate innovation and digital transformation, increased security risks pose an imminent and elevated threat to their growing cloud presence. The market is overwhelmed with numerous security technologies, approaches and frameworks for securing an organization’s cloud adoption journey, but security leaders and architects must meticulously assess the security risks associated with their cloud usage, migration patterns and digital interactions with customers, employees and partners to suite their business requirements and cloud security priorities.

Identity and Access Management (IAM) remains one of the key security disciplines to support digital transformation and cloud adoption objectives, by not only providing a secure identity and access foundation for the user, device and cloud-service types but also by offering additional cloud-specific security provisions that include cloud access management, cloud entitlement management, cloud privileged access and cloud access governance to its evolving technology portfolio.

In this session, we will discuss the important security tenets of an organization's cloud adoption program and how effective IAM architecture and planning can help navigate CISOs and security leaders through their cloud adoption journey.

Anmol Singh, Sr. Cloud Security Advisor, Microsoft
Event Recording
In-house OAuth/OIDC infrastructure as a competitive advantage
Sep 15, 2021

Leading service providers have started developing their software in-house to achieve competitive business advantages.

Event Recording
Panel | Identity in the Asia-Pacific - Untangling the Web
Sep 15, 2021

Do you want to launch or expand your identity-related business in the Asia-Pacific region but don’t know where to start?

Linden Dawson, Director, Cybersecurity & Digital Trust, PwC Australia
Allan Foster, Chief Evangelist, ForgeRock
Graham Williamson, Director APAC / Senior Analyst, KuppingerCole
Event Recording
How can Decentralized Identities reshape the Future of eCommerce?
Sep 15, 2021
Dr. Michele Nati, Head of Telco and Infrastructure Development, IOTA Foundation
Event Recording
Cloud without Compromise: Identity-Centric Security that Mitigates Modern Risks
Sep 13, 2021

Is your IGA strategy keeping up with modern threats? Novel attack methods are revealed daily, compliance requirements never stop evolving, and how and where we work has forever escaped the traditional office. As a result, organizations require more flexibility than ever to protect what matters most. You shouldn’t have to compromise functionality nor security levels because your IT resources and people operate on-premises, in the cloud or in a hybrid environment. The point is that you don’t need to.

Don’t miss this 20-minute keynote address by One Identity’s Rima Pawar, VP of Product Management, as she discusses the secret fears of many CISOs and other senior IT leadership and how an identity-centric security strategy can mitigate modern threats and help IT executives sleep at night. Topics will include best practices to extend security beyond the traditional perimeter; how to take an identity-centric approach to security; as well as hear how your peers are pursuing Zero Trust strategies.

Event Recording
Applying Zero Trust to Humans and Things
Sep 14, 2021

The pandemic has dramatically changed how we work, shop, meet and learn. Simple username and password credentials can no longer be part of this new world. They have become every user’s and every IT departments’ nightmare. Connected IoT things are for the first time outnumbering non IoT connections such as Tablet, Phones and PCs and many emerging business models will drive more revenue through IoT-enabled services than the products through which they’re delivered. Applying zero trust thinking to all identities including connected things and not just employees and their PCs is therefore a concept organisations will need look into to ensure adequate security measures for their employees and things.

In this session we’ll talk about:

  • Current challenges of managing IoT devices
  • How identity of things automate and improve user experience
  • The role of IAM in Zero Trust
Gerhard Zehethofer, Vice President IoT and Technology Partnerships, ForgeRock
Event Recording
The Proper Care and Feeding of Non-Human Identities
Sep 15, 2021

Non-human identities are crucial for managing access risk with IGA, especially for non-standard accounts that provide the most access risk for organizations.

Brian Iverson, Chief Product Officer, Tuebora
Event Recording
Digital Onboarding
Sep 15, 2021

Enterprise hiring in the time of Covid is putting greater emphasis on supporting remote on boarding of new employees. This creates new challenges for the IAM team as it is no longer self evident that new contractors and employees to show up at a physical helpdesk, provide ID and pick up their new accounts. How do you organize the remote onboarding and are there technologies and approaches that are used in digital customer onboarding and KYC processes that can be leveraged to also handle employee onboarding?

Another important aspect is that remote working has become the norm and securing the remote connections is critical. A big part of that effort is to implement MFA at scale but in this situation how do you handle the roll out of the MFA when the users are not present in the office?

How do you support remote onboarding at scale?
How do you roll out MFA to a 100 000 people organisation?
What is the future for remote onboarding of contractors and employees?

Martin Sandren, Manager IAM, AholdDelhaize
Event Recording
Panel | Building Trust with CIAM
Sep 14, 2021
Armin Bauer, Managing Director Technology and Founder, IDnow GmbH
Paul Fisher, Senior Analyst, KuppingerCole
John Erik Setsaas, VP of Identity and Innovation, Signicat AS
Event Recording
Introducing The Global Assured Identity Network (GAIN)
Sep 13, 2021
100 experts propose an interoperable scheme to create a virtual IDP.
Event Recording
Hybrid cloud enablement: use cases, challenges, best practices
Sep 15, 2021

Cloud computing has become commonplace in recent years, it is almost inevitable for small to medium sized companies to leverage cloud services largely if not fully. However, it is not easy to run cloud enablement project in bigger and yet most importantly traditional companies, where there are hundreds of legacy applications, which expect data to be closer to the computing units, and which are dependent on bandwidth and reliable network availability. In this presentation, I am going to address cloud migration requirements, usual challenges, and lessons learnt and best practices from project management, security and service management point of view.

Paraj Sharma, Program Manager, Global IT-Infrastructure Services, Thyssenkrupp Industrial Solutions AG
Event Recording
Exploring the Future of AI
Sep 15, 2021
Anne Bailey, Analyst, KuppingerCole