Event Recording

Evolution of User Centricity in Customer IAM

Show description
Speaker
Rolf Hausammann
Head of Identity and Access Management
Swisscom
Rolf Hausammann
Rolf is leading Swisscom's Identity and Access Management for the retail, business and wholesale customer segments and 3rd party sales channels. He developed the strategy and initiated the IAM program in 2016. He joined Swisscom in 2013 and transformed the mid-market segment form a...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Panel | From Piecemeal to Strategic Priority: What CISOs need to know about CIEM
Sep 15, 2021

CIEM (Cloud Infrastructure Entitlement Management) is a SAAS delivered, converged approach to next generation, ideally AI driven multi-cloud security, managing access and privileges in the cloud. It is playing across the disciplines Identity Management & Governance, Access, Privilege Management and Authentication, addressing the complexity of multi-cloud adoption with privilege & access management working differently for each provider.

Gerry Gebel, Head of Standards, Strata Identity, Inc
David Higgins, EMEA Technical Director, CyberArk
Jon Lehtinen, Director, Okta
Patrick Parker, Founder and CEO, EmpowerID
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Event Recording
What a CISO needs to know about GDPR
Sep 14, 2021
Stefan Hessel, Rechtsanwalt I Attorney-at-Law, reuschlaw Legal Consultants
Event Recording
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Sep 15, 2021
Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
Event Recording
Worlds Collide: The Importance of Convergence in IAM
Sep 14, 2021

Identity and privileged access management have existed in silos for decades. But cloud adoption and the rise in remote workers have introduced new vulnerabilities, and cybercriminals have noticed. As ransomware, breaches, and credential theft continue to make headlines, one thing is clear: We need to treat all access as privileged access and understand the context — and risk — of that access.

In this session, Chris Owen, Saviynt Director of Product Management, will discuss how identity worlds collide through Saviynt Enterprise Identity Cloud. He will show how this converged platform brings intelligence, visibility, and context together so you can manage the entire identity lifecycle, including governance, privileged access, application access, and third-party access.

Chris Owen, Director of Product Management, Saviynt
Event Recording
Workshop | Move your Active Directory to the Cloud
Sep 16, 2021
Martin Kuppinger, Principal Analyst, KuppingerCole
Patrick Parker, Founder and CEO, EmpowerID
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Event Recording
Why must CISOs and security leaders let IAM drive their cloud security adoption?
Sep 15, 2021

As organizations expand their cloud footprint to accelerate innovation and digital transformation, increased security risks pose an imminent and elevated threat to their growing cloud presence. The market is overwhelmed with numerous security technologies, approaches and frameworks for securing an organization’s cloud adoption journey, but security leaders and architects must meticulously assess the security risks associated with their cloud usage, migration patterns and digital interactions with customers, employees and partners to suite their business requirements and cloud security priorities.

Identity and Access Management (IAM) remains one of the key security disciplines to support digital transformation and cloud adoption objectives, by not only providing a secure identity and access foundation for the user, device and cloud-service types but also by offering additional cloud-specific security provisions that include cloud access management, cloud entitlement management, cloud privileged access and cloud access governance to its evolving technology portfolio.

In this session, we will discuss the important security tenets of an organization's cloud adoption program and how effective IAM architecture and planning can help navigate CISOs and security leaders through their cloud adoption journey.

Anmol Singh, Sr. Cloud Security Advisor, Microsoft
Event Recording
Clouds for all Seasons
Sep 15, 2021

Cloud services have enabled organizations to exploit leading edge technologies without the need for large capital expenditure.  In addition, to survive the COVID pandemic, organizations have had to accelerate their use of these services.  The market for these services is forecast to grow significantly as organizations complete their digital transformation and move, migrate, or modernize their IT systems.  However, according to some estimates only around 4% of enterprise workloads have currently been moved to the public cloud.  The factors limiting this growth are the challenges faced by organizations of managing the security and compliance of this new complex hybrid IT environment.  This presentation will describe how we expect the market for cloud services to evolve and the key changes needed to help organizations to manage these challenges. 

Mike Small, Senior Analyst, KuppingerCole
Event Recording
Beyond Blockchain: New Frameworks for Data Privacy and Security
Sep 15, 2021

The reason to use biometrics as a form of identity is because they are unique, unchanging and are the one direct and unequivocal link to an individual. But what if these identifiers are compromised? This is not a hypothetical scenario as the U.S. Office of Personnel Management breach sadly taught us several years ago. For years, this has been a conundrum in the world of biometrics - to store the data in a centralized system that has to be protected or choose device-based biometrics that are not linked to a vetted physical identity. In this never-ending loop of having to choose between privacy and security, we as a society have ended up with neither. This is about to change.

There are multiple forces now converging, that are driving serious attention and urgency to solve this problem as never before - continued, massive data breaches, skyrocketing use of biometrics and the emergence of far-reaching privacy and data protection laws that put the onus on protecting personal data on the private sector.

Owning personal data, and especially biometrics, has become a hot potato. Noone wants to hold it, but it is necessary for doing business. Consumers on the other hand are asking for more control. As a result, we are seeing new frameworks emerge, frameworks that go beyond blockchain and take into account the need for holistic, decentralized identity management that binds a rooted identity to a trusted authentication key that cannot be stolen, lost or circumvented by fraudsters operating under assumed identities with stolen PII.

Join us as we take you through a journey of what these new frameworks look like and the new possibilities that emerge when there is no binary choice to be made between privacy and security. It will finally be possible to have both.

Frances Zelazny, Co-Founder & CEO, Anonybit
Event Recording
EIC 2021 - Impressions
Sep 19, 2021
Event Recording
How to successfully rob a bank (and almost get away with it)
Sep 14, 2021

The majority of crimes in our industry are initiated with cyber-attacks on people - however, our people can also be our most valuable assets. This presentation start with a walkthrough of multiple "bank robbery" scenarios to focus on a real event from 2016, when in one of the largest cyber heist ever, $1 billion were at stake being stolen from a bank. And how human vigilance (as well as human mistakes by the criminals) finally prevented the worst.

Kashif Husain, CISO, Vice President, Nomura
Event Recording
A Primer for SSI in DE
Sep 14, 2021

Self-Sovereign Identity – or SSI in brief – is now a major thing. Germany has become one of the world’s key SSI accelerators. Countless people and organizations – small and large – are getting excited and actively involved. Now de facto driving forces are: 1. SSI Pilots by the German Federal Chancellery as first demonstrations of the Digital Identity Ecosystem. 2. IDunion – a solution-oriented research project co-funded by the German Federal Ministry of Economic Affairs and Energy in the cluster of showcases in Secure Digital Identity. This presentation provides a brief SSI introduction and an update on these two major German SSI initiatives.

Dr. André Kudra, CIO, esatus AG
Event Recording
Identity Management as a Service - What it is and How to Build One
Sep 14, 2021

I considered myself quite an experienced programmer and having some expertise in Identity management when I was hired by Swedbank to work as full time Identity engineer. Besides projects, I had assignment to describe an architecture of the IAM as a service from my manager. Honestly, I had no clue about how to envision it. I tried to assemble standards and squeeze something out from practices and papers. But these were not really all my ideas and I did not feel much confident. But something started to happen in few last years when we had a very hard time implementing our IAM project (believe or not, it was successful). We had to answer hundred times to questions "why", "what" and "how". And finally the blueprint of the architecture of IAM as a service appeared from the mist. It is not one and only, because same size does not fit for all. Still, I do not agree that there are indefinite number of possible solutions. I think similar enterprises and engineers may find this presentation useful to draw their own blueprints.

IAM projects start usually from implementing baseline IAM processes - joiners, leavers, movers. Because this is what is usually most needed. But then you will get asked for more - identity data, events, other services. This is what makes up IAM as a service.

Neeme Vool, Software Engineer, Swedbank