Event Recording

How to successfully rob a bank (and almost get away with it)

Show description
Speaker
Kashif Husain
Vice President, Information Security Officer
Nomura
Kashif Husain
In 2019 Kashif Husain joined the Frankfurt office of Nomura, a Japan headquartered financial services group present in over 30 countries. In addition to his role as Information Security Officer, Kashif has also taken over Technology Governance responsibilities for the Continental European...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Give Me 10 Minutes, I'll Give You The Truth About Identity
Sep 13, 2021

User recognition and authentication is becoming the central element of companies' digitalisation strategy. Not only are user registration and login the first experiences users make, Identity and Access management will ultimately determine which company recognises and serves the needs of its users best and will be successful in the market.

What you can expect

  • A holistic view on identity and access management
  • A forward-looking way of thinking and
  • Progressive software architectures
Event Recording
EIC 2021 - Impressions
Sep 19, 2021
Event Recording
Evolution of User Centricity in Customer IAM
Sep 14, 2021

The transformation of the IAM landscape of a Multi Service Provider is taking shape.

Rolf Hausammann, Head of Identity and Access Management, Swisscom
Event Recording
Cloudification of Access Management – Lessons Learned from the Migration of a Large-scale Production System
Sep 15, 2021

Access Management is a crucial capability in the IT infrastructure of any Enterprise. But it is even further crucial, when the whole application landscape is integrated, i.e., more than 1,800 applications used by millions of users. Back in 2017 we modernized the existing access infrastructure and set up ForgeRock as its successor on-premises in our data center. With rising demands regarding availability, scalability, and support for market-specific customizations, as well as more products and applications are going to the cloud, it became increasingly clear that project will have to cloudify its infrastructure and application stack. The future setup should follow modern paradigms like GitOps, Everything as Code and making use of highly automated processes based on Service Layers, all whilst keeping the integrated applications up and running and migrating the product stack to the AWS (Amazon Web Services) cloud.

Key Takeaways:

- How does a target architecture look like
- What challenges will appear when it comes to the migration
- How to ensure the migration to the cloud, whilst minimizing the effect for all integrated applications

Dr. Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Group
Stephanus Rieger, Product Owner, BMW AG
Event Recording
One PAM - A Holistic Approach to PAM for the Shift to a Zero Trust Model
Sep 14, 2021

Join Peter Dulay, Symantec Identity Management Adoption Advisor, Broadcom, as he introduces One PAM, which brings together traditional proxy-based (credential vaulting) with agent-based (granular access controls) capabilities into one consolidated solution and approach, and how One PAM is better positioned to help customers shift to a Zero Trust model.  

Peter Dulay, Security & Integration Adoption Advisor, Broadcom
Event Recording
Cloud without Compromise: Identity-Centric Security that Mitigates Modern Risks
Sep 13, 2021

Is your IGA strategy keeping up with modern threats? Novel attack methods are revealed daily, compliance requirements never stop evolving, and how and where we work has forever escaped the traditional office. As a result, organizations require more flexibility than ever to protect what matters most. You shouldn’t have to compromise functionality nor security levels because your IT resources and people operate on-premises, in the cloud or in a hybrid environment. The point is that you don’t need to.

Don’t miss this 20-minute keynote address by One Identity’s Rima Pawar, VP of Product Management, as she discusses the secret fears of many CISOs and other senior IT leadership and how an identity-centric security strategy can mitigate modern threats and help IT executives sleep at night. Topics will include best practices to extend security beyond the traditional perimeter; how to take an identity-centric approach to security; as well as hear how your peers are pursuing Zero Trust strategies.

Event Recording
Self-Issued OP and OpenID Connect for SSI (OIDC4SSI)
Sep 15, 2021

One crucial component to SSI is end-users being able to interact with verifiers directly, without relying on a third-party provider or having to operate their own hosted infrastructure.

Kristina Yasuda, Identity Standards Architect, Microsoft
Event Recording
Case Study: How an Entire Industry adopts Digital Enterprise Identity
Sep 15, 2021

Back in November 2013 the U.S. congress enacted the Drug Supply Chain Security Act (DSCSA). Part of the regulation is that actors within the U.S. pharmaceutical industry must verify the U.S. state license, which is issued by the U.S. Drug Enforcement Administration (DEA), status (and thus the authenticity) of every trading partner within their supply chain. And this does not stop just by direct trading partners a pharmaceutical supply chain actor might have, the regulation states, that also indirect trading partner’s U.S. state license status must be proofed.

Dr. Carsten Stöcker, Co-founder and CEO, Spherity
Event Recording
User Terms Engineering Layer for IEEE (The Institute of Electrical and Electronics Engineers)
Sep 14, 2021
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, Harvard's Berkman Klein Center for Internet and Society
Event Recording
Browser Features vs. Identity Protocols: An Arms Race?
Sep 14, 2021

In an attempt to protect users from excessive tracking and surveillance, the last couple of years have witnessed major browser vendors introducing increasingly restrictive anti-tracking measures. Identity protocols and features got caught in the crossfire, however, forcing identity software vendors and developers to hastily introduce changes to restore functionality that browser changes broke. Is this the new normal? What will we do when a change will break an identity feature beyond repair?

This session will review the main browser changes that have affected identity over the last few years – Chrome’s SameSite and Safari’s ITP2 in particular, interpreting them as part of a larger trend and attempting to predict what the future will look like for identity customers and practitioners.

Vittorio Bertocci, Principal Architect, Auth0
Event Recording
Panel | Identity in the Asia-Pacific - Untangling the Web
Sep 15, 2021

Do you want to launch or expand your identity-related business in the Asia-Pacific region but don’t know where to start?

Linden Dawson, Director, Cybersecurity & Digital Trust, PwC Australia
Allan Foster, Chief Evangelist, ForgeRock
Graham Williamson, Director APAC / Senior Analyst, KuppingerCole
Event Recording
EIC 2021 - Venue, Sponsor Booths
Sep 19, 2021