Event Recording

Identity is the New Blue

Show description
Speaker
Mike Kiser
Director, Strategy and Standards
SailPoint
Mike Kiser
Mike Kiser has held a panoply of industry positions over the past 20 years—from the Office of the CTO to Security Strategist to Security Analyst to Security Architect—that might imply otherwise. In spite of this, he has designed, directed, and advised on large-scale security...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Introducing BASIS - Addition to Martin Kuppinger's Opening Keynote
Sep 13, 2021
Event Recording
Zero Party Data - knowing without controlling
Sep 14, 2021

Applying the principles of self-sovereign identity to financial and social media sourced data points will enable businesses to make better and informed decisions about retention, acquisition and eligibility whilst relieving them of most of their obligations under GDPR.

Julian Wilson, Founder, Valido Limited
Event Recording
Balancing User Experience, Privacy and Business Requirements – Learnings From Social CRM
Sep 14, 2021

Based on our research about critical privacy areas in Social CRM I could present solutions and discuss further potentials provided by upcoming technologies and resulting requirement on privacy management systems.
Social CRM is a bit special as indeed many applications and processes areas are still in legally grey area, without established and accepted standards. Users tend to ignore this fact as many applications and process provide a value for them and/or are comfortable. Based on this specific setup I could build up the discussion and presentation.
This presentation would be more a discussion to show potential solutions and not the presentation of a specific solution

Dr. Olaf Reinhold, Board Member, Researcher, Social CRM Research Center e.V.
Event Recording
Where Stands the Sovereign Self?
Sep 13, 2021

When thinking about what SSI means for enterprises and providers of services to enterprises, it's easy to forget that SSI is about each of our sovereign selves. This means SSI should give us each a clear sense of independence, agency, and obvious freedom from the old centralized Identity Provider Relying Party model, and the federated one that followed from it. But we aren't there yet. What will it take to get us there—for our sovereign selves, and not just for hot new SSI businesses?

Event Recording
How to successfully rob a bank (and almost get away with it)
Sep 14, 2021

The majority of crimes in our industry are initiated with cyber-attacks on people - however, our people can also be our most valuable assets. This presentation start with a walkthrough of multiple "bank robbery" scenarios to focus on a real event from 2016, when in one of the largest cyber heist ever, $1 billion were at stake being stolen from a bank. And how human vigilance (as well as human mistakes by the criminals) finally prevented the worst.

Kashif Husain, CISO, Vice President, Nomura
Event Recording
Panel | A First-Person Account of Third-Party Identity Risk Management
Sep 15, 2021

In a 2018 study by Onus & Ponemon on data risk in the third-party ecosystem, more than 75% of companies surveyed said they believe third-party cybersecurity incidents are increasing. Those companies were right to believe that.

As our world becomes more digitized, and thus more interconnected, it becomes increasingly more difficult to safeguard organizations from cybercrime. Tack on to that challenge a global pandemic that all but forced organizations to become “perimeter-less,” if they weren’t already, and the potential access points for bad actors through third-party access increases exponentially.

The problem is two-fold.

The landscape of third-party users is vast and continues to grow. From third-party non-employees like vendors, contractors and affiliates to non-human third parties like IoT devices, service accounts and bots, more organizations are engaging third parties to assist with their business operations and help them to innovate, grow faster, improve profitability, and ultimately create greater customer value – faster. On average, companies share confidential and sensitive information with more than 580 third parties and in many cases, an organization's third-party workers can actually outnumber their regular, full-time workforce.

Yet, despite the increased use of third-party workers in business, most organizations lack the proper third-party risk culture, processes, and technologies to protect themselves against the long list of third parties with access to their sensitive data and systems. Organizations have these systems in place to manage their full-time employees but lack the same level of rigor to manage these higher-risk third-parties. As a result, many third-party users are provided with more access than needed for their roles, and most disturbingly, that access is frequently not terminated when the third party no longer needs it.

Without the right third-party identity lifecycle management procedures in place, businesses unwittingly expand their attack surface, unnecessarily put sensitive information at risk, and create additional access points for hackers.

Event Recording
User Terms Engineering Layer for IEEE (The Institute of Electrical and Electronics Engineers)
Sep 14, 2021
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, Harvard's Berkman Klein Center for Internet and Society
Event Recording
European Identity & Cloud Awards Ceremony 2021
Sep 14, 2021
Event Recording
Decentralized Identity and the US Dept. of Homeland Security
Sep 15, 2021
Markus Sabadello, CEO, Danube Tech
Event Recording
DIDComm and the Self-Sovereign Internet
Sep 15, 2021
DIDComm is the messaging protocol implemented in Hyperledger Aries that provides utility for DID-based relationships. Many may think DIDComm is just a way to exchange credentials, but it's more than that. DIDComm is a protocol layer capable of supporting specialized application protocols for any given workflow. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet, a secure internet overlay, that is much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces Autonomic Identity Architectures, describes DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. 
Dr. Phil Windley, Enterprise Architect, Brigham Young University
Event Recording
Identity Management and Governance, in a Cloud Native World
Sep 15, 2021

Most enterprise infrastructure and software are in the later stages of cloud transformation. However Identity Management and Governance has lagged behind. First generation monolithic IAM solutions and providers do not provide agility into entitlement and risks in a cloud first world. The complexity of diverse infrastructure, security policies, and development velocity make it virtually impossible to provision, analyze and remediate at scale.

Arun Binaykia, CEO, Sath Inc
Event Recording
Worlds Collide: The Importance of Convergence in IAM
Sep 14, 2021

Identity and privileged access management have existed in silos for decades. But cloud adoption and the rise in remote workers have introduced new vulnerabilities, and cybercriminals have noticed. As ransomware, breaches, and credential theft continue to make headlines, one thing is clear: We need to treat all access as privileged access and understand the context — and risk — of that access.

In this session, Chris Owen, Saviynt Director of Product Management, will discuss how identity worlds collide through Saviynt Enterprise Identity Cloud. He will show how this converged platform brings intelligence, visibility, and context together so you can manage the entire identity lifecycle, including governance, privileged access, application access, and third-party access.

Chris Owen, Director of Product Management, Saviynt