Event Recording

Panel | Digital Identities and IoT - How to Leverage OIDC and OAuth 2.0 for the Best User Experience and Security! IAM Related Experiences From the Automob

Show description
Speakers
Fulup Ar Foll
Founder and Lead Architect
IoT.bzh
Fulup Ar Foll
Fulup Ar Foll holds a Master in Computer Science from the Military French School ESAT. His career started with ten years of research on embedded operating systems. He then joined the Industry; taking on the technical direction of Wind-River in Europe before moving to Sun-Microsystems where he...
View profile
Andre Priebe
Chief Technology Officer
iC Consult Group GmbH
Andre Priebe
Andre Priebe is Chief Technology Officer of the iC Consult Group, a vendor-independent system integrator specialized in Identity & Access Management with more than 500 employees around the globe. With over 15 years of experience in managing IAM projects focussing on workforce, customer, and...
View profile
Graham Williamson
Fellow Analyst
KuppingerCole
Graham Williamson
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents. He is an Analyst in the areas of...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Picos and Decentralized SSI Agencies
Sep 15, 2021

Picos (persistent compute objects) are an actor-model programming system with long-term persistent state. Each pico also has persistent identity and availability for a cloud-native developer experience. Picos are DIDComm-enabled agents supporting SSI. Consequently, picos are capable of running specialized application protocols for any given workflow in a secure, cryptographic environment. The architecture of picos makes them independent of the runtime they executed on, holding out hope of a decentralized SSI agency. This talk introduces picos, demonstrates their DIDComm capabilities, and presents a roadmap for building a decentralized SSI agency, independent of any particular organization.

Dr. Phil Windley, Enterprise Architect, Brigham Young University
Event Recording
Clouds for all Seasons
Sep 15, 2021

Cloud services have enabled organizations to exploit leading edge technologies without the need for large capital expenditure.  In addition, to survive the COVID pandemic, organizations have had to accelerate their use of these services.  The market for these services is forecast to grow significantly as organizations complete their digital transformation and move, migrate, or modernize their IT systems.  However, according to some estimates only around 4% of enterprise workloads have currently been moved to the public cloud.  The factors limiting this growth are the challenges faced by organizations of managing the security and compliance of this new complex hybrid IT environment.  This presentation will describe how we expect the market for cloud services to evolve and the key changes needed to help organizations to manage these challenges. 

Mike Small, Senior Analyst, KuppingerCole
Event Recording
Panel | Bringing the Global Assured Identity Network (GAIN) to Reality
Sep 15, 2021
Donna Beatty, Digital Identity Industry Expert, Digital Identity
Vittorio Bertocci, Principal Architect, Auth0
Daniel Goldscheider, CEO, yes.com
Don Thibeau, Executive Director, OpenID Foundation
Event Recording
Workshop | Zero Trust & Modern Digital Workplaces
Sep 16, 2021
Event Recording
Trust as the Key Concept in Future Mobility
Sep 14, 2021

The Internet and consequently the Internet of Things were built without a trust layer. Decentralized Digital Identities as basis for Connected Mobility may be one of the needed missing components to implement real data sovereignty and a trusted Economy of Things in future Connected Vehicles scenarios.

Peter Busch, Product Owner Distributed Ledger Technologies Mobility, Robert Bosch Group
Event Recording
Digital Keys and Secrets: When to Manage Them, When to Get Rid of Them
Sep 15, 2021

Hybrid IT environments are full of secrets, like tokens, passwords, certificates and encryption keys that open access to mission-critical information. The emergence of concepts like Zero Trust authentication, Just-in-Time access and Zero Standing Privileges suggests that these access secrets don’t need to be permanent. Instead they can be created on the fly and made to expire automatically, paving way for the future where secrets or passwords no longer need to be managed and vaulted at all.

SSH.COM's CTO, Miikka Sainio, explores how reducing the number of permanent secrets enterprises manage in dynamic environments improves security, operational velocity cost-efficiency. He also discusses why managing and vaulting secrets is still a necessary phase in many cases when companies adopt modern and future-proof methods.

Miikka Sainio, CTO, SSH

Event Recording
EIC 2021 - Venue, Sponsor Booths
Sep 19, 2021
Event Recording
Panel | The Modern Approach to Identity Governance
Sep 15, 2021

What if we took the traditional way of thinking of Identity Governance and reversed it completely? Putting together a successful IGA program has commonly been a long haul,

A headache,

A mess,

A budget destroyer,

And an expectation disappointer.

There is a new way. Some call us crazy and some say its impossible. However, those who have experienced the new way call us visionaries. We have been presenting a modern ideology and process for IGA that drastically reduces the time to value, the total cost of ownership, and the economic impact of an Identity Governance Solution.

This panel will focus on strategic order of operations, calculating the economic return of the modern approach, how to optimize AI/ML in Identity Governance, and the ways simplicity expediates the path to stronger compliance and security postures.

Austin Baker, Director of Sales, SecurEnds
Gal Helemski, Co-Founder & CIPO, PlainID
Fabian Süß, Project Manager, KuppingerCole
Event Recording
Why ‘Zero Trust’ is Driving an Identity Centric Security Strategy
Sep 14, 2021

As organisations continue to adopt and embrace new technology platforms, it also brings with it the requirement to reassess how these new environments are secured. The Assume Breach mindset, a key aspect of a Zero Trust, shifts the risk posture to that of applying defense against the concept that the perimeter has already been breached.

In this session, we run through the Tactics, Techniques, and Procedures used in recent breaches and highlight the commonality across them; identity compromise and privilege elevation. This analysis will highlight the importance of taking an assume breach mindset to defense and that Identity becomes central to this strategy. Further, we will then position recommendations on how to protect against Credential Theft, Lateral Movement, and Privileged Escalation across hybrid and cloud environments

Event Recording
Bad things that Can Happen
Sep 14, 2021

Disclaimer: The speaker at this session has not been involved either directly or indirectly in the work in the aftermath of any of the Ransomware attacks described in this session. All of the information from the cases is based solely on data that is in public domain.

Bjarke Alling, Chair, National Danish Cybersecurity Council
Event Recording
Distributed Identity using the example of a digital vaccination card
Sep 14, 2021

Distributed Identity (DI) is less known to many and even less in connection with the pandemic. The concept that DI delivers is an excellent starting point for creating a digital vaccination record.

Why DI is generally a good idea and what a digital vaccination record based on it can look like, is shown in this lecture. If you want to explain to your family in practical terms what IAM, IGA and PAM do: get vaccinated and (hopefully soon) apply for a digital vaccination certificate!

Ingo Schubert, Global Cloud Identity Architect, SecurID, RSA Security
Event Recording
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Sep 15, 2021
Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic