Event Recording

Malware Manipulated in Cloud Environments - Is it Dangerous?

Show description
Speaker
Filipi Pires
senhasegura PAM & Cloud Security Researcher
senhasegura
Filipi Pires
I’ve been working as Security and Threat Researcher and Cybersecurity Advocate at senhasegura, Founder at Black&White Technology, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate. International Speaker at Security and New technologies events in many...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Meeting Expectations – 5 pillars for IoT project success
Sep 14, 2021

Deployment of IoT installations are accelerating as organisations seek to expand their business by adding IoT functionality to their products/service, or reduce their costs by automating processes. Unfortunately, in many cases these initiatives are not adequately executed and, as a result, do not meet expectations.

In this session we will look at 5 pillars of an IoT deployment: the Device pillar ensures we select the appropriate sensors and actuators, the Control pillar guides our decisions on controller functionality, the Communications pillar ensures we consider which options fit our required functionality and budget, the IT pillar determines the level of integration between our IT and OT environments, and the Security pillar guides our protection strategy.

A holistic approach is a success-indicator for our IoT projects.

Graham Williamson, Director APAC / Senior Analyst, KuppingerCole
Event Recording
WHY ON PREMISE IGA IS THE NEW LEGACY
Sep 15, 2021

In this session Thomas Müller-Martin, Global Technical Lead at Omada will share his insights about the evolving IGA market and why companies today choose an enterprise IGA SAAS platform over an on-premise solution. Learn in this session how to transform your legacy or home-grown solution to a modern IGA solution without the hassle of long and cumbersome implementation and high maintenance costs. Based on best practices, we will demonstrate to you how organizations today can deliver fast value to their business to mitigate risk and increase efficiency. Join this interesting speech by Omada, a global market leader in Identity Governance and Administration (IGA).

Thomas Müller-Martin, Global Technical Lead, Omada
Event Recording
Panel | Bringing the Global Assured Identity Network (GAIN) to Reality
Sep 15, 2021
Donna Beatty, Digital Identity Industry Expert, Digital Identity
Vittorio Bertocci, Principal Architect, Auth0
Daniel Goldscheider, CEO, yes.com
Don Thibeau, Executive Director, OpenID Foundation
Event Recording
Future proofing national eID
Sep 14, 2021

How to future proof a national eID scheme where 13 registered commercial IdPs, 1 government IdP and several brokers operate?

Petteri Ihalainen, Senior Specialist, National Cyber Security Centre, Finland
Event Recording
Continuous ZeroTrust as a Way To Know Your User
Sep 14, 2021

Organisations perceive their users through data. In the world of fewer and fewer opportunities for physical contact, identity verification is going all remote. All online service providers need to model the risks related to user impersonation and user manipulation attacks.
In this talk, we will dig through the classical methods of Knowing Your User through the static data:
Authentication
Coupling the session with the device
Checking the network environment
Next, I will present manipulation methods related to data spoofing to express the business impact. Usual scenarios are primarily associated with rewards in the form of money for the attackers.
Time-series data analysis and the impact on the business and customer experience will be presented to show the way forward in the adaptive risk management context.
Finally, food for thought related to the standardisation of behavioural biometrics that is getting more and more attention as one of the defence methods will be shared to show that we need Zero Trust and a way to verify if and how the vendor products are working.

Static data can be easily spoofed. Dynamic data analysis (mainly in a time series manner) is the way to go.
Data resilience related to side-channel time series data analysis.
Zero Trust is also about not trusting your data sources and all the environment related to it.
Behavioural biometrics strives for standardisation.

Mateusz Chrobok, VP of Innovation, Revelock
Event Recording
Give Me 10 Minutes, I'll Give You The Truth About Identity
Sep 13, 2021

User recognition and authentication is becoming the central element of companies' digitalisation strategy. Not only are user registration and login the first experiences users make, Identity and Access management will ultimately determine which company recognises and serves the needs of its users best and will be successful in the market.

What you can expect

  • A holistic view on identity and access management
  • A forward-looking way of thinking and
  • Progressive software architectures
Event Recording
Decentralized Identity: What's Been Happening and Why it Matters
Sep 15, 2021

Decentralized Identity is seeing a proliferation of activity -- so much that even experts struggle to make sense of it all. Even the names of the emerging specs have gotten wacky (or, technically, WACI...)

Kim Hamilton Duffy, Director, Identity and Standards, Centre Consortium
Event Recording
Introducing BASIS - Addition to Martin Kuppinger's Opening Keynote
Sep 13, 2021
Event Recording
Using Hypermedia to Adapt Client-side Login to Go Beyond Passwords
Sep 14, 2021

There are various ways that client applications may need to log in when going beyond passwords. With a username and password, client development is easy -- just collect a couple of inputs from the user and match them on the server. When going beyond these though, how can client applications be deployed and maintained in a way that the server still dictates what the client should present and obtain from the user when authenticating them?

Travis Spencer, CEO, Curity
Event Recording
DIDComm and the Self-Sovereign Internet
Sep 15, 2021
DIDComm is the messaging protocol implemented in Hyperledger Aries that provides utility for DID-based relationships. Many may think DIDComm is just a way to exchange credentials, but it's more than that. DIDComm is a protocol layer capable of supporting specialized application protocols for any given workflow. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet, a secure internet overlay, that is much more private, enabling, and flexible than the one we've built using Web 2.0 technologies. This talk introduces Autonomic Identity Architectures, describes DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. 
Dr. Phil Windley, Enterprise Architect, Brigham Young University
Event Recording
How Biometric Face Verification Enables Effortless IAM in a Zero Trust Environment
Sep 14, 2021

Now more than ever, the world is operating online. Governments and enterprises need a way of securely verifying an individual’s identity whilst providing an inclusive and positive customer experience. iProov is a world leader in cloud-based face biometric authentication technology. Our Genuine Presence Assurance™ technology, powered by flashmark, ensures that the individual is: the right person, a real person, and also confirms that they are authenticating right now.

Tom Whitney, Global Head of Solutions Consultancy, iProov
Event Recording
Bad things that Can Happen
Sep 14, 2021

Disclaimer: The speaker at this session has not been involved either directly or indirectly in the work in the aftermath of any of the Ransomware attacks described in this session. All of the information from the cases is based solely on data that is in public domain.

Bjarke Alling, Chair, National Danish Cybersecurity Council