Event Recording

What are the benefits of handling external users in IGA?

Show description
Speaker
Lauri Reunamäki
Partner, Business Operations
Lempinen & Partners
Lauri Reunamäki
Lauri is responsible for identity and access management business operations at Lempinen & Partners. He has 22 years of experience in global IT environments including challenging identity and access topics. He has participated in IGA development as well as customer implementation projects....
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Evolution of User Centricity in Customer IAM
Sep 14, 2021

The transformation of the IAM landscape of a Multi Service Provider is taking shape.

Rolf Hausammann, Head of Identity and Access Management, Swisscom
Event Recording
EIC 2021 - Keynotes & Workshops
Sep 19, 2021
Event Recording
Why We Need Guardianship in the Digital World, and How We Might Approach Delivering Guardianship Using Verifiable Credentials
Sep 14, 2021

 

Guardianship is a condition of life in human societies. When we are young we may be looked after by parents until we become adults. When we are adults we on occasions need others to look after us, and sometimes we may need increasing levels of care as we age.
In our physical world, we may recognise a guardianship role between parents and children and within families, and we may have more or less sophisticated laws to recognise instances where someone needs to take care of another for medical, financial or other needs.
While the concept of Guardianship is reasonably well developed and understood in our physical lives, it is scarcely considered in our digital lives. Very few (if any) considerations are made for the possibility that someone may need another to look after their affairs online. Without this consideration, we resort to poor approaches such as where a Guardian needs to "log in" as the dependent, without the visibility of the service provider, or has to prove their Guardianship status to a service provider who is physically remote and often in a different legal jurisdiction.
In late 2019, the Sovrin Task Force on Guardianship wrote a white paper on Guardianship considering these issues against two specific use cases: a child refugee and an adult living with dementia. A Working Group was established at the beginning of 2020 to develop these ideas further within the context of Trust over IP and has produced two key documents: an Implementation Guide to Guardianship using Verifiable Credentials, and a Technical Requirements document for Guardianship using Verifiable Credentials.
I would like to present these new pieces of work and, hopefully, engage in a discussion on guardianship in the digital world.
**Please note that this work was created by a team working with the not-for-profit Sovrin Organisation and is provided on a Creative Commons BY SA 4.0 Licence**

John Phillips, Partner, 460degrees
Event Recording
Panel | Is Traditional MFA the Right Solution in a Post-COVID World?
Sep 14, 2021

The hybrid mix of remote and office work combined with digital transformation initiatives is driving the rapid adoption of cloud. This trend is also prompting organizations to rethink requirements for authenticating employees and other members of an organization supply chain. Companies are now exploring how to significantly improve both security and the end user experience. Unfortunately traditional multi-factor authentication is lacking in both areas. 

Joni Brennan, President, Digital ID & Authentication Council of Canada
Martin Kuppinger, Principal Analyst, KuppingerCole
Patrick McBride, Chief Marketing Officer, Beyond Identity
Andrew Shikiar, Executive Director and Chief Marketing Officer, FIDO Alliance

 

Discussion topics include:

  • How is the post COVID era changing the security and identity / access management landscape?
  • Should traditional MFA still be the “go to”?
  • What new requirements have emerged and why?
  • What approaches are advanced customers adopting?
  • What is the difference between Traditional MFA and newer options?
  • Is device trust important?  Why or why not?
  • What is the role of continuous, risk-based authentication?
Event Recording
Panel | Best Practices to integrate AI in Identity Access
Sep 14, 2021
Anne Bailey, Analyst, KuppingerCole
Fabrice Gürmann, Data & AI Specialist, Microsoft
Tobias Oberrauch, Senior AI Consultant // Leader Group at Baden-Württemberg, CGI // AI PIONEERS // German AI Association
Event Recording
Goodbye Dogmatism / Hellō Pragmatism
Sep 14, 2021

Disciples of decentralized identity have preached for years that DIDs are the only true path to giving users control over their identity, AKA self sovereign identity. The lack of widespread adoption is evidence that a more pragmatic approach is needed.

Event Recording
FIDO for Developers - How Developers Can Master FIDO and Passwordless Authentication Without Adding Unnecessary Complexity.
Sep 14, 2021

The paradox of simplicity is that making things simpler is hard work. - Bill Jensen

 Building strong passwordless authentication from scratch can be very time-consuming. Integrating the necessary infrastructure into a typical password-centric identity code base increases code complexity exponentially. Taking into consideration that well-known user flows have to be changed and enhanced with new authentication options may also pose significant challenges for developers. They have to get it right - and make it as simple as possible for the end user.

 In this talk, we highlight possible pitfalls and necessary considerations when implementing passwordless FIDO and WebAuthn protocols. You will recognize how a cloud-native approach can simplify the integration of passwordless authentication and smoothen the requirements for developers and product owners of any online service. You’ll also learn how to gradually migrate existing users to the new authentication methods in a frictionless manner.

Join us to explore three possible abstraction layers we’ve identified to take the complexity away when dealing with FIDO and passwordless multi-factor authentication. Ranging from utilizing a managed FIDO API and SDKs up to a fully-fledged passwordless-native identity provider that can be integrated with OpenID Connect. We also will share some secrets on useful extensions of the FIDO standards we’ve identified when building our passwordless user experiences.

 Felix Magedanz, founder and CEO, Hanko.io

Event Recording
How to Thrive in an Accelerated Access management world
Sep 14, 2021

Research from 2020 has shown a phonemonal growth in the access management market.

The pandemic, for all its impact, has enabled organisations to re-evaluate their working strategies and practices. But at what cost? Cybercrime on corporate applications has risen exponentially from the dispersed workforce and rapid cloud adoption has left organisations vulnerable to ransomware, malicious activity and internal subterfuge.

Danna Bethlehem, Director Product Marketing Authentication at Thales discusses how organisations can accelerate their business with the right approach to their IAM strategy. For 2021 and beyond, enterprises need to leave survival mode behind and adopt a drive to thrive.

Drawing on recently released research into the EMEA IAM market, she will highlight:

  • How demands of the corporate workforce for dispersed working is bringing IAM security concerns to the fore
  • How the next generational approach to IAM can enable forward thinking organisations to thrive
  • How enterprises can build an effective IAM strategy to drive their growth
Danna Bethlehem, Director Product Marketing IAM, Thales Cloud Protection & Licensing
Event Recording
Multi-Cloud Multi-Hybrid IT: How to Make your Digital Business Fly
Sep 13, 2021

IT has changed fundamentally in the past years. Multi-cloud environments mixed with private clouds and on-premises infrastructures (multi-hybrid) are the new normal.
The high pace in transformation, modernization, and innovation required for success in the digital age requires these environments to work smooth and secure.
In his talk, Martin Kuppinger will discuss where and how IT, IT Security, and IAM need to evolve to make the digital business fly.

Event Recording
Introducing ESSIF-LAB - The European Self-Sovereign Identity Framework Lab
Sep 14, 2021
Drs. Jacoba C. Sieders, Member Of The Board Of Advisors, EU SSIF-lab
Event Recording
Driving Business Value in the Enterprise with Zero Trust
Sep 14, 2021

With the merger of AOL+Yahoo, the newly formed Enterprise Identity team had the challenges of planning to support the cloud-first future of the new company Oath (which would become Verizon Media), building a new Identity ecosystem with Zero-Trust methodologies, and supporting a security-minded culture.

Bryan Meister, Senior Principal Architect, Yahoo
Event Recording
Identity Management as a Service - What it is and How to Build One
Sep 14, 2021

I considered myself quite an experienced programmer and having some expertise in Identity management when I was hired by Swedbank to work as full time Identity engineer. Besides projects, I had assignment to describe an architecture of the IAM as a service from my manager. Honestly, I had no clue about how to envision it. I tried to assemble standards and squeeze something out from practices and papers. But these were not really all my ideas and I did not feel much confident. But something started to happen in few last years when we had a very hard time implementing our IAM project (believe or not, it was successful). We had to answer hundred times to questions "why", "what" and "how". And finally the blueprint of the architecture of IAM as a service appeared from the mist. It is not one and only, because same size does not fit for all. Still, I do not agree that there are indefinite number of possible solutions. I think similar enterprises and engineers may find this presentation useful to draw their own blueprints.

IAM projects start usually from implementing baseline IAM processes - joiners, leavers, movers. Because this is what is usually most needed. But then you will get asked for more - identity data, events, other services. This is what makes up IAM as a service.

Neeme Vool, Software Engineer, Swedbank