Event Recording

Using Identity in a Zero Trust Architecture

Show description
Speaker
Scott Rose
Computer Scientist
National Institute of Standards and Technology (NIST)
Scott Rose
Scott Rose works as a computer scientist at the National Institute for Standards and Technology (NIST).  Scott works on Internet infrastructure protection research and Internet protocol research. Scott is the editor of several IETF network protocol specifications and the author of several...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Secrets in the Clouds: The Journey of Digital Vaults to Cloud
Sep 15, 2021

When we traditionally think of vaults, we expect them to be in the close vicinity of a user. In our rapidly digitising world, the nature of such vaults have transformed as well. Data *(or Password, whichever word you think is correct)* vaults which are expected to be located on premises are now digital, making ownership of these vaults and access to these vaults critical functions for an organisation. The Cloud hosts a lot of secrets and this journey of vaults becoming digital and part of Cloud Environments is nothing but fascinating.

Anil Bhandari, Chief Mentor & Thought Leader, ARCON TechSolutions
Event Recording
Using Hypermedia to Adapt Client-side Login to Go Beyond Passwords
Sep 14, 2021

There are various ways that client applications may need to log in when going beyond passwords. With a username and password, client development is easy -- just collect a couple of inputs from the user and match them on the server. When going beyond these though, how can client applications be deployed and maintained in a way that the server still dictates what the client should present and obtain from the user when authenticating them?

Travis Spencer, CEO, Curity
Event Recording
In-house OAuth/OIDC infrastructure as a competitive advantage
Sep 15, 2021

Leading service providers have started developing their software in-house to achieve competitive business advantages.

Event Recording
The human factor in Cyber Security - Creating a cyber aware culture
Sep 14, 2021
Alex Weishaupt, Practice Lead Cyber Security, Morgan Philips
Event Recording
"That’s Not Fair!": Detecting Algorithmic Bias with Open-Source Tools
Sep 15, 2021

The harm that the misuse of AI/ML can have is obvious, from the ProPublica Recidivism piece from 2016 to the latest discovery of bias in facial recognition classifiers by Joy Buolamwini.

 

The need for tools to use AI/ML ethically is concentrated in two particular areas: transparency and fairness. Transparency involves knowing why an ML system came to the conclusion that it did—something that is essential if we are to identity bias. In some forms of ML, this is difficult. We’ll cover two tools to assist with transparency: LIME and SHAP. We’ll highlight where each of these tools performs well and poorly, and provide recommendations for utilizing them in unison where appropriate.

 

Once transparency is established, we’ll pause to evaluate potential sources of bias that would affect the fairness of a particular algorithm. Here the number of tools available is far-reaching. We’ll start with an explanation of bias metrics, explaining the roles that true/false positives and true/false negatives play in calculating various accuracy metrics. The basics of fairness established, then we will explore various tools used against a few, publicly available sample ML implementations. Tools in this review will include: Aequitas, AIF360, Audit-AI, FairML, Fairness Comparison, Fairness Measures, FairTest, Themis™, and Themis-ML. We’ll compare these tools, providing recommendations on their usage and profiling their strengths and weaknesses.

Mike Kiser, Senior Identity Strategist, SailPoint
Event Recording
Self-Issued OP and OpenID Connect for SSI (OIDC4SSI)
Sep 15, 2021

One crucial component to SSI is end-users being able to interact with verifiers directly, without relying on a third-party provider or having to operate their own hosted infrastructure.

Kristina Yasuda, Identity Standards Architect, Microsoft
Event Recording
EIC 2021 - Impressions
Sep 19, 2021
Event Recording
The #FutureOfMobility is decentralized
Sep 14, 2021

Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation. Ranging from eScooters, bicycles, ride-sharing to car-sharing, ride-hailing and public transport.

Dr. Harry Behrens, Founder and CTO, Power & Mobility Ltd - bloXmove.com
Event Recording
Panel | Identity in the Asia-Pacific - Untangling the Web
Sep 15, 2021

Do you want to launch or expand your identity-related business in the Asia-Pacific region but don’t know where to start?

Linden Dawson, Director, Cybersecurity & Digital Trust, PwC Australia
Allan Foster, Chief Evangelist, ForgeRock
Graham Williamson, Director APAC / Senior Analyst, KuppingerCole
Event Recording
Where Stands the Sovereign Self?
Sep 13, 2021

When thinking about what SSI means for enterprises and providers of services to enterprises, it's easy to forget that SSI is about each of our sovereign selves. This means SSI should give us each a clear sense of independence, agency, and obvious freedom from the old centralized Identity Provider Relying Party model, and the federated one that followed from it. But we aren't there yet. What will it take to get us there—for our sovereign selves, and not just for hot new SSI businesses?

Event Recording
The Next Frontier: Why Decentralised Identity is only Base Camp
Sep 14, 2021

Over the past decade significant advancements have been made towards decentralised, self-sovereign and tokenised identity. Now that we can tokenise a unique value what is the new value we can enable?

Katryna Dow, CEO & Founder, Meeco
Event Recording
WHY ON PREMISE IGA IS THE NEW LEGACY
Sep 15, 2021

In this session Thomas Müller-Martin, Global Technical Lead at Omada will share his insights about the evolving IGA market and why companies today choose an enterprise IGA SAAS platform over an on-premise solution. Learn in this session how to transform your legacy or home-grown solution to a modern IGA solution without the hassle of long and cumbersome implementation and high maintenance costs. Based on best practices, we will demonstrate to you how organizations today can deliver fast value to their business to mitigate risk and increase efficiency. Join this interesting speech by Omada, a global market leader in Identity Governance and Administration (IGA).

Thomas Müller-Martin, Global Technical Lead, Omada