Event Recording

Proactive and Polymorphic Adaptation of Multi-Cloud Deployments

Show description
Speakers
Alicja Reniewicz
Team Leader
7bulls.com
Alicja Reniewicz
Alicja Reniewicz is a technical leader of the MELODIC development team and full stack developer (in technologies related to web applications: Java, Spring, Angular), code integration and maintenance, use of cloud services also in programming. Alicja is presenting the MELODIC platform in various...
View profile
Paweł Skrzypek
Chief Architect
7bulls.com Sp. z o.o.
Paweł Skrzypek
Paweł Skrzypek is a highly experienced architect of ICT systems, with extensive knowledge of machine learning and Big Data solutions. Chief Multi-Cloud architect, working on http://www.melodic.cloud project and other Cloud Computing projects, focusing on multi-cloud and serverless...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
Security and Anti fraudsters CIAM strategy for next years
Sep 14, 2021

In this lecture I present a reference architecture covering CIAM, API and PAM thinking about closing the main attack possibilities in modern contexts

  • Reference architecture validated covering CIAM, PAM and API
  • How to decrease frauds
  • How to increase the user experience with security
Alfredo Luiz dos Santos Junior, Senior IAM Architect, Farfetch
Event Recording
Identity Management as a Service - What it is and How to Build One
Sep 14, 2021

I considered myself quite an experienced programmer and having some expertise in Identity management when I was hired by Swedbank to work as full time Identity engineer. Besides projects, I had assignment to describe an architecture of the IAM as a service from my manager. Honestly, I had no clue about how to envision it. I tried to assemble standards and squeeze something out from practices and papers. But these were not really all my ideas and I did not feel much confident. But something started to happen in few last years when we had a very hard time implementing our IAM project (believe or not, it was successful). We had to answer hundred times to questions "why", "what" and "how". And finally the blueprint of the architecture of IAM as a service appeared from the mist. It is not one and only, because same size does not fit for all. Still, I do not agree that there are indefinite number of possible solutions. I think similar enterprises and engineers may find this presentation useful to draw their own blueprints.

IAM projects start usually from implementing baseline IAM processes - joiners, leavers, movers. Because this is what is usually most needed. But then you will get asked for more - identity data, events, other services. This is what makes up IAM as a service.

Neeme Vool, Software Engineer, Swedbank
Event Recording
Digital Onboarding Game Change: Face Verification and Liveness Detection
Sep 15, 2021

2020 will be eternally known as “The Year of COVID.” It will also be known as the year remote digital onboarding was near instantaneously transformed from a strategic, forward-thinking business development objective to an urgent, mission critical business priority. This has accelerated the adoption of biometric face recognition and liveness detection to create secure, trusted, and frictionless onboarding experiences.

The market landscape is being shaped by a range of innovators. From biometric face recognition and liveness technology providers to targeted digital onboarding and identity verification platforms, to the identity BIG THREE: IDEMIA, NEC, and Thales; everyone wants in. The market is heating up as the stakes couldn't be higher.

Using Acuity’s proprietary Constellation market landscape model as context, the current state of play will be evaluated in terms of the key market sectors, drivers, challenges, and opportunities for real world problem solving and disruptive innovation.

C. Maxine Most, Principal, Acuity Market Intelligence
Event Recording
Case Study: How an Entire Industry adopts Digital Enterprise Identity
Sep 15, 2021

Back in November 2013 the U.S. congress enacted the Drug Supply Chain Security Act (DSCSA). Part of the regulation is that actors within the U.S. pharmaceutical industry must verify the U.S. state license, which is issued by the U.S. Drug Enforcement Administration (DEA), status (and thus the authenticity) of every trading partner within their supply chain. And this does not stop just by direct trading partners a pharmaceutical supply chain actor might have, the regulation states, that also indirect trading partner’s U.S. state license status must be proofed.

Dr. Carsten Stöcker, Co-founder and CEO, Spherity
Event Recording
Introducing ESSIF-LAB - The European Self-Sovereign Identity Framework Lab
Sep 14, 2021
Drs. Jacoba C. Sieders, Member Of The Board Of Advisors, EU SSIF-lab
Event Recording
How can Decentralized Identities reshape the Future of eCommerce?
Sep 15, 2021
Dr. Michele Nati, Head of Telco and Infrastructure Development, IOTA Foundation
Event Recording
Panel | The State of Decentralized Identity - World Stage
Sep 14, 2021

 

Raj Hegde, Project Manager, KuppingerCole
Dr. Michele Nati, Head of Telco and Infrastructure Development, IOTA Foundation
John Phillips, Partner, 460degrees
Event Recording
From a Business Centric Consent Management Paradigm to a User Centric One
Sep 14, 2021

I today's digital world (post EU DMA, DSA, DGA regulation proposals (now tabled in EU Parliament for legislative approval by 2023), GAIAx birth in Europe and eprivacy new regulations adoption, the hard line separation between personal and non personal data is blurring and companies have yet understood what this means for them. While they thought that only personal data needed to be consented, now it's all the data that need the consent log prof for each digital identity they get associated to. Europeans have also created a new "notion" of cloud (GaiaX). A cloud where data can circulate freely, can be shared and mutualised (upon consent). This will have implications. Huge implications as GaiaX carries the option to "import/acquire" data also originated from other entities (including from outside Europe). The transfer mechanism will only be possible upon user express consent, voluntarily. User will need to be incentivised to agree to share. Since transfer can only be performed by users, and with consent, that will in fact open up to a secondary data market which sees the consent log representing a "transaction event'. Hence privacy will exit the framework compliance to enter the framework of "strategy and business development'. The contextual "data" hunt can begin (vs big data paradigm which fades aways). The de-monopolisation of consumer data, too.

Insights in how the new european digital policy opens to new business (data driven) opportunities;

Explanation of what market what solutions are available (commercial) to deploy (large or small companies, pubic sector, etc) to meet this important shift in data monetization strategies

Get access to information about partnerships/research projects linked to data portability implementation

Isabella de Michelis di Slonghello, CEO and founder, ErnieApp
Event Recording
The Next Frontier: Why Decentralised Identity is only Base Camp
Sep 14, 2021

Over the past decade significant advancements have been made towards decentralised, self-sovereign and tokenised identity. Now that we can tokenise a unique value what is the new value we can enable?

Katryna Dow, CEO & Founder, Meeco
Event Recording
The Rise of An Identity-Native Web 3.0 World
Sep 15, 2021

Identity is a fundamental element in the traditional world to associate information to the same individuals. As we leave more and more digital footprints in the world of Internet, these information are giving birth to our digital profiles, raising issues of privacy protection, monetization of data, identity theft and more. While in this presentation, we revisit the manifestation and formation of identity in the incoming world of Web 3.0, and discover how the native citizens of Web 3.0 are forming their own identities and reputations with native behavior data that are distributed, interoperable, and self-sovereign.

Gloria Wu, Chief of Ecosystem Partnerships, Ontology
Event Recording
PAM 101
Sep 15, 2021
Paul Fisher, Senior Analyst, KuppingerCole
Event Recording
Panel | The Modern Approach to Identity Governance
Sep 15, 2021

What if we took the traditional way of thinking of Identity Governance and reversed it completely? Putting together a successful IGA program has commonly been a long haul,

A headache,

A mess,

A budget destroyer,

And an expectation disappointer.

There is a new way. Some call us crazy and some say its impossible. However, those who have experienced the new way call us visionaries. We have been presenting a modern ideology and process for IGA that drastically reduces the time to value, the total cost of ownership, and the economic impact of an Identity Governance Solution.

This panel will focus on strategic order of operations, calculating the economic return of the modern approach, how to optimize AI/ML in Identity Governance, and the ways simplicity expediates the path to stronger compliance and security postures.

Austin Baker, Director of Sales, SecurEnds
Gal Helemski, Co-Founder & CIPO, PlainID
Fabian Süß, Project Manager, KuppingerCole