Event Recording

The Changing Landscape of Consumer Identities

Show description
Speaker
John Tolbert
Lead Analyst
KuppingerCole
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...
View profile
Playlist
European Identity and Cloud Conference 2021
Event Recording
One PAM - A Holistic Approach to PAM for the Shift to a Zero Trust Model
Sep 14, 2021

Join Peter Dulay, Symantec Identity Management Adoption Advisor, Broadcom, as he introduces One PAM, which brings together traditional proxy-based (credential vaulting) with agent-based (granular access controls) capabilities into one consolidated solution and approach, and how One PAM is better positioned to help customers shift to a Zero Trust model.  

Peter Dulay, Security & Integration Adoption Advisor, Broadcom
Event Recording
From Day One to Hour One: IGA in the Era of Extreme Automation
Sep 15, 2021

Cloud capabilities are driving automation approaches that will upend traditional, linear templates for Identity Governance service delivery. This extends to everything from application/service on-boarding, provisioning and user lifecycle management workflows. In this session, Manoj will share his experience of working on automation approaches for cloud workloads and discuss what this means for the future of IGA in the era of continuous integration and delivery.

Suganya Balan, Manager – Privileged Access Management, Philip Morris International
Manoj Kumar, Director, Identity and Access Management, Philip Morris International
Event Recording
Data Privacy
Sep 14, 2021

Do people really care about data privacy?

Jason Smith, Chief Commercial Officer, Meeco
Event Recording
Evolution of User Centricity in Customer IAM
Sep 14, 2021

The transformation of the IAM landscape of a Multi Service Provider is taking shape.

Rolf Hausammann, Head of Identity and Access Management, Swisscom
Event Recording
How Denmark is Building the Cyberprotection Bridge Between the Private and Public Sectors: The National Danish Cybersecurity Council
Sep 15, 2021

Denmark is among the most digitaized countries in the world and as the digitarization strategy moves forward, it is necessary to improve and enhance the nation's overall cyberprotection. In 2019, the Government appointed a new 20-member national Cybersecurity Council for the period of two years. The council’s role is to advise the government on new initiatives that can support both the private and public sectors by improving resillience and better cyberprotection; contribute to knowledge sharing, advisories and guidance on the strategic level; and look into the need for cyber security competences and suggest measures to further develop these, both among private citizens and employees, as well as within education and research.

In this session, you will get a view into the midway status of the work of the Council, and will learn which initiatives work and which need more effort. The Council has been advising the healthcare authorities on the Danish COVID-19 app, and has been discussing the SolarWinds hack and the upcoming vaccination passport.

Bjarke Alling, Chair, National Danish Cybersecurity Council
Event Recording
Trust as the Key Concept in Future Mobility
Sep 14, 2021

The Internet and consequently the Internet of Things were built without a trust layer. Decentralized Digital Identities as basis for Connected Mobility may be one of the needed missing components to implement real data sovereignty and a trusted Economy of Things in future Connected Vehicles scenarios.

Peter Busch, Product Owner Distributed Ledger Technologies Mobility, Robert Bosch Group
Event Recording
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Sep 14, 2021

There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

Richard Archdeacon, Advisory CISO, Duo Security
Event Recording
Panel | Is Traditional MFA the Right Solution in a Post-COVID World?
Sep 14, 2021

The hybrid mix of remote and office work combined with digital transformation initiatives is driving the rapid adoption of cloud. This trend is also prompting organizations to rethink requirements for authenticating employees and other members of an organization supply chain. Companies are now exploring how to significantly improve both security and the end user experience. Unfortunately traditional multi-factor authentication is lacking in both areas. 

Joni Brennan, President, Digital ID & Authentication Council of Canada
Martin Kuppinger, Principal Analyst, KuppingerCole
Patrick McBride, Chief Marketing Officer, Beyond Identity
Andrew Shikiar, Executive Director and Chief Marketing Officer, FIDO Alliance

 

Discussion topics include:

  • How is the post COVID era changing the security and identity / access management landscape?
  • Should traditional MFA still be the “go to”?
  • What new requirements have emerged and why?
  • What approaches are advanced customers adopting?
  • What is the difference between Traditional MFA and newer options?
  • Is device trust important?  Why or why not?
  • What is the role of continuous, risk-based authentication?
Event Recording
Proactive and Polymorphic Adaptation of Multi-Cloud Deployments
Sep 15, 2021

During the last couple of years, hybrid and multi-cloud solutions are becoming very popular. With the emerging cloud options, modern enterprises increasingly rely on hybrid cloud solutions to meet their computational demands by acquiring additional resources from public clouds dynamically as per their needs.

Alicja Reniewicz, Team Leader, 7bulls.com
Paweł Skrzypek, Chief Architect, 7bulls.com Sp. z o.o.
Event Recording
Hybrid cloud enablement: use cases, challenges, best practices
Sep 15, 2021

Cloud computing has become commonplace in recent years, it is almost inevitable for small to medium sized companies to leverage cloud services largely if not fully. However, it is not easy to run cloud enablement project in bigger and yet most importantly traditional companies, where there are hundreds of legacy applications, which expect data to be closer to the computing units, and which are dependent on bandwidth and reliable network availability. In this presentation, I am going to address cloud migration requirements, usual challenges, and lessons learnt and best practices from project management, security and service management point of view.

Paraj Sharma, Program Manager, Global IT-Infrastructure Services, Thyssenkrupp Industrial Solutions AG
Event Recording
Using Identity in a Zero Trust Architecture
Sep 14, 2021

Zero trust requires an enterprise to identify and monitor all the network identities used in the enterprise. NIST SP 800-207 refers to a zero trust deployment pattern called “enhanced identity governance”. The National Cybersecurity Center of Excellence (NCCoE) has a project on implementing a zero trust architecture that will include enhanced identity governance. This talk will be an overview of the role of network identities in zero trust and the current status of the NCCoE project.

Scott Rose, Computer Scientist, National Institute of Standards and Technology (NIST)
Event Recording
European Identity & Cloud Awards Ceremony 2021
Sep 14, 2021