Event Recording

The Changing Cyber Threat Landscape and its impact on IAM (II)

Speakers
Dr. Phillip Messerschmidt
Lead Advisor
KuppingerCole
Dr. Phillip Messerschmidt
Dr. Phillip Messerschmidt joined KuppingerCole in January 2021 as Advisor & Analyst. Prior to this, he worked for various management consultancies, primarily advising major banks on challenges related to the IT security infrastructure topic of identity and access management (IAM). His focus...
View profile
Kumar Ritesh
Founder and CEO
CYFIRMA
Kumar Ritesh
CYFIRMA’s Founder and CEO, Kumar Ritesh, has 2+ decades of global cybersecurity leadership experience across all facets of the cybersecurity industry. He spent the first half of his career as the head of cyber intelligence of a national agency, gaining first-hand cyber threats and risks...
View profile
Dirk Wahlefeld
Head of Presales EMEA & US
CYFIRMA
Dirk Wahlefeld
Dirk Wahlefeld is a proven technology leader, consistently applying his deep technical expertise and prowess to deliver tangible outcomes for partners and customers. Dirk has over two decades of cybersecurity experience and deftly blends his technical know-how with business acumen to help...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Privacy = Data Protection + X
May 13, 2022

Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel we will try to find answers on how we can translate privacy into the (metaverse) future.

Event Recording
Panel | PAM
May 12, 2022
Event Recording
What Ails Enterprise Authorization
May 11, 2022

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access management is the only way in which attackers can be prevented from gaining unwarranted access to enterprise data. Attackers can include both malicious insiders and those using compromised identities. Numerous organizations have suffered significant financial damage as a result of such unwarranted access from legitimately identified users.

Authorization rules in an enterprise can apply to many types of assets: files on a network drive, cloud resources such as virtual machines and storage buckets and enterprise applications and actions within them. Managing authorization across all these assets is complex in and of itself. Most enterprises also use third-party “Software as a Service ' platforms that maintain their own permissions, further complicating enterprises’ efforts to effectively manage authorization.

This talk identifies common causes of "privilege sprawl" in enterprises, and discusses management techniques that can result in "least privilege" permissions to personnel while ensuring no business disruption

Event Recording
Digital Identity and Privacy: Stories from the Frontline
May 10, 2022

As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a daunting task. Enterprise data is hosted in multi-tenant cloud, managed service providers and distributed data center environments. How an organization can maintain data privacy in this evolving IT access control use-cases depends on the level of preparedness to protect and monitor those digital identities. An identity and access management solution provides adequate safeguards to enforce IT practices necessary to maintain data privacy.

Event Recording
Panel | Introducing Open Policy Agent (OPA) for Multicloud Policy and Process Portability
May 11, 2022

With over 120 million downloads, and users like Netflix, Zalando and GS,  the open source project Open Policy Agent has quickly become the de facto standard for Authorization. In this session, KuppingerCole´s Alejandro Leal will discuss with  Jeff Broberg, Gustaf Kaijser and Ward Duchamps on most common use cases where OPA is adopted.  

Event Recording
Panel | B2B IAM
May 12, 2022
Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (I)
May 11, 2022
Event Recording
Progress and lessons on the establishment of Digital Identity in UK
May 12, 2022
Event Recording
Insights from India’s Data Empowerment & Protection Architecture
May 13, 2022
Event Recording
Remote onboarding with Verifiable Credentials
May 12, 2022

Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent adoption across other industry verticals. In this session, the speakers will demonstrate an open standard based approach to ID verification based on verifiable credentials and decentralized identifiers for remote onboarding across industries. With this new approach users can verify their identity once and use their credentials with any organization. Enterprises can leverage this simpler cost-saving approach to remotely onboard employees, partners and customers compliantly while respecting the end users’ privacy.

Event Recording
IAM-Suites for Medium-Sized/Mid-market Organizations
May 11, 2022
Event Recording
SASE vs. Zero Trust: Perfect twins or antagonists?
May 11, 2022

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in prominence.  

As organizations seek to improve their security capabilities, many are evaluating Zero Trust and SASE to determine whether to adopt either, one, or both.  Join this session to understand what each can potentially deliver and the exact nature of the relationship between them.