Event Recording

IGA in the Financial Industry - Implementing IAM

Show description
Speaker
Mark Fodor
Specialist Identity & Access Management
Interhyp AG
Mark Fodor
Mark is an Identity and Access Management Specialist for Interhyp based in Munich, Germany. He has been working in the financial industry for the last 4 years and was previously involved in several aspects of Identity and Access Management, like IAM Project Management, designing workflows that...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
May 12, 2022
Event Recording
Identity Management in a Web 3.0 World
May 12, 2022

The third iteration of the Web, Web 3, aims to put more control over web content in users’ hands. It promises to be built on blockchain, eliminating all big intermediaries, including centralized governing bodies. The vision for a Web3 world is for people to control their own data and be able to bounce around from social media to email to shopping using a single personalized account, creating a public record on the blockchain of all of that activity. What does this mean from an identity management point of view? We will explore some important questions that should be addressed as the future of the internet unfolds, including the impact that limited oversight in crypto currency will have, including poor authentication; the role of decentralized identities and private key management; and finally, the privacy aspects of having transaction data on the blockchain and what that means for attackers that can potentially compile new identities or further identity theft as we know it today. Whether it is Web3 or beyond, these issues will be critical to build trust on the internet of the future.

Event Recording
It's the Relationship, Stupid
May 10, 2022
Event Recording
The Role of Identity & Access Management for Ransomware Resilience
May 11, 2022
Event Recording
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
May 13, 2022
Event Recording
CISO Panel | Securing the Composable Enterprise
May 10, 2022

As if it all came together on the foundations of an agile, fully decentralized enterprise, embracing the API economy to deliver results through assembling and combining pre-packaged business capabilities. AI-driven, automated, everything delivered on-demand, providing the best possible user experience, and all that at an unprecedented pace that keeps us ahead of the ever-increasing speed of change: The composable enterprise.

But wait – less than a third of businesses that we at KuppingerCole have asked recently, say that they have processes, staff, structures, skills, and cybersecurity implemented in a way that they feel adequately prepared for what analysts may soon call the age of the composable enterprise. In this CISO panel session, we will try to look into the future of Cybersecurity, without losing sight of today´s threats and ways to continue building cyber resilience in a time of so many unknowns. Welcome to the EIC 2022 CISO Plenary Panel.

Event Recording
Demystifying CIEM for an Effective Multi-Cloud Security Enablement
May 11, 2022

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools aren't natively designed to manage cloud infrastructure entitlements and therefore can't be easily re-purposed to discover and remediate excessive cloud permissions across multiple IaaS and PaaS platforms. The confusion arising from un-identically structured CSPs and misaligned cloud terminology is further aggravated by the quest of IAM, PAM and Cloud Security providers to enter CIEM space and capture market share.

In this session, we will focus on how the CIEM market has been evolving over the last few years to manage the critical cloud security gaps left unaddressed by CSPM (Cloud Security Posture Management) and CWP (Cloud Workload Protection) tools, and how CIEM complements these tools to offer a wholistic cloud security advantage. We will also discuss how CIEM addresses some of the most critical security tenets of your organization's cloud adoption program and future planning.

As for the key takeaways of this session, you will be able to understand and articulate:

  1. When and where does CIEM fit in your overall cloud security and access governance strategy?
  2. What are the critical capabilities of CIEM to help evaluate the right CIEM product for your multi-cloud environment?
  3. What are industry best practices for implementing and operationalizing CIEM for your cloud security and achieving faster ROI?
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
May 13, 2022
Event Recording
Key Requirements for Next Generation MFA
May 11, 2022

In this talk you will learn how MFA can be a foundation for your Zero Trust Initiative

Event Recording
Drivers for Identity & Access Management in the Financial Industries
May 12, 2022

Identity & Access Management is a key requirement from banning regulations.

At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the new solutions are presented in this talk.

Event Recording
Digital Identity and Privacy: Stories from the Frontline
May 10, 2022

As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a daunting task. Enterprise data is hosted in multi-tenant cloud, managed service providers and distributed data center environments. How an organization can maintain data privacy in this evolving IT access control use-cases depends on the level of preparedness to protect and monitor those digital identities. An identity and access management solution provides adequate safeguards to enforce IT practices necessary to maintain data privacy.

Event Recording
Panel | The Stack, the Stack, the Stack: How Trust over IP is Enabling Internet-Scale Digital Trust
May 11, 2022

The internet was designed without a trusted identity layer to connect physical entities to the digital world. This layer is now emerging in the form of decentralized digital identity systems (aka self-sovereign identity or “SSI”) based on digital wallets and digital credentials. What industry insiders have demanded for long is becoming reality. This is bringing challenges to the forefront including resistance of the identity establishment and major questions about interoperability between emerging and existing identity systems.

The Trust over IP Foundation was founded by a pan-industry group of leading organizations with a mission to provide a robust, common standard and complete architecture for internet-scale digital trust. In this session, leaders in digital identity from the ToIP Steering Committee will outline the impact this missing layer has had on digitization of trusted interactions, why technology alone won’t solve this and how the ToIP stack is designed to tackle both technology and human governance to bring open and interoperable standards at each layer of the trust architecture. This interactive panel will be moderated by ToIP’s Director of Strategic Engagement and will explore the views of its member organizations for a lively and engaging debate on how we finally establish trust in the digital age.