Event Recording

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks

Show description
Speaker
Wolfgang Halbartschlager
Sales Engineer EMEA
Illusive Networks
Wolfgang Halbartschlager
Wolfgang is a Senior Technical Sales Engineer with over 15 years of experience as a security engineer and consultant. He is responsible for Illusive Networks’ technical activities and strategy in the DACH region, where he has continued to develop his IT security and thought leadership...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Designing an European Identity Wallet: An overview of UI and UX aspects
May 12, 2022
The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview of how a potential user interface (UI) might look like and will illustrate common challenges when designing customer centric user experience (UX) flows within the wallet. 
Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (II)
May 11, 2022
Event Recording
Advocating for Decentralised Identity in Europe: 7 Lessons Learnt
May 10, 2022
Event Recording
Trends in Enterprise Authentication
May 11, 2022
Event Recording
A Blueprint for Achieving a Passwordless Reality
May 11, 2022

Password-related attacks increased by a staggering 450% in 2020, with over 1.48 billion records breached worldwide. Meanwhile, the average cost of a password reset exceeds $50 USD. We all know that passwords fail to deliver adequate Zero-Trust security and cause unnecessary friction for both customers and the workforce. So why have passwords not receded into the background? What are the key challenges facing enterprise passwordless agendas? And how can modern identity and access management help us realise a blueprint for a passwordless reality? 

Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
May 12, 2022
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
May 13, 2022

You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience, and how we can apply both concepts to our current technology landscape, besides understanding how we can identify the High-Value Target (HVT) in our organization

Event Recording
Demystifying Zero Trust
May 11, 2022

“It’s about the journey, not the destination” they said. “It’s basically just Don’t Trust But Check, what’s the real difference?” they said. “ What’s the big deal?” They said.

Zero trust has been the panacea to everyone’s security problems, for a really long time now, and yet we are still talking about it, and not just doing it. It’s no surprise that there is a certain level of cynicism then that zero trust was all marketing and no trousers.

If 2021 brought us anything though, it was finally some clarity that zero trust really does have a role to play in the enterprise, just not by itself. Various vendors and enterprises have finally conceded that while it is important, it is just one part of the puzzle to help organisations manage their ever changing, digitally transformed, hybrid working, flexible, work from home environments.

Everything changed with zero trust, and now it is actually helping us to change again. In this talk, learn from;

Where zero trust came from, and where it is now
What the new working paradigm means for CISOs…
… and how zero trust environments and working models can help, not hinder, even without a final destination

Event Recording
Trimming down User Access Governance to its Essentials
May 12, 2022

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.

In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.

In this space, Elimity tries to break the status quo. As an innovator, Elimity provides a data-driven platform that specifically offers the essentials for user access governance: automated data collection, holistic risk analytics and user-friendly access reviews integrated with ITSM. As a result, the platform lets companies achieve mature access governance in a matter of days, not months.

In this session, Maarten will give an overview of the essentials of user access governance, showcase the Elimity platform and how it is successfully applied in practice.

Event Recording
Panel | B2B IAM
May 12, 2022
Event Recording
The Importance of a Centralized Access Management System
May 11, 2022
Event Recording
Protocol Independent Data Standards for Interoperability
May 12, 2022