Event Recording

A Story About Convenient Security

Speaker
Jochen Koehler
Vice President Continental Europe
HYPR Corp.
Jochen Koehler
Jochen Koehler is Vice President Continental Europe at HYPR where he is responsible for all aspects of the Go To Market activities. Jochen previously served as Sales Director Security Solutions Europe at HP Wolf Security after their acquisition of Bromium Inc where he had built the Central...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
There is No Consensus About Consent
May 12, 2022

 

Event Recording
Panel | CIAM and Customer Data Platforms
May 12, 2022
Event Recording
Privacy Enhancing Mobile Credentials
May 12, 2022

The Kantara Initiative is developing a standard and requirements so that organizations can demonstrate to their stakeholders that their commitments to privacy and data protection go beyond transactional and technical trust. At the end of the day people trust, or don't trust, organizations - not the technologies that the organizations use. This session will provide you with an up-to-date report on the development of these standards and requirements and also provide you with an opportunity to provide input into their development.

Event Recording
Pre-Conference Workshop | The IAM Experience Your Users Really Deserve
May 10, 2022

Organisations that are being targeted by SaaS and B2B companies might struggle when it comes to building a smooth and quick process of authentication for their users. Issues with business needs, such as user organisation within a specific target business, separate branding, access control and SSO are spreading like wildfire. Therefore, some of these processes could overwhelm your IT-team with unnecessary burdens, such as building an application entirely from scratch reducing significantly the time dedicated to the design and improvement of the app itself.

Join us in this hands-on workshop where you will be able to experience firsthand the challenges we have had in the past and how Auth0’s capabilities and features have contributed to create resilient, secure and exciting B2B applications powered by your IAM system. Learn more about:

  • Why and how you could set up Auth0 efficiently
  • All the possibilities you have to customise your login form and its flow for an unforgettable user experience
  • Enabling B2B authentication without any kind of issue.

Take this chance to meet with our Auth0’s expert that will take some time to address your challenges and questions. See you there!

Event Recording
Progress and lessons on the establishment of Digital Identity in UK
May 12, 2022
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
May 12, 2022
Event Recording
Zero Trust at Siemens: Where the impossible and the doable shake hands
May 11, 2022

Two years ago, Siemens started a still going on process to change its security architecture to Zero Trust. Not an easy task for a company that big, widespread, and divers in products.

In this session program leads Thomas Müller-Lynch and Peter Stoll are talking about what they mean when talking about Zero Trust at Siemens, what everyone can learn from the approach Siemens is taking, and what they are planning as their next steps.

Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
May 13, 2022
Event Recording
Reducing the Species in your Cybersecurity Zoo
May 13, 2022
Event Recording
The State of Passwordless Authentication
May 11, 2022

The FIDO Alliance has made tremendous strides in its mission to change the nature of authentication with stronger, simpler and passwordless authentication. Join this session to get find out the state of passwordless authentication from the FIDO lens, including a sneak peak at major news that will – finally - make passwordless FIDO authentication available to the masses.

Event Recording
OT Patch Management Best Practices
May 13, 2022
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
May 13, 2022

You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience, and how we can apply both concepts to our current technology landscape, besides understanding how we can identify the High-Value Target (HVT) in our organization