Event Recording

Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats

Show description
Speaker
Rohon Kundu
Ph.D. Student
Lund University
Rohon Kundu
Rohon is a Ph.D. student working at the Department of Electrical and Information Technology, Lund University in Sweden. His primary research focus lies in analyzing the security aspects of various blockchain protocols that offer decentralized cloud storage like Filecoin and Storj. He is also...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Solving "The Right to be Forgotten" for Blockchains
May 13, 2022

"The Right to be Forgotten" presents a conundrum to builders of blockchain solutions, because the focus of most blockchains is to create an indelible, permanent record. This makes "The Right to be Forgotten" appear irreconcilable with blockchains. I will present a solution to "The Right to be Forgotten" that can be applied to most every blockchain, subject to governance approval by the stakeholders. The solution does not violate the integrity of the blockchain record.

Event Recording
Panel | PAM
May 12, 2022
Event Recording
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
May 11, 2022
Event Recording
What Ails Enterprise Authorization
May 11, 2022

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access management is the only way in which attackers can be prevented from gaining unwarranted access to enterprise data. Attackers can include both malicious insiders and those using compromised identities. Numerous organizations have suffered significant financial damage as a result of such unwarranted access from legitimately identified users.

Authorization rules in an enterprise can apply to many types of assets: files on a network drive, cloud resources such as virtual machines and storage buckets and enterprise applications and actions within them. Managing authorization across all these assets is complex in and of itself. Most enterprises also use third-party “Software as a Service ' platforms that maintain their own permissions, further complicating enterprises’ efforts to effectively manage authorization.

This talk identifies common causes of "privilege sprawl" in enterprises, and discusses management techniques that can result in "least privilege" permissions to personnel while ensuring no business disruption

Event Recording
Cyber Security Architectures in a Hybrid World
May 12, 2022

A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after all cloud services are adding another dimension of complexity. We will take a short look at the security basics, compare some outdated, updated and up-to-date security models finding suitable models for IT-security, OT-security and cloud-security. Finally we will put it all together in combined scenarios. This presentation will focus on practical security architecture rather than on formal compliance.

 

Key Topics:

* IT-security, OT-security, cloud-security

* Cyber security: from basics, perimeter, air gap to zero trust

* Hybrid world: isolation or integration

* Tops and flops in practical cyber security

Event Recording
Panel | Turning (Distributed) Workforce Challenges into Productivity Gains
May 12, 2022

Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 

Event Recording
Identity. Security. Decentralized. The Future of IT in the Age of Change
May 10, 2022

The future of the enterprise is changing. In the Digital Age, much is different than it has been in the past. The focus must be on agility in business models and delivery, innovation, and reliability in delivering to the customers. This requires a shift in focus, in all areas, including IT. IT must focus on enabling the business to deliver digital services that stand out from the competition, with leading-edge customer experience. IT must be able to adapt to change in competition as well as in technology, and to support the continuous innovation of businesses in the digital age. It must focus on what makes a business different from others. Thus, IT must focus way more on innovation than on just delivering standard IT services from the shelf. However, IT must ensure that this is safe, secure, reliable, available – the new IT as well as the old IT. Cybersecurity and Identity today are at the forefront of the digital business, with Identity as an enabler and Cybersecurity as the foundation for secure delivery.

With the demand on agility and innovation in IT, and the focus on distinguishing from others instead of reinventing baseline IT that is available of the shelf, the themes of “decentralization” and decentralized technologies (as in Blockchain and Distributed Ledger Technologies), and of “composable” (as in orchestration, APIs, business processes, etc.) move to the focus. This keynote will look at how to utilize identity, security, and decentralized technologies for the composable enterprise and for differentiation from competition in the digital business. Done right, technology enables enterprises to stay ahead of the competition, without failing in security.

Event Recording
IAM 2025: Integrated, Agile, Flexible. Decentralized?
May 11, 2022

Times are challenging, probably more than during the last few decades, with a pandemic that seems to never ending, homeoffice workers who don´t want to return, some frightening growth rates on the dark side of digital with ransomware everywhere and nation-state intellectual property theft on a broad level. We therefore have to update and modernize our identity & access programs to meet chose new challenges and enable an agile & composable business. Identity proofing through global identity networks, risk mitigation of a workforce that remains at the home office, and all that within an increasingly complex multi-cloud & hybrid infrastructure.

In this session Martin Kuppinger will provide you with predictions on how IAM will evolve over the years to come and which role decentralized technologies will play.

Event Recording
How to innovate your Identity Governance and Administration program
May 12, 2022

The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.

Event Recording
Best Practice: CIAM as Business Enabler for Digital Transformation
May 12, 2022
Event Recording
Welcome to EIC 2022
May 10, 2022
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
May 13, 2022