Event Recording

Promoting Cyber Resilience through Identity and Zero Trust

Show description
Speaker
Nick Nikols
VP, Strategy and NetIQ Products
OpenText I Cybersecurity
Nick Nikols
Nick has more than 25 years of experience in the software industry both in developing industry leading Identity and Cybersecurity solutions and as an industry analyst conducting research and helping clients with issues ranging from consumer identity and securing cloud environments to access...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management
May 12, 2022

A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management. Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more efficient user experience for day to day activities.   A look at the 5 common steps to success.

Event Recording
All Other Identities - The Risk That Is Hiding in Plain Sight
May 12, 2022

For the last 30 years  virtually every  company, agency and organization has been forced to accept the risks associated with identity management and control for third parties and  all  the other identities that  are not  directly addressed by today's workforce or customer access management solutions. The universe of  "all other identities"  is enormous, numbering in the billions and  maybe even the trillions of distinct and unique identities. In the absence of solutions and processes to actively manage and control the identities of contractors, service providers, agencies, franchisees and  all  the possible variations of people,  devices  and entities that your organization interacts with, accepting risk but not being able to  mitigate  it has been the normal course of business. It is past time that these risks are acknowledged,  addressed,  and mitigated. Richard Bird explains the current state of third and n-th party identity risk, how to recognize it and what to do about it in this presentation on a new frontier in security and risk.

Event Recording
Why KYC Isn’t Enough
May 11, 2022
Event Recording
Cyber-Securing the Digital Industry
May 13, 2022
Event Recording
The Importance of a Centralized Access Management System
May 11, 2022
Event Recording
OT Patch Management Best Practices
May 13, 2022
Event Recording
Protocol Independent Data Standards for Interoperability
May 12, 2022
Event Recording
Global Trust Frameworks Interoperability
May 12, 2022
Event Recording
Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect
May 12, 2022

 

Event Recording
Digital Identity in Travel (and beyond): a public-private affair
May 12, 2022
Event Recording
Identity Ecosystems for a Better Customer Experience
May 11, 2022

Portable, verifiable and, most importantly, reusable representations of personal data can enable high-touch, high-trust and low-cost engagement between customers and networks of complementary service providers. The EU is already adjusting to the opportunities of Self-Sovereign Identity, but the private sector needs to demonstrate more high-value use cases in order to force beneficiary regulations and an enabling environment for the technology. The tools and techniques of Self-Sovereign Identity (SSI), including the no-code capabilities provided by ProofSpace, can be used to create trust networks within an organization’s existing technical infrastructure in order, for example, to verify that a credential shared by a customer was issued by a trusted partner. A valuable use case for this is re-usable Know Your Customer verification. Other high-value use cases for SSI trust networks include: networks of affiliated hospitality services referring and on-boarding customers; networks of educational institutions verifying academic credentials; networks of employers verifying employment histories; and web 3.0 and DAO communities verifying member reputation and voting rights for management and governance purposes. A brilliant case study for this is ProofSpace’s work with the pro-democracy opposition of Belarus, where Self-Sovereign Identity enables a decentralized and secure “virtual country”, offering private and public services to unite, serve and empower the pro-democracy community.

Event Recording
A Blueprint for Achieving a Passwordless Reality
May 11, 2022

Password-related attacks increased by a staggering 450% in 2020, with over 1.48 billion records breached worldwide. Meanwhile, the average cost of a password reset exceeds $50 USD. We all know that passwords fail to deliver adequate Zero-Trust security and cause unnecessary friction for both customers and the workforce. So why have passwords not receded into the background? What are the key challenges facing enterprise passwordless agendas? And how can modern identity and access management help us realise a blueprint for a passwordless reality?