Event Recording

Panel | Turning (Distributed) Workforce Challenges into Productivity Gains

Show description
Speakers
Roland Baum
Founder
umbrella.associates GmbH
Roland Baum
Roland Baum is Founder of German Start-Up umbrella.associates and architect of several enterprise ID and IGA environments. As a tech savvy wizard of OpenSource tools and data analysis, he combines business acumen and process perspectives to amalgamate future-proof CIAM, PAM and IGA solutions....
View profile
Vittorio Bertocci
Principal Architect
Okta
Vittorio Bertocci
Vittorio Bertocci is a Principal Architect in Okta and host of the Identity, Unlocked podcast. A veteran of the identity industry, with more than 20 years of hands-on experience, he helped usher the claims based identity era with his work on identity for developers in Microsoft,...
View profile
Allan Foster
Chief Evangelist
Emeritus
Allan Foster
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of the business while at ForgeRock, with responsibilities in Support, Engineering, Product Management,...
View profile
Sebastian Rohr
CTO
umbrella.associates GmbH
Sebastian Rohr
While Sebastian has been known as author of multiple articles, reviews and essays on all kinds of Identity and Security topics, he has more recently made a name for himself as being the “unofficial IDpro® IdentiBeer Event” organizer, especially around such major industry...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Cloud Security Standards: Expectations, Benefits and Use Case
May 12, 2022
Event Recording
Trimming down User Access Governance to its Essentials
May 12, 2022

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.

In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.

In this space, Elimity tries to break the status quo. As an innovator, Elimity provides a data-driven platform that specifically offers the essentials for user access governance: automated data collection, holistic risk analytics and user-friendly access reviews integrated with ITSM. As a result, the platform lets companies achieve mature access governance in a matter of days, not months.

In this session, Maarten will give an overview of the essentials of user access governance, showcase the Elimity platform and how it is successfully applied in practice.

Event Recording
SSI, NFTs, ENS & Co - Trends and Adoption of Decentralized Identity in 2022
May 11, 2022

Goal of this Deep Dive: Listeners will leave with a solid understanding of

  • different approaches to decentralized identity like Self-Sovereign Identity (SSI) and Non-Fungible Token (NFTs), Ethereum Name Service (ENS)
  • their adoption (based on real use cases)
  • their impact on web2/3.

Main Contents / Flow:

  1. The new status quo: The broken web and the shift from data silos to ecosystems.
  2. The rise and latest trends in Web3: On-chain identity, NFTs, ENS & Sign-in with Ethereum
  3. Comparing paradigms: What is better, NFTs or SSI?
  4. Adoption & real-life use cases (selected SSI projects from walt.id users/clients)
    • web 2: public sector, banking and financial services, HR, education, marketplaces, …
    • web 3: decentralized finance (DeFi), creator economy (art, music), gaming, DAO governance, …
  5. Conclusion & Predictions for 2022
Event Recording
Digital Identity in Travel (and beyond): a public-private affair
May 12, 2022
Event Recording
Proofing your Success: Defining & Measuring Meaningful Metrics for IAM
May 12, 2022
Event Recording
Dynamic Authorization in Zero Trust Architecture
May 10, 2022
Event Recording
PAM for the People
May 12, 2022
The cyberssecurity approaches and strategies that works well for a multinational with a large and well funded cybersecurity department may not be as applicable for a mid sized company where the security department may be a single person.
Still if the partner company that delivers the cheese to a retailer falls to a cybersecurity attack there is simply no cheese to sell to the customers so the retailer not only looses money but also fails at their most basic task. So how do we as multinationals help our partners with implementing basic controls such as PAM in a way that works in their business reality?
In this session we will be looking at how you as a relatively cybersecurity mature company can do to help your less mature partners. It is also suitable for persons who has been asked to launch a cybersecurity or PAM program without been given the full resource to execute a full program.
Event Recording
Key Requirements for Next Generation MFA
May 11, 2022

In this talk you will learn how MFA can be a foundation for your Zero Trust Initiative

Event Recording
Panel | Overcoming SMS OTP: Secure passwordless MFA with your mobile phone
May 11, 2022
Event Recording
In Transition - From Platforms to Protocols
May 13, 2022

Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity technology ecosystem is in flux. What will emerge? OIDC? OIDC/SIOP? DIDComm? Join us for a discussion on the changing protocol landscape, the shifting identity power centers and why it is a both/and and not either/or.

Event Recording
Remote onboarding with Verifiable Credentials
May 12, 2022

Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent adoption across other industry verticals. In this session, the speakers will demonstrate an open standard based approach to ID verification based on verifiable credentials and decentralized identifiers for remote onboarding across industries. With this new approach users can verify their identity once and use their credentials with any organization. Enterprises can leverage this simpler cost-saving approach to remotely onboard employees, partners and customers compliantly while respecting the end users’ privacy.

Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
May 13, 2022