Event Recording

Cyber Security Architectures in a Hybrid World

Show description
Speaker
Eleni Richter
Chief Architect
EnBW
Eleni Richter
Eleni Richter is working as chief architect of the identity and organizational data management at a large German energy supplier (EnBW AG) and as part-time lecturer in IAM and Cyber Security Architecture at Lucerne University of Applied Sciences and Arts (HSLU). She has held various positions...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Implementing Multi-Region Identity Identifiers and IAM
May 11, 2022
Event Recording
Trends in Enterprise Authentication
May 11, 2022
Event Recording
Dealing with Multi-Cloud, Multi-Hybrid, Multi-Identity: Recommendations from the Field
May 11, 2022
Event Recording
Privacy and Data Protection. What is this Thing Called Privacy?
May 10, 2022
Event Recording
Panel | The Future of Authentication
May 11, 2022
Event Recording
Panel | Best Practices for Implementing Zero Trust
May 11, 2022

The “zero trust” approach to cybersecurity has been gaining momentum in recent years, as both corporations and government agencies have struggled with how to enhance security given the de-emphasis on the network perimeter. For the most part, the zero trust movement has remained rooted in network principals. However, in the last two years, much of the world was forced to interact exclusively online, creating a sense of urgency around zero trust security and the “never trust, always verify” philosophy behind it reached a new level of importance.

In this panel, you’ll hear from security leaders who have approached and implemented zero trust with an identity-first philosophy, considering it a transformative way of reducing friction for users, while addressing the increasingly challenging risk environment. They believe a true zero trust environment requires a strong identity and access management framework. 

Event Recording
Latest Developments in CIAM
May 12, 2022

Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way into B2B and B2E IAM solutions through the "consumerization of IT". KuppingerCole is updating research on CIAM, and in this session we'll consider what we have learned thus far, including trends in authenticator availability and usage, consent and privacy management features, regulatory compliance developments, the integration of consumers' device identities, the challenges of account recovery and linking, and the rising need for identity proofing services. 

Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
May 12, 2022
Event Recording
An ecosystem for trusted identities
May 12, 2022

 

Event Recording
Why KYC Isn’t Enough
May 11, 2022
Event Recording
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
May 12, 2022

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.

Event Recording
European Identity & Cloud Awards Ceremony
May 11, 2022

Once again, analysts from KuppingerCole come together to showcase outstanding Identity Management and Security projects, standards and people. The winners will be honored live on stage during the award ceremony.