Event Recording

From A to B - How Decentralized Technologies Are Changing Collaboration Between the Public and Private Sector

Show description
Speaker
Sophia Rödiger
Co-founder and CEO
bloXmove
Sophia Rödiger
Sophia Rödiger is CEO and co-founder of the mobility blockchain platform bloXmove, which enables mobility providers to seamlessly implement their offerings in a global alliance. Rödiger worked for over seven years in innovation, transformation and startup investment in the digital...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Panel | PAM
May 12, 2022
Event Recording
Challenges for Women in Identity and Security
May 12, 2022

It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security and identity is even worse, as some studies have shown. "Women in Identity" is a global organization whose mission is to develop solutions with diverse teams. This presentation will look at the various WID initiatives on a global and local level that support women in the industry and create solutions “for everyone built by everyone”.

Event Recording
The 'Credentials-first Mobile-first' Identity Ecosystem
May 11, 2022

This is a new development in the world and touches on mDL, Verifiable Credentials, decentralized identity, and personal data topics. A forward-looking presentation about what the world might look like, the foundational changes represented by this change, and some current and potential innovations that are now possible because of this.

Event Recording
Reducing the Species in your Cybersecurity Zoo
May 13, 2022
Event Recording
The ICaaS (Identity Component as a Service) approach for taking control of customer experience
May 11, 2022
Event Recording
Plan A: Reduce Complexity in your Cloud Native Environment (there is no Plan B)
May 11, 2022

Organizations with an advanced cloud migration program have hit a roadblock. TO successfully navigate the adoption of compartmentalized code, in order to reap the benefits of improved agility and reduced costs, The CISO must embrace automated deployment and gain control over APIs.

Event Recording
Practicalities of Identity Proofing for Authentication
May 11, 2022
Event Recording
It's the Relationship, Stupid
May 10, 2022
Event Recording
Transatlantic SSI Interoperability: Building the Identity Layer for the Internet
May 12, 2022

Many decentralized identity infrastructures and ecosystems around the world are emerging, but how can we get to true global interoperability, where my digital identity works seamlessly across borders and across different use cases?

Two of the most prominent initiatives in the digital identity space right now are 1. the digital Permanent Resident Card use case supported by the U.S. Department of Homeland Security, and 2. the European Blockchain Service Infrastructure (EBSI) with its various pilot projects.

In this talk, we will look at the "Transatlantic SSI Interop" experiment conducted by an EU company (Danube Tech) and a US company (Digital Bazaar) that shows how such different initiatives can connect and interoperate.

Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (II)
May 11, 2022
Event Recording
What Ails Enterprise Authorization
May 11, 2022

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access management is the only way in which attackers can be prevented from gaining unwarranted access to enterprise data. Attackers can include both malicious insiders and those using compromised identities. Numerous organizations have suffered significant financial damage as a result of such unwarranted access from legitimately identified users.

Authorization rules in an enterprise can apply to many types of assets: files on a network drive, cloud resources such as virtual machines and storage buckets and enterprise applications and actions within them. Managing authorization across all these assets is complex in and of itself. Most enterprises also use third-party “Software as a Service ' platforms that maintain their own permissions, further complicating enterprises’ efforts to effectively manage authorization.

This talk identifies common causes of "privilege sprawl" in enterprises, and discusses management techniques that can result in "least privilege" permissions to personnel while ensuring no business disruption

Event Recording
Friends don’t let Friends Centralize Authorization Enforcement
May 12, 2022