Event Recording

The New Digital Identity Wallet for all Europeans: Latest Amendments

Show description
Speaker
Drs. Jacoba C. Sieders
Consultant, Strategic Digital Identity
Independent
Drs. Jacoba C. Sieders
Jacoba is a digital identity expert, eager to make digital life better and a lot more secure than it is today. Keynote speaker at international IAM congresses and teacher of masterclasses.  After twenty years in leading Identity positions at four multinational banks, Jacoba now focuses...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Panel | How to improve customer IAM and CIAM
May 12, 2022
Event Recording
Deploying Open Policy Agent (OPA) at Scale and in Production
May 12, 2022

OPA is a fast rising star in the Authz market. In this deep dive we will cover lessons learned and best practice from early adopters on how to deploy OPA at scale and in production. How can you ensure consistent polices, how do you test and life cycle policies, how do connect with external data sources.

Event Recording
The Unique Challenges of Identity M&A in High-Growth Organizations
May 12, 2022

Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes with its own set of unique issues and risks? One year ago, Okta announced its acquisition of Auth0. Since then, the combined forces of their internal business systems teams have been working hard to bring the identity and compliance capabilities of the organizations together. The union of these two companies introduced some novel challenges- even for veteran practitioners with experience in IAM mergers at much larger organizations. In this talk Jon Lehtinen will take you on a guided tour of the Okta/Auth0 identity merger from a practitioner’s perspective, and share the learnings, the challenges, and the recommendations for other practitioners tasked with merging the IAM programs within smaller, high-growth companies.

Event Recording
Panel | Digital Identity & Web3- Rethinking Business Models
May 11, 2022
Event Recording
Identity in Polyglot Cloud Environments
May 11, 2022
Event Recording
What Does It Mean to Package Ethics Into a Technology Stack?
May 11, 2022
Event Recording
The Identity R/Evolution
May 12, 2022

The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “The Laws of identity”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal data he wants to disclose, while promising, commercial solutions were neither accepted by the market nor solving the problem of reliability of transactions exhaustively. Today, the new decentralized digital identity model of Self-Sovereign Identity, utilizing verifiable credentials and Decentralized Identifiers, is giving new hope of finding sustainable solutions. This session will map out the main questions around privacy within this context:

  • What are the privacy pros and cons of a blockchain-based identity management system based on an “European Digital Identity Wallet”?
  • What are key pain points of the emerging "European Autonomous Identity Framework" (ESSIF) compatibility with GDPR? Is there “enough privacy” in eIDAS 2.0?
  • How can one trust that the entity issuing the credentials is in fact the entity that it claims to be?
Event Recording
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
May 12, 2022

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.

Event Recording
Drivers for Identity & Access Management in the Financial Industries
May 12, 2022

Identity & Access Management is a key requirement from banning regulations.

At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the new solutions are presented in this talk.

Event Recording
The SolarWinds Hack and the Executive Order on Cybersecurity Happened - It Is Time to Prepare
May 12, 2022

Again and again, I am asked how one can start with the topic of security in an agile project environment. What are the essential first steps, and what should you focus on at the beginning? Of course, this raises the question of suitable methodologies and tools. At the same time, the strategic orientation of the company must be included in this security strategy. We have also learned in the recent past that attacks like the “Solarwinds Hack” are becoming more and more sophisticated and that the attackers now focus on the entire value chain. What tools are there, and where should they be used? How can I start tomorrow to prepare myself for the future against the challenges of cyber attacks? And that’s exactly what you will get an answer to here.

Event Recording
If it’s not Simple, Scalable and Agile, it’s not Modern IGA
May 12, 2022
Event Recording
Pre-Conference Workshop | How OpenID Standards are Enabling Secure & Interoperable Digital Identity Ecosystems
May 10, 2022

OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while also enabling a collaborative platform to openly address current trends and market opportunities. The OpenID Foundation Workshop at EIC includes a number of presentations focused on 2022 key initiatives for the Foundation.