Event Recording

OpenID SSE, CAEP and RISC - Critical standards that enable Zero-Trust security

Show description
Speakers
Tim Cappalli
Identity Standards Architect
Microsoft
Tim Cappalli
Tim Cappalli is a member of the Identity Standards Team in Microsoft's Identity Division. Tim is currently working on identity coexistence with privacy-related changes in browsers and operating systems, security event and signal sharing for zero trust, and the rapidly evolving world of...
View profile
Atul Tulshibagwale
CTO
SGNL
Atul Tulshibagwale
Atul is a federated identity pioneer and the inventor of the Continuous Access Evaluation Protocol (CAEP), forming the basis of the Shared Signals and Events working group in the OpenID Foundation, which he co-chairs. Prior to joining SGNL, he was a technical leader at Google where he focused on...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
May 13, 2022

You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience, and how we can apply both concepts to our current technology landscape, besides understanding how we can identify the High-Value Target (HVT) in our organization

Event Recording
Denmark's 2022 brand new eID solution
May 11, 2022
Event Recording
CISO Panel | Securing the Composable Enterprise
May 10, 2022

As if it all came together on the foundations of an agile, fully decentralized enterprise, embracing the API economy to deliver results through assembling and combining pre-packaged business capabilities. AI-driven, automated, everything delivered on-demand, providing the best possible user experience, and all that at an unprecedented pace that keeps us ahead of the ever-increasing speed of change: The composable enterprise.

But wait – less than a third of businesses that we at KuppingerCole have asked recently, say that they have processes, staff, structures, skills, and cybersecurity implemented in a way that they feel adequately prepared for what analysts may soon call the age of the composable enterprise. In this CISO panel session, we will try to look into the future of Cybersecurity, without losing sight of today´s threats and ways to continue building cyber resilience in a time of so many unknowns. Welcome to the EIC 2022 CISO Plenary Panel.

Event Recording
The Role of Identity & Access Management for Ransomware Resilience
May 11, 2022
Event Recording
Demystifying CIEM for an Effective Multi-Cloud Security Enablement
May 11, 2022

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools aren't natively designed to manage cloud infrastructure entitlements and therefore can't be easily re-purposed to discover and remediate excessive cloud permissions across multiple IaaS and PaaS platforms. The confusion arising from un-identically structured CSPs and misaligned cloud terminology is further aggravated by the quest of IAM, PAM and Cloud Security providers to enter CIEM space and capture market share.

In this session, we will focus on how the CIEM market has been evolving over the last few years to manage the critical cloud security gaps left unaddressed by CSPM (Cloud Security Posture Management) and CWP (Cloud Workload Protection) tools, and how CIEM complements these tools to offer a wholistic cloud security advantage. We will also discuss how CIEM addresses some of the most critical security tenets of your organization's cloud adoption program and future planning.

As for the key takeaways of this session, you will be able to understand and articulate:

  1. When and where does CIEM fit in your overall cloud security and access governance strategy?
  2. What are the critical capabilities of CIEM to help evaluate the right CIEM product for your multi-cloud environment?
  3. What are industry best practices for implementing and operationalizing CIEM for your cloud security and achieving faster ROI?
Event Recording
What Does It Mean to Package Ethics Into a Technology Stack?
May 11, 2022
Event Recording
Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds
May 13, 2022
Event Recording
SSI, NFTs, ENS & Co - Trends and Adoption of Decentralized Identity in 2022
May 11, 2022

Goal of this Deep Dive: Listeners will leave with a solid understanding of

  • different approaches to decentralized identity like Self-Sovereign Identity (SSI) and Non-Fungible Token (NFTs), Ethereum Name Service (ENS)
  • their adoption (based on real use cases)
  • their impact on web2/3.

Main Contents / Flow:

  1. The new status quo: The broken web and the shift from data silos to ecosystems.
  2. The rise and latest trends in Web3: On-chain identity, NFTs, ENS & Sign-in with Ethereum
  3. Comparing paradigms: What is better, NFTs or SSI?
  4. Adoption & real-life use cases (selected SSI projects from walt.id users/clients)
    • web 2: public sector, banking and financial services, HR, education, marketplaces, …
    • web 3: decentralized finance (DeFi), creator economy (art, music), gaming, DAO governance, …
  5. Conclusion & Predictions for 2022
Event Recording
The Identity R/Evolution
May 12, 2022

The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “The Laws of identity”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal data he wants to disclose, while promising, commercial solutions were neither accepted by the market nor solving the problem of reliability of transactions exhaustively. Today, the new decentralized digital identity model of Self-Sovereign Identity, utilizing verifiable credentials and Decentralized Identifiers, is giving new hope of finding sustainable solutions. This session will map out the main questions around privacy within this context:

  • What are the privacy pros and cons of a blockchain-based identity management system based on an “European Digital Identity Wallet”?
  • What are key pain points of the emerging "European Autonomous Identity Framework" (ESSIF) compatibility with GDPR? Is there “enough privacy” in eIDAS 2.0?
  • How can one trust that the entity issuing the credentials is in fact the entity that it claims to be?
Event Recording
Why KYC Isn’t Enough
May 11, 2022
Event Recording
Interoperability Between Global Identity Networks
May 12, 2022
Event Recording
Future Government: Transforming Public Services to Be More Agile and Innovative
May 10, 2022