Event Recording

Pre-Conference Workshop | IAM, the Cloud, and GDPR - Why you will fail on GDPR without a strong IAM posture

Speakers
Matthias Reinwarth
Head of Advisory
KuppingerCole
Matthias Reinwarth
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias coordinates communication and exchange within the KuppingerCole team across all business units (Events,...
View profile
Joerg Resch
Co-Founder & Management Board Member
KuppingerCole
Joerg Resch
Joerg Resch is Co-Founder & Managing Director at KuppingerCole. He looks back on over 20 years of experience in Identity Management related projects and their implementation in large corporations. His areas of expertise are blockchain and digital transformation.
View profile
André Romagna
Principal Security Consultant
Adnovum
André Romagna
André brings more than 25 years of experience in project management, management consulting and education. Thanks to his extensive expertise around digital transformation with a focus on IAM solutions, he is responsible for the delivery management of IAM projects at Adnovum. Due to the...
View profile
Playlist
European Identity and Cloud Conference 2022
Event Recording
Privacy: The Real Cost
May 10, 2022

Privacy is one of the most challenging aspects to protect in identity solutions.

The entities that stand to gain the most from surveilling users can use convenience as a bargaining chip. Users understand and appreciate convenience, but they often don't appreciate the costs of loss of privacy, as the consequences often play out well after the violation occurred.

Identity practitioners often take the need to preserve privacy for granted, and in so doing fail to help users and solution designers understand the concrete impact privacy violations can have on the lives of users. This session will arm you with the concrete scenarios you need to instill in customers and colleagues a new awareness of the real costs privacy violations can have.

Event Recording
Denmark's 2022 brand new eID solution
May 11, 2022
Event Recording
We’re Gonna Need an even Bigger Boat: How Pervasive Digital Transformation, Nation State Actors, and Open Code Repositories Mandate a Reinvention of Identity
May 11, 2022
Event Recording
Cardea: verifiable credentials for health information go open source
May 11, 2022

As an incubator for innovation in air travel, Aruba has chosen to use verifiable digital credentials to manage entry requirements and health testing for travel to the island. This decentralized, open-source technology, which provides secure authentication while preserving traveler privacy, was developed by SITA and Indicio.tech and donated to Linux Foundation Public Health as  Cardea. In this session, representatives from Aruba’s government, Indicio, and SITA will discuss why they chose a decentralized approach, how they created a trusted data ecosystem, and why the ability to verify personal data without having to check in with the source of that data will transform air travel, healthcare, and tourism

Event Recording
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
May 11, 2022
Event Recording
Welcome to EIC 2022
May 10, 2022
Event Recording
OT Patch Management Best Practices
May 13, 2022
Event Recording
Demystifying CIEM for an Effective Multi-Cloud Security Enablement
May 11, 2022

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools aren't natively designed to manage cloud infrastructure entitlements and therefore can't be easily re-purposed to discover and remediate excessive cloud permissions across multiple IaaS and PaaS platforms. The confusion arising from un-identically structured CSPs and misaligned cloud terminology is further aggravated by the quest of IAM, PAM and Cloud Security providers to enter CIEM space and capture market share.

In this session, we will focus on how the CIEM market has been evolving over the last few years to manage the critical cloud security gaps left unaddressed by CSPM (Cloud Security Posture Management) and CWP (Cloud Workload Protection) tools, and how CIEM complements these tools to offer a wholistic cloud security advantage. We will also discuss how CIEM addresses some of the most critical security tenets of your organization's cloud adoption program and future planning.

As for the key takeaways of this session, you will be able to understand and articulate:

  1. When and where does CIEM fit in your overall cloud security and access governance strategy?
  2. What are the critical capabilities of CIEM to help evaluate the right CIEM product for your multi-cloud environment?
  3. What are industry best practices for implementing and operationalizing CIEM for your cloud security and achieving faster ROI?
Event Recording
What Ails Enterprise Authorization
May 11, 2022

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access management is the only way in which attackers can be prevented from gaining unwarranted access to enterprise data. Attackers can include both malicious insiders and those using compromised identities. Numerous organizations have suffered significant financial damage as a result of such unwarranted access from legitimately identified users.

Authorization rules in an enterprise can apply to many types of assets: files on a network drive, cloud resources such as virtual machines and storage buckets and enterprise applications and actions within them. Managing authorization across all these assets is complex in and of itself. Most enterprises also use third-party “Software as a Service ' platforms that maintain their own permissions, further complicating enterprises’ efforts to effectively manage authorization.

This talk identifies common causes of "privilege sprawl" in enterprises, and discusses management techniques that can result in "least privilege" permissions to personnel while ensuring no business disruption

Event Recording
The strategic building blocks of the composable enterprise: Concepts & technologies
May 11, 2022

This session is a continuation of the opening keynote by Martin Kuppinger on the future Composable Enterprise. Together we take a look at what powers the composable enterprise and which concepts and technologies can contribute to building a composable enterprise.

Event Recording
What Supports Zero Trust in the Enterprise?
May 11, 2022
When we think of Zero Trust, we often discuss how it can support and improve your security posture, defense-in-depth strategies, and architecture -- but what supports Zero Trust? This discussion will focus on other IT / Security strategies, methodologies, and business practices that can help better position an organization to be successful in their approach to Zero Trust. 
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
May 13, 2022

In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a pluralistic digital society & business world where size would not be the only thing that matters. To get there, we need open Standards, Protocols and Alliances that help individuals, as well as businesses of any size, to participate in a digital future inside the metaverse and beyond - just like trade unions helped the working class during the industrial revolution to fight for their rights. In this panel session, we will discuss about the enablers of such a different approach and the requirements to actually be successfull.