Event Recording

Rakesh Tripathi: Future of Identity Management

Speaker
Rakesh Tripathi
Information Security Analyst
Independent Consultant
Rakesh Tripathi
A well rounded Cyber security expert and a passionate Risk practitioner with 14 years of cross industry (financial and non-financial) experience in Information Security, Technology Risk, Operational Risk, Governance, Project Management and Compliance domains.
View profile
Playlist
Identity Fabrics - Future-Proofing IAM
Event Recording
Matthias Reinwarth: User & Authorization Management. Real Benefits For The Business, Effective Projects, Efficient Operation And A High Level Of Acceptance
Mar 04, 2021
Event Recording
Panel: Tackling the Legacy IAM - Towards Future- Proof Identity Fabric
Mar 04, 2021
Event Recording
Christine Owen: Identity-Centric IAM For Enhanced Integration Into Emerging Security Models
Mar 04, 2021
Event Recording
Oliver Krebs: Anchoring Real Identity in a Digital World
Mar 04, 2021

In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one.
It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them engaged. In this session, Olli Krebs (VP Central EMEA at Onfido) will examine how document and biometric verification can seamlessly enable trust throughout the identity lifecycle. 

Event Recording
Manoj Kumar: Cloud-delivered IAM: Promises and Challenges
Mar 04, 2021

Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the IAM capability of the future. The speaker will share his experiences in deploying a native cloud-based IAM solution at scale, the challenges, pitfalls, and the watch-outs. 

Event Recording
Petteri Ihalainen: Switching the Whole Country From Legacy to Open Standards
Mar 04, 2021

In the early years of this millennia Finland was already at the forefront in utilizing strong authentication for online services. Banks had been issuing two-factor authenticators to their customers already in the '90s. These means of strong authentication were quickly adopted by public and private sector services that required more than passwords. Mobile network operators began to offer PKI based SIM authentication. These two solutions and their somewhat legacy protocols conquered the strong authentication market and were the de-facto methods subscribing to or accessing services. Advances in technology, eIDAS, PSD2, and user expectations required a complete overhaul of the strong authentication landscape for the whole country. What happened and why? What were the lessons learned?

Event Recording
Sylvie Vandevelde: From a Centralized Digital ID Towards a Hybrid Model
Mar 04, 2021
Event Recording
Akhilesh Rajendran: Automation in Identity and Access Management Operation
Mar 04, 2021

 An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation technology, CISOs can bring down the risk involved in IAM operations; Robotic Process Automation (RPA) being one among them.

Event Recording
Tobias Urban: The Balance Between User Experience and Security
Mar 04, 2021

Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver products and services, there is an explosion in the number of sources from which users can gain access. Overlaying all of that is the constant evolution of the threat landscape and regulations that inevitably follow.

Tech leaders who want to grow their position in the market must balance two goals: delivering security and customer experience.

Join Auth0 as we discuss, and provide some insights on how to utilize a strategic approach to digital identities, that has helped customers such as Siemens, HolidayCheck, and EnBW to:

  • Maintain and improve the user experience
  • Provide an innovative - and differentiated - product or service, that can scale as the business grows
  • Achieve the above two points, while still ensuring security and trust for their customers’ digital identities
Event Recording
Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink
Mar 04, 2021

Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM.

IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance requirements. It is a business enabler, as well as an IT enabler. It is a central element of every cybersecurity strategy. It enables managing and access control for everyone from employees to consumers and everything from things to software robots. It is a foundation for your success in digital transformation. It also enables IT transformation, by managing access to all the clouds and services you have to deal with.

But: How to get to a modern IAM form where you may be today? What to preserve, what to extend, what to add, what to retire? And how to do such a migration in a way that you can serve the business demand rapidly, while gaining the time you need for more complex migrations – and while preserving investments in times of tight budgets?

Martin Kuppinger, Principal Analyst at KuppingerCole, will discuss these aspects and explain how the paradigm of an Identity Fabric can help you in successfully modernizing your IAM, at your own pace. He also will shed a light on the state of the market and the maturity of offerings serving the Identity Fabrics model.

Event Recording
Martin Kuppinger: Interview with Simon Moffatt
Mar 04, 2021
Event Recording
Vilma Blomberg: No Compromises, No Mercy – IAM’s Inevitable Role in Safeguarding The Organization
Mar 04, 2021

Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a set of security solutions and processes to safeguard and protect the business, and nowadays the teams are expected to deploy those faster and more efficiently than ever. The presentation will go through how to implement an efficient, centralized IAM approach that makes no compromises and shows no mercy for any attempt to unauthorized access outside the IAM solution. It will also be explained how the approach can be implemented in an agile manner during an on-going IAM project.