Event Recording

Defining the Protocol for Internet-Scale Digital Trust

Show description
Speakers
Daniel Bachenheimer
Digital Identity Innovations Technical Lead
Accenture
Daniel Bachenheimer
Daniel Bachenheimer, an Electrical Engineer by training, is Accenture’s Digital Identity Innovations technical lead and has been designing and delivering solutions for various clients for over 30 years. For the past 20 years, Dan has focused on Border Management and Identity Management...
View profile
Judith Fleenor
Executive Director
Trust Over IP Foundation
Judith Fleenor
The mission of the Trust Over IP Foundation (ToIP) is to simplify and standardize how trust is established over a digital network or using digital tools. The ToIP collaborative community focuses on Interoperability and cryptographic verifiability at the machine layers, and human accountability...
View profile
Dr. André Kudra
Board Member
IT Security Association Germany (TeleTrusT)
Dr. André Kudra
On a mission for decentralized identity & bit-heat confidential cloud. Decentralization visionary. Passion for information security since turn of millennium. Business-driven yet tech-savvy – IT guy at heart, businessman by education. European Business School (EBS) diplomas &...
View profile
Drummond Reed
Director of Trust Services
Gen Digital
Drummond Reed
Drummond has spent a quarter-century in Internet identity, security, privacy, and trust infrastructure. He is Director, Trust Services at Gen Digital, previous Avast after their acquisition of Evernym, where he was Chief Trust Office. He is co-author of the book, Self-Sovereign Identity...
View profile
Christoph Schneider
Head of IT Development and Operations
Global Legal Entity Identifier Foundation (GLEIF)
Christoph Schneider
Christoph Schneider is Head of IT Development and Operations at the Global Legal Entity Identifier Foundation (GLEIF). In June 2017, Christoph joined the International Organization for Standardization (ISO) as co-leader of the Technical Committee 68 FinTech Technical Advisory Group...
View profile
Playlist
European Identity and Cloud Conference 2023
Event Recording
Zero Trust: Where do We Want to be in Five Years?
May 11, 2023

The digital-first customer experience and remote-first workforce pushed zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. Within that study, we analyzed commonalities of organizations implementing and operating Zero Trust. Let's look closely at where we are today.

Now imagine it is 2028. You’re five years into your Zero Trust transformation. People like it and usability has improved. Defensibility is better, too, with a number of attacks having been stopped over the past couple years. But then, in 2028, you get the call. There’s been a security breach. What happened!? This session will explore the future with a pre-mortem on how breaches will look under a Zero Trust architecture.

Event Recording
Verifiable Digital Credentials: Comparison of Characteristics, Capabilities and Standardization of Emerging Formats and Issuance Protocols
May 10, 2023

In 2022, several standards organizations and open source groups made great progress defining protocol specifications and code for the issuance of digital credentials. In this session, learn about and discuss some of the emerging issuance protocols, and compare their features, capabilities and trade offs.

Event Recording
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
May 10, 2023

By now, organizations are well aware of the need for better protecting data and application with modern access management and authentication.
Thales and Microsoft partner to help organizations going passwordless to fight against phishing attacks. Thales and Microsoft experts Sarah Lefavrais and Thomas Detzner will talk about the role of Fido and other phishing resistant authentication methods like CBA in achieving Zero Trust approach.

Event Recording
Market Overview: Privileged Access Management Solutions & the Pamocracy
May 11, 2023

In this session, KuppingerCole´s Paul Fisher will give an overview of the market for Privilege Access Management (PAM) platforms and provide a compass to help buyers find the product that best meets their needs. KuppingerCole examines the market segment, vendor capabilities, relative market share, and innovative approaches to providing PAM solutions. He will also explain how the new Pamocracy is affecting the market.

Event Recording
Beware of the Dark Side… Shining a Light on Supply Chain Security
May 10, 2023

How do we control what we do not see?

Supply chains are like that. The problem is that while you may have sight of your nearest third-party relationships, if you look further out to their relationships, things start to become a bit obscured. And that is where the risk lies.

In recent years Okta, Toyota and Morgan Stanley have all suffered data breaches that originated with an attack on the supply chain.

In this presentation, we explore the complex nature of supply chains/digital ecosystems and all the parties involved.  We’ll look at the pattern of some recent third-party attacks, examine their root cause and what lessons we can learn.

Finally, we'll explore the critical capabilities that are needed as the foundation for a solid third-party strategy; one that provides active, continuous monitoring while reducing the overhead for compliance.

Event Recording
Lessons Learned from Projects Using Verifiable Credentials in the Education Industry
May 12, 2023

I will talk about lessons learned from several projects which tried to adopt verifiable credentials as learning credentials in educational institutes such as interoperability with the OpenBadge credentials.

Event Recording
Is FIDO Ready for Enterprise Deployment?
May 11, 2023

With the ever-increasing number of cyber-attacks, level of fines and unstable geopolitical climate, organizations are looking to better protect themselves against data breach by deploying phishing resistant authentication for their workforce.

FIDO combines the benefits of high security with a standards-based approach, but with its background in the consumer world, including privacy by design, how does it fit into an enterprise deployment with the increased demand for identity management?

This session will discuss:

  1. What do enterprises require for high-assurance credential management?
  2. How can FIDO meet these needs?
  3. Options for integrating FIDO into existing IDAM solutions
Event Recording
Digital Organizational Identity With the Verifiable Legal Entity Identifier (vLEI)
May 12, 2023

With heightened reliance on remotely delivered services and transactions, the need for safer and sounder digital identification and verification is required and will become the norm in the future. This especially is true looking forward to mandates for the adoption of zero trust frameworks in which digital credentials will be issued and then used for identification and operational purposes. GLEIF is committed to making concrete and lasting improvements to the process of identity verification by leveraging the Legal Entity Identifier (LEI) in digital tools. GLEIF has made the LEI verifiable by creating the vLEI (verifiable LEI) with digital credentials that deliver decentralized identification and verification for organizations as well as the persons who represent their organizations either in official or functional roles. GLEIF has made much progress on developing the governance, credentials and infrastructure since introducing the vLEI in 2020 and will share an updated at this progress in this session.

Event Recording
Your Identity Is Not Self-Sovereign
May 12, 2023

Are we really in control of our identities, are they merely assigned to us, or is there something else at play?

The promise of a "self-sovereign identity" seems great: you know who you are, and through the magic of technology you can prove to everyone around you that you are who you say you are. The technology to enable this is being built and deployed, but is it the right solution? Even more fundamentally, is it the right model at all?

In this session, we'll examine the core concept of "self-sovereign" identity in the light of how society has historically viewed identity and how our digital systems have modeled identity in different ways over time.

Event Recording
Designing the New Identity Fabric
May 11, 2023

Modern applications and environments are driving a new Identity Fabric.  Are you ready to build yours?  Join Vadim Lander, Chief Technology Office and Distinguished Engineer at Broadcom Software, as he discusses the design considerations to evolving your Identity and Access Management solution to build a Zero Trust foundation and bridge the identity gap across your hybrid environment.  

Event Recording
Entitlements - Claim vs. Reality
May 10, 2023

The claim or desire for authorizations, permissions and the rights set in practice often have a wide divergence. Typically, more rights are assigned unconsciously than were actually required.

The resulting vulnerabilities can have significant consequences therefore, it is essential to be able to monitor the true permissions at any time, regardless of how the permissions have been set. It is almost impossible to manage monitoring manually, even in small environments. Therefore, independent automatisms that can automatically explore, analyze and report the real settings are becoming a requirement.

In this session we will show you how Cygna Labs can support you in these challenging tasks and thereby ensure and improve security in your company.

Event Recording
Solving a Logistical Nightmare: Imagining a Decentralized Identity Future at DB Schenker
May 10, 2023

IAM is hard enough without the additional complexities that logistics companies face. Warehouses need to be secure, but it’s difficult to find an identity solution that’s suitable for short-term staff who don’t have or can’t use computers, mobile devices, or biometrics in their work environment. Until recently Decentralized Identity has been stuff of dreams, but that is rapidly changing and the lines between identity and authentication blurring even more. In this session, we’ll explore how a future powered by Decentralized Identity is offering logistics giant DB Schenker a path to stronger security while maintaining productivity in its warehouses—providing a fast, flexible and interoperable way for workers to verify their identity.