Webinar Recording

Verifiable Credentials: A Fresh Approach to Identity in the Digital Era

Show description
Speakers
Ed Ackerman
Director of Alliances and Partnerships
Onfido
Ed Ackerman
Ed Ackerman serves as Director of Alliances and Partnerships at Onfido. He joined Onfido in 2016 as Head of Customer Success and has been instrumental in driving the company's commercial strategy and record revenue growth. Prior to Onfido, Ed led a high performing team as Head of UK Channel...
View profile
Annie Bailey
Analyst
KuppingerCole
Annie Bailey
Annie Bailey is an analyst covering emerging technologies such as blockchain and artificial intelligence, and helps synthesize the implications for companies, industries, and markets. She holds a Bachelor from Pacific Lutheran University, a Master’s Certificate from Johns Hopkins-Nanjing...
View profile
Jonathan Distler
Director of Digital Solution Architecture
IDEMIA
Jonathan Distler
Jonathan Distler is Director of Digital Solution Architecture at IDEMIA, the global leader in Augmented Identity, providing a trusted environment which enables citizens and consumers alike to perform their daily critical activities in the physical as well as digital space. For over 20 years,...
View profile
Ankur Patel
Principal Program Manager
Microsoft
Ankur Patel
Ankur Patel leads Growth for Identity Security at Microsoft, championing the cause that everyone has the right to own their digital identity. His team delivers this new form of verifiable credentials that more securely and privately stores all personal data, making the world safer for all....
View profile
Chris Schnieper
Director of Fraud & Identity Market Planning
LexisNexis Risk Solutions
Chris Schnieper
Chris Schnieper is a Director of Market Planning in the Fraud & Identity area. He focuses on working across a variety of different industries from small companies to large multi-national organizations on strategic fraud challenges and authentication needs. Chris has over 20+ years working...
View profile
Lead Sponsor
Microsoft
Playlist
KuppingerCole Webinars
Webinar Recording
Better Business With Smooth and Secure Onboarding Processes
In the modern world of working, organizations need to digitally verify and secure identities at scale. But traditional IAM and CIAM strategies can’t identity-proof people in a meaningful way in the digital era. Finding an automated digital identity proofing system that is passwordless and provides strong authentication, is essential.
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability to communicate technology and cyber risk and map that against direct and indirect business impact is key.
Webinar Recording
Implementing Modern and Future-Proof PAM Solutions
Privilege Access Management (PAM) is changing, driven by the move of most businesses from on-prem IT applications and infrastructure to the cloud, resulting in a multi-could, multi-hybrid IT environment. This has resulted in a proliferation of privileged identities that need to be managed.
Webinar Recording
Bringing Data Back Under Control
Data is your organization’s most important asset, and yet it is increasingly held and processed outside of your control. Data security, resilience and storage is becoming increasingly challenging and costly. A new approach is needed to adapt quickly and bring these things under control amid increasing geopolitical uncertainty and risk.
Webinar Recording
Why Data Resilience Is Key to Digital Transformation
As companies pursue digital transformation to remain competitive, they become more dependent on IT services. This increases the potential business impact of mistakes, natural disasters, and cyber incidents. Business continuity planning, therefore, is a key element of digital transformation, and must cover business-critical data and applications.
Webinar Recording
Effective IAM in the World of Modern Business IT
Digital Transformation promises lower costs, and increased speed and efficiency. But it also leads to a mix of on-prem and cloud-based IT infrastructure, and a proliferation of identities that need to be managed in a complex environment. Organizations adopting a Zero Trust approach to security must find a way to overcome these challenges.
Webinar Recording
Ensuring the Security of Microsoft Active Directory and Azure AD
In the face of increasing cyber-attacks by cybercriminals and nation-states, most organizations are investing in filling in the gaps in their cyber defenses, but as the landmark SolarWinds supply chain breach showed, securing Microsoft Active Directory (AD) is vital, but often overlooked.
Webinar Recording
A Zero Trust Approach to Cyber Resilience
Security in many organizations is not evolving fast enough to keep up with business transformation, including migration to the cloud and to Industry 4.0. These changes, while essential to remain competitive, bring fresh security risks. A new approach is needed to ensure cyber resilience.
Webinar Recording
Secure DevOps: Key to Software Supply Chain Security
In the modern world of flexible and remote working, it is useful for software engineers to be able to access and update source code from anywhere using any device, but the SolarWinds supply chain attack showed that it is essential to track every change for security and compliance reasons.
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
In today's dynamic business landscape, organizations face mounting challenges in managing identity and access risks, while at the same time complying with a growing number of industry sector, national, regional, and international regulations. An integrated approach is essential.