Event Recording

Verifiable Credentials for the Modern Identity Practitioner

Show description
Speaker
Vittorio Bertocci
Principal Architect
Okta
Vittorio Bertocci
Vittorio Bertocci is a Principal Architect in Okta and host of the Identity, Unlocked podcast. A veteran of the identity industry, with more than 20 years of hands-on experience, he helped usher the claims based identity era with his work on identity for developers in Microsoft,...
View profile
Top related content
Webinar Recording
Verifiable Credentials: A Fresh Approach to Identity in the Digital Era
Oct 13, 2021

Establishing a verified digital identity is crucial to successful business collaboration and customer engagement in the digital economy. Verifiable Credentials provide a highly secure way of establishing digital identity. However, knowing exactly how to begin using this approach can be challenging.

Event Recording
Pamela Dingle: Timely Disruption - Why is Decentralized Identity Different?
Feb 04, 2021
Event Recording
The 'Credentials-first Mobile-first' Identity Ecosystem
May 11, 2022

This is a new development in the world and touches on mDL, Verifiable Credentials, decentralized identity, and personal data topics. A forward-looking presentation about what the world might look like, the foundational changes represented by this change, and some current and potential innovations that are now possible because of this.

Event Recording
Decentralized Identity: The Way Forward
May 10, 2023

Decentralized Identity is enabling individuals and organizations to have control over their own personal data, providing self-sovereignty, privacy and security. But, is a relatively new concept with high development and standardization dynamics. In this session we will look into what we should do today to take full advantage of this promising concept.

Event Recording
How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials
May 10, 2023

OpenID for Verifiable Credentials (OID4VC) is a set of protocols that enables issuance and presentation of verifiable credentials expressed in any format including but not limited to W3C vc-data-model and ISO/IEC 18013-5 mDL. The power of the protocols lies in its demonstrated simplicity, security, and the implementer's ability to make choices across the tech stack - not just for credential formats, but also entity identifiers, trust model, crypto suites, revocation mechanism, etc. However, this also means that to be interoperable and enable certain use-cases(s), implementers need to agree on the sets of choices across the tech stack, usually referred to as interoperability profiles.

In this talk, we will share implementation experience of OID4VC specifications, and introduce existing interoperability profiles based on OID4VC. Of course we will also provide updates to OID4VC specifications, how they have evolved from the last year based on an overwhelming amount of implementation feedback.

Event Recording
Covering Your Customer Identity Needs - The Way Forward
May 12, 2023

The Art of CIAM is to converge user Experience (UX) , security and privacy in a way that is seamless and unobtrusive for the user. In this panel session we will discuss the role of decentralized technologies, biometrics, and AI in Digtal ID, allowing for more secure and efficient authentication processes. 

Event Recording
Remote onboarding with Verifiable Credentials
May 12, 2022

Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent adoption across other industry verticals. In this session, the speakers will demonstrate an open standard based approach to ID verification based on verifiable credentials and decentralized identifiers for remote onboarding across industries. With this new approach users can verify their identity once and use their credentials with any organization. Enterprises can leverage this simpler cost-saving approach to remotely onboard employees, partners and customers compliantly while respecting the end users’ privacy.

Event Recording
Decentralized Identity - Why is it all the Rage?
May 11, 2023

From digital identity to full scale digital trust, this session is perfect for anyone new to identity, as well as identity professionals who are trying to get a handle on what decentralization is all about and why it is so important for Internet-scale digital trust.

In this session, we will cover a brief history of how the identity landscape has gone through an evolution from the dreaded username and password, through centralized, federated and social logins, to now the need for decentralized solutions that support digital trust for both human and objects.

We will explain the various actors involved in a decentralized identity trust triangle, what role technology plays (e.g., digital wallets and digital credentials), and how governance of an ecosystem fits in to create the trust diamond. We will discuss various technical components that may be employed and what is required — and more importantly what is not? We will also present how decentralized trust solutions can support the trust of objects that have nothing to do with human identity, but are necessary to create a digital trust landscape that enables digital transactions to happen seamlessly, efficiently, and automatically.

We’ll also touch on how the traditional identity solutions and emerging decentralization can co-exist in context appropriate settings.

Event Recording
The Killer Credential - Spotting Verifiable Credentials That Are Absolute Must-Haves for Every Party in an Ecosystem
Dec 07, 2022

Digital identity has already changed the world in positive ways over the years, and yet many of our security and privacy aims are at risk and under more pressure than ever. Building new ecosystems is very difficult. If the future is full of wallets, as we’ve heard, what will – and should – be the breakout use case for verifiable credentials? And how can we avoid worsening the security, privacy, and user control challenges we seek to vanquish?