Early-bird Discount
expires in
Register Now

Agenda

Fortress Identity

Fortress Identity

Track
Thursday, June 06, 2024 11:00—13:00
Location: A 05-06

The "Fortress Identity" track is dedicated to dissecting the critical nexus of identity management and security. In an age where digital identities are as valuable as physical assets, safeguarding them against escalating threats and vulnerabilities is paramount. This track explores innovative strategies, technologies, and frameworks to fortify identity systems. Join industry leaders and security experts as they navigate the complexities of authentication, authorization, and identity assurance, offering insights into building resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 2 CPE Credits for this track.

After attending this track, participants will be able to:

  • Discuss the critical nexus of identity management and security
  • Recognize the complexities of authentication, authorization, and identity assurance
  • Describe how to build resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats
  • Identify the potential risks of generative AI in Identity and security

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Moderation

Lead Analyst & CTO
KuppingerCole
Research Analyst
KuppingerCole

Sessions

June 06, 2024
11:00 - 11:30
Multi Region - Multi Hyperscaler: The Crucial Role of Identity Providers in Modern IT Architecture and How to Ensure Their Availability
In a modern Zero Trust based IT architecture, the IDP is one of the most central components and therefore one of the most critical ones. As all the requests within the network need to be authenticated, its robustness directly correlates with the overall integrity and continuity of digital and therefore-business operations. Not only the availability but also low latency is key in global distributed ecosystems. As experience has shown, one hyperscaler can’t guarantee this high demand...



June 06, 2024
11:30 - 11:45
Beyond the Surface: The Dark Side of Digital Identity
In the digital age, identity has transcended personal identification, evolving into a complex digital footprint that is as unique as it is vulnerable. This session focuses on the multifaceted and often hidden threats that lurk within digital identity to unravel the digital threats that individuals and organizations face in today's interconnected world. We will explore the mechanics and implications of various threat vectors, including the insidious rise of bot attacks, the...

Arkose Labs


June 06, 2024
11:45 - 12:00
How to Build a Cyber Resilient Infrastructure
Cybersecurity is the biggest challenge of our time. Organizations don't need to deal with the question if they might be affected, they have to face the challenge of how fast they are able to recover once hit by a cyber incident. Data protection as the “last line of defense” is particularly important, but data protection begins well before backup and recovery and goes far beyond creating an incident response plan. This presentation addresses approaches to how a modern cyber...

Commvault Systems GmbH


June 06, 2024
12:00 - 12:20
How Decentralized Identities can Improve the Security in Enterprise Networks
The session will show how SSI can develop its full potential when used in enterprise communication networks. The speaker will talk about his current research on the integration of SSI in the Kerberos protocol (used for authentication in Windows network environments) and in the Extensible Authentication Protocol (used for enterprise network environments). The integration of SSI in those protocols used by most companies today provides a tremendous enhancement in network security and also...



June 06, 2024
12:20 - 12:40
Advancing Secure Credentialing: The Impact of Non-Interactive Threshold Signature Schemes
In the realm of identity management within zero trust security frameworks, the "never trust, always verify" paradigm is critical. This approach, a departure from traditional IT security models, assumes no inherent trust in users, devices, or networks, regardless of their location or origin. It emphasizes continuous verification and authentication, fundamentally changing the way access and credentials are managed. In this context, the role of signature schemes in credential issuance is...

Technical University Darmstadt


June 06, 2024
12:40 - 13:00
Securing the Foundations of Verifiable Credential Ecosystems
As verifiable credentials are adopted at scale in ecosystems around the world, addressing security and privacy challenges is becoming increasingly important. In this talk, I will discuss some of the most pressing issues around protocols and credential formats and how they can — or cannot — be addressed.Using the OpenID and IETF specifications as examples, I will discuss the challenges of establishing trust, mitigating replay and phishing attacks, avoiding linkability and tracking,...

Authlete


Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch