Featured
Decentralized Identity for People & NPEs: Updates, Trends, & Killer Use Cases
Kim Duffy, Executive Director, Decentralized Identity Foundation
Decentralized Identity standards and technologies are moving into the mainstream, whether mentioned explicitly in recent EU digital identity frameworks or re-packaged as "Reusable Identity" to focus on its benefits to onboarding. Kim Duffy, Executive Director of the Decentralized Identity Foundation, covers the key principles and tech behind decentralized identity, trends in adoption, and compelling use cases demonstrating how it can enable a trusted ecosystem, whether you're interacting with people, organizations, devices, or a complex chain including all of these.
All episodes
-
Navigating the Modern Identity Landscape: Successful Transformation Strategies
Ravi Erukulla, Sr. Director of Product Management at Saviynt, Wes Vollmar, Cybersecurity Architect, Marathon Petroleum
Identity today is not what it was a decade ago. Changes in the technology & regulatory landscape, user behavior, and organizational priorities have transformed it from a compliance-oriented discipline to a business enabler — and often a board-level initiative. It has also become the first step to adopting a modern Zero Trust security model.
The latest technology has accelerated the need for identity transformation by impacting the way identity is perceived, practiced, and envisioned. These trends include technology convergence, cloud transformation, software simplification, intelligent automation, and business readiness. Identity is further influenced by adjacent security areas, such as SASE, CSPM, and CyberMesh. So how do you navigate this complex landscape and set your organization up for identity security success? Join us for this live webinar to find out.
In the process, you’ll learn about:
* The leading factors influencing identity transformation
* The top trends driving change (and even some predictions too)
* The benefits of modernizing IAM solutions and practices
* The biggest lessons learned by organizations on the other side
* The most common pitfalls and strategies to consider -
Identity Reboot: Generative AI as a Catalyst for Change
Caleb Sima, Chair of CSA AI Safety Initiative, Cloud Security Alliance | Jeff Reich, Executive Director, IDSA
This presentation will focus on the emergence of generative AI and how it compels us to revisit the fundamental principles of identity in the digital age.
-
Top 10 Digital Identity Trends from the OpenID Foundation
Jennifer Cook, Sr Director of Marketing, National Cybersecurity Alliance | Gail Hodges, Executive Director, OpenID Foundation
There is a lot buzzing across the global Identity landscape. Come geek out with us while we hit the top 10 themes, and find the humorous side of our “wins and losses” as new technologies shake out.
Enjoy the inside track as the OpenID Foundation takes you from the main stage to the back channels of our trade.
-
Embracing the Next Generation Digital Identity: The Migration to Wallet
Stéphanie de Labriolle, Executive Director Consultant, Secure Identity Alliance | Kristel Teyras, Thales Group
In an era where digital interactions dominate our daily lives, the concept of identity management is undergoing a profound transformation. From centralized to decentralized approaches, governments are reevaluating their strategies to adapt to the changing landscape. The emergence of W3C standards brings both opportunities and challenges, prompting governments to tread cautiously.
This presentation explores the migration towards wallet-based digital identities, highlighting the shift from centralized to decentralized models and multi-modal approaches. Moreover, it examines the evolving concept of user-centricity, placing the wallet at the heart of individuals' interactions as citizens, employees, customers, and beyond.
Through this presentation, attendees will gain insights into the evolving landscape of digital identity management, the role of governments in driving decentralization, and the transformative potential of wallet-based identity solutions in fostering user-centric experiences.
Key Points:
– Centralized vs. Decentralized and Multi-Modal Approaches: Governments' Transition
– Navigating W3C Standards: Government Prudence in Implementation
– The Wallet: Pivotal in Achieving User-Centricity Across Various Domains
– Showcase of innovative use cases demonstrating the transformative impact of user-centric wallet-based identities.
– Best practices for ensuring the authenticity and integrity of various types of digital documents within the wallet ecosystem. -
Key Takeaways from the 2024 State of PKI & Digital Trust
Chris Hickman, Chief Security Officer | Ryan Sanders, Senior Director, Product & Customer Marketing | Keyfactor
Cloud, AI, and connected devices have blurred the boundaries of trust. Public key infrastructure is key to staying ahead, defining trust. 72% of organizations say that PKI and machine ID management present serious problems, resulting in outages, incidents, and audit failures. We’ll discuss insights, including PKI and machine IDs in modern IT, threats and trends, and the state of quantum-readiness.
-
Zero Trust: Why It Matters and How to Implement in Your Organization
Mohanned Wael, Senior Solution Consultant, QES | Stéphanie de Labriolle, Secure Identity Alliance
The traditional security model of "trust but verify" is no longer sufficient in today's complex and dynamic threat landscape.
Zero Trust is a security concept that assumes that threats exist both inside and outside the network, and no entity should be trusted by default. -
Modern Battlefield: Attacker Methods, Motivations & Building a Strategic Defense
Brandon McCaffrey, Solutions & Product Strategy Architect | Andy Thompson, CyberArk Labs Research Evangelist | CyberArk
Get in the minds of Criminals, Nation States and Hacktivists. Join us to explore the psychology, motivation, and cutting-edge tactics of today’s threat actors. Our dynamic resident experts, Andy Thompson, and Brandon McCaffrey will unravel the intricacies of recent attacks and evolving threat methods that jeopardize your organization.
-
Introducing OSIA: a Universal Interoperability Framework
Debora Comparin, Standardization Expert, Thales Digital Identity and Security
The OSIA (Open Standards Identity APIs) initiative to drive interoperability of identity systems has been adopted globally by the industry and leveraged as part of wider foundational identity schemes by a growing number of countries.
This presentation will introduce how to leverage OSIA to drive interoperability through identity ecosystems.
– Unleashing market innovation through interoperability
– Leveling the playing field to open markets and drive competition
– Ensuring product(s) compatibility after M&A activity -
Leveraging Identity GRC to Supercharge Your Security Strategy
Mike Cassady, Chief Product Officer, Fastpath
We will cover how Identity GRC can serve as a strategic pillar in a firm’s cybersecurity strategy, providing robust tools and methodologies to safeguard digital assets, proactively managing identity-related risks to simplify compliance efforts and optimize cybersecurity posture.
We will discuss real-world examples to give insights into best practices for implementing Identity GRC effectively. By embracing this powerful approach, firms can learn to not only protect their digital assets but also thrive in the ever-changing cybersecurity landscape. -
People ❤️ Password Notebooks
Cliff Steinhauer, Dir. Info. Security & Engagement | Lisa Plaggemier, Executive Director | National Cybersecurity Alliance
For three years running, the most popular way people say they keep track of their passwords is by writing them down in a password notebook, according to the National Cybersecurity Alliance's annual Oh Behave! Cybersecurity Attitudes and Behaviors Report. We'll talk about those findings and more gleaned from surveying the public in the US, UK, Canada, Germany, France, and New Zealand.
-
Securing Non-Human Identities: Insights from Recent Breaches
Ido Geffen, Vice President, Product, Oasis Security
Recent security breaches, exemplified by incidents such as Cloudflare's, serve as a stark reminder of the inherent security in unmanaged Non-Human Identities (NHIs), such as service accounts, service principals, tokens, secrets and keys. These breaches underscore the complex operational hurdles even the most seasoned security teams struggle to overcome when it comes to governing and securing NHIs. While enterprises have rolled out programs to fortify the security of human identities, most lack a strategy and solution for NHIs.
-
Observations from Real-life Attacks & Measures to Protect Your Environment
Nathan Eades, Sr. Threat Researcher, Permiso Security
Some cloud identity providers have been at the center of high-profile breaches as modern threat actors have been heavily targeting the identity layer of cloud. Many security teams simply don't have visibility into attacks wagered against the identity control plane. In this session, learn how threat actors target the identity control plane and how to secure your IdP to better protect your environment.
-
Micro Authorizations: Enabling Zero Trust in PAM
Sara Peck, Demand Generation Lead | John Martinez, Technical Evangelist | strongDM
The Authorization Fabric decides whether a specific principal is authorized to perform a precise operation on a particular resource and whether the resource permits this access.The granularity of this approach is vital in today’s threat landscape, requiring organizations to shift their focus to a comprehensive, system-wide authorization framework. This shift parallels the principles of microservices but applies them to the realm of access control. Rather than depending on a single point of control, there is a need for a network proxy that acts as a bridge between trust and authorization. Join us on a journey towards a future powered by micro authorizations, where precision, adaptability, and contextual awareness define access control. Explore how micro authorizations can address contemporary security challenges and facilitate the adoption of the Zero Trust model.
-
Insights from the 2024 IDPro Skills, Programs & Diversity Survey
Heather Flanagan, Executive Director and Principal Editor, IDPro
As the digital identity landscape continues to evolve at a rapid pace, understanding the needs, skills, and diversity of its practitioners is crucial for steering the industry towards a more inclusive and effective future. Join Heather Flanagan, Executive Director for IDPro and Principal Editor for the IDPro Body of Knowledge, for a sneak preview of the 2024 IDPro Skills, Programs & Diversity Survey results. This session aims to shed light on the current state of the digital identity industry, highlighting key trends in practitioner skills, program development challenges, and the critical importance of diversity in fostering innovation. [Optional Add] Participants will gain valuable insights into: - The emerging skills and expertise areas in high demand within the digital identity field. - Strategic guidance for individuals seeking to advance their careers and for organizations aiming to strengthen their identity management programs. - The role of diversity in driving technological and service innovation, and how organizations can tap into emerging opportunities. - Strategic guidance for businesses looking ahead to future opportunities and challenges in the world of digital identity.
-
Navigating Threats & Solutions in The Age of AI-driven Business
Rob Sebaugh, Identity Strategist & Principal Solutions Consultant, SailPoint
In today's rapidly evolving business environment, the significance of identity security cannot be overstated. With both employees and non-employees having access to critical applications, data, and infrastructure, the need for robust identity security measures has never been more pressing.
-
Decentralized Identity for People & NPEs: Updates, Trends, & Killer Use Cases
Kim Duffy, Executive Director, Decentralized Identity Foundation
Decentralized Identity standards and technologies are moving into the mainstream, whether mentioned explicitly in recent EU digital identity frameworks or re-packaged as "Reusable Identity" to focus on its benefits to onboarding. Kim Duffy, Executive Director of the Decentralized Identity Foundation, covers the key principles and tech behind decentralized identity, trends in adoption, and compelling use cases demonstrating how it can enable a trusted ecosystem, whether you're interacting with people, organizations, devices, or a complex chain including all of these.