Identiverse 2023 Downloads
The keynote and session recordings, along with the presentation files for the sessions we are able to share are provided below.
Session Title |
Speaker(s) |
Recording |
Presentation |
---|---|---|---|
How to Audit an AI Model for Bias |
Brenda Leong - BNH.AI Tatiana Rice - Future of Privacy Forum |
||
Identity Is the Key to Supply Chain Security |
Marc Boorshtein - Tremolo Security |
||
Introduction to Identity |
Espen Bago - Norwegian Labour and Welfare Admin Lance Peterman - Equitable / Univ of North Carolina at Charlotte |
||
Kantara Initiative - Global Leader in Digital Identity |
Kay Chopard - Kantara Initiative Lynzie Adams - Kantara Initiative |
||
2023 Trends in Securing Digital Identities |
Diane Hagglund - Dimensional Research Rajnish Bhatia - Comcast Jeff Reich - Identity Defined Security Alliance Bernard Diwakar - Intuit Tom Sheffield - Target |
Not Available |
Not Available |
Go Passwordless with Passkeys: A WebAuthn Developer Workshop |
Matthew Miller - Cisco Megan Shamas - FIDO Alliance Nick Steele - 1Password Shane Weeden - IBM |
|
|
Introduction to Privacy |
Jamie Danker - Venable LLP Ivy Orecchio - Venable LLP Zachary Martin - Venable LLP |
||
Seven White Papers on Identity and the OpenID Foundation Strategy |
Gail Hodges - OpenID Foundation Nancy Cam-Winget - Cisco Nat Sakimura - OpenID Foundation Vittorio Bertocci - Auth0/Okta Ramesh Narayanan - MOSIP |
||
Solving the Identity Skills Gap - What Skills are Needed and How Can We Grow New Talent |
Miki Brotzler - NAB Kevin Streater - ForgeRock |
||
Welcome to Identiverse |
Andi Hindle - Identiverse |
Not Available |
|
Identity Under Attack |
Andre Durand - Ping Identity |
||
The CISO Conversation |
Ed Harris - Mauser Packaging Sean Zadig - Yahoo Parham Eftekhari - CyberRisk Alliance Bezawit Sumner - CRISP |
Not Available |
|
Investing in Identity |
James Mirfin - Visa Kathleen Peters - Experian Travis Jarae - Liminal Bob Anderson - Great Hill Partners |
Not Available |
|
Guest Keynote |
MJ Hegar |
Not Available |
Not Available |
Authlete Presents: Security Offered as Components Empowering Enterprises to Gain Control |
Not Available |
Not Available |
Not Available |
LastPass Presents: Thinking Passwordless? Start with a Password Manager |
Not Available |
Not Available |
Not Available |
Veza Presents: Go Beyond IAM with Authorization - Explore the Future of Access Control |
Not Available |
Not Available |
Not Available |
Session Title |
Speaker(s) |
Recording |
Presentation |
---|---|---|---|
Axiomatics Presents: Measuring Success and ROI on Fine-Grained Authorization Initiatives |
Not Available |
Not Available |
Not Available |
KPMG Presents: Succeeding and Supporting Women in Security (panel)
|
Not Available |
Not Available |
Not Available |
Making Passkeys Inevitable |
Andrew Shikiar - FIDO Alliance |
||
Making Things Safer |
Ken Munro - Pen Test Partners |
Not Available |
|
Open Standards for the Intelligent Trust Fabric |
Alex Simons - Microsoft |
||
Bah-da-bah-bah Bottleneck: Addressing Crew Onboarding Challenges at McDonald’s |
Ebony Love - McDonald's |
||
Optiv Presents: Building the Customer Identity Business Case |
James Bonifield - Optiv Security Inc. |
Not Available |
Not Available |
Passkeys are Here! What Now? |
Christiaan Brand - Google |
||
Ping Identity Presents: MFA Prompt Bombing Dismantled |
Patrick Abreo - PayPal Ayelet Avni - Ping Identity |
Not Available |
Not Available |
Stealing Identities and Privilege Escalation: The Real-World Story of a Ransomware Attack |
Joseph Carson - Delinea |
||
Your Customer Doesn't Have a Credential — Now What? |
Steve Pannifer - Consult Hyperion |
||
Zero Trust Architecture for B2C Identity at General Motors |
Andrew Cameron - GM |
||
Liminal Presents: The Evolving Digital Identity Landscape |
Travis Jarae - Liminal |
||
Oops, I got 10 Billion Users! Top 10 Steps to a Healthy and Valuable Account System |
Robin Goldstein - Microsoft |
||
Radiant Logic Presents: From Seven Companies to One: The Journey to One Person, One Identity at AmFam Group |
Reginald Owens - American Family Insurance |
Not Available |
Not Available |
Seamless and Secure — Give Your Customers the Experience They Deserve |
Tom Eggleston - ProofID |
||
Securing Organizations against Large Scale Identity Attacks |
Jose Rodriguez - IBM Priti Patil - IBM |
||
The State of OAuth |
Aaron Parecki - Okta |
||
Veza Presents: IGA Strategies for Achieving Least Privilege |
Rich Dandliker - Veza David Tyburski - Wynn Resorts |
||
A Time Traveler’s Log-In: 5 Customer IAM 'A-ha' Moments from the Future Front Lines |
Matt Connors - Southern New Hampshire University Robert Block - Strivacity |
Not Available |
Not Available |
Bassam Al-Khalidi - Axiad Mark Gardner - MIT Lincoln Laboratory |
Not Available |
Not Available |
|
BeyondTrust Presents: Cyber-Defense Strategies to Protect Cloud Resources & Identities |
Morey Haber - BeyondTrust |
||
Ceremonies |
Ian Glazer - IDPro |
||
Connected Car Identity at Scale |
Steven Venema - ForgeRock |
||
Liminal Presents: Unlocking the Power of Entity Verification |
Will Charnley - Liminal |
||
Mission Possible: How I Defused an In-Progress Identity System Attack |
Guido Grillenmeier - Semperis |
||
Signing Out and Session Management in 2023 |
Vittorio Bertocci - Auth0/Okta |
||
Collision Course: Ethics vs. Human-Centered Design in the New Perimeter |
Nishant Kaushik - Uniken Inc. |
||
Full Disclosure: Behind the Scenes of SD-JWT |
Brian Campbell - Ping Identity |
||
Is FIDO2 a Silver Bullet? A Usability Study of Challenges from Going Passwordless |
Michal Kepkowski - Macquarie University Maciej Machulak - Credit Suisse Nathan Macrides - Credit Suisse |
Not Available |
Not Available |
Liminal Presents: The Business Case for Verifiable Credential Management |
Gilad Rosner - Liminal |
||
Passwordless Isn't Just for Tech: Let's Talk about Manufacturing |
Alyson Ruff - Otis Elevator |
Not Available |
Not Available |
PlainID Presents: Driving Cybersecurity Resilience with Next Generation Authorization |
Tom Ammirati - PlainID Gal Helemski - PlainID |
Not Available |
Not Available |
Post-Compromise Persistence and Detection within IdPs |
Chaim Sanders - Lyft |
||
QOMPLX Presents: The Whole Nine Yards: Establish a Comprehensive Identity Security Stack for Your Business |
Derek Melber - QOMPLX, Inc. |
||
CDW presents: Is Zero Trust Just IAM Done Right? |
Not Available |
Not Available |
Not Available |
iProov Limited presents: Biometrics Mythbuster: Convenience, Inclusivity, and Trust - Fact or Fiction |
Not Available |
Not Available |
Not Available |
Saviynt presents: Distilling the Secrets Behind Converged Identity Management with Jack Daniel's |
Not Available |
Not Available |
Not Available |
SGNL presents: With Great Access Comes Great Responsibility: Enable Apps for Continuous Adaptive Access |
Not Available |
Not Available |
Not Available |
1Kosmos presents: Fast Track Passwordless MFA by Avoiding Five Common Pitfalls |
Not Available |
Not Available |
Not Available |
Axiad presents: The Pragmatic Approach to Phishing-Resistant Authentication: Passkey + CBA |
Not Available |
Not Available |
Not Available |
ForgeRock presents: Never Login Again: The Path to Passwordless is Paved with Orchestration |
Not Available |
Not Available |
Not Available |
BeyondTrust Presents: Protecting your Endpoints with Least Privilege |
Brian Kelly - BeyondTrust Rich Keith - BeyondTrust |
Not Available |
Not Available |
Digital Credentials: Looking Beyond the CSP Model |
Kay Chopard - Kantara Initiative Jonathan Prisby - US Department of Homeland Security Jason Lim - Transportation Security Administration Ketan Mehta - NIST |
Not Available |
Not Available |
Optimizing UX for Passkeys |
Kevin Goldman - Trusona Cam Champeau - Sony Interactive Entertainment Niharika Ved - Intuit Sierre Wolfkostin - Cisco |
||
PII in Practice: Protecting and Understanding Identity and its Vulnerabilities in Black Communities |
James Lee - Identity Theft Resource Center Glenance Green - Black Researchers Collective Tiye McKethen - ITRC |
||
Ping Identity Presents: Passwords Gone in 60 Seconds |
John DaSilva - Ping Identity Yariv Levavi - Ping Identity |
||
QOMPLX Presents: Mind the Gap in Traditional Security: ITDR and Where It Fits in Your Identity Security Stack |
Brian Freedman - QOMPLX, Inc. |
||
Understanding NIST Digital Identity Guidelines: A NIST SP 800-63-4 Master Class |
Ryan Galluzzo - NIST Andrew Regenscheid - NIST |
||
Expanding Identity Verification for Non-Residents in Financial Services |
Parilee Wang - Alloy Mitul Parmar - NeuroID Priya Narka - Nova Credit Martina Huzell - Majority |
Not Available |
Not Available |
Passkey Early Adopters Fireside Chat |
Andrew Shikiar - FIDO Alliance Rakan Khalid - Intuit Christiaan Brand - Google Hannah Hodak - Hyatt Hotels Corporation |
||
Ping Identity Presents: Faster User Experiences with Orchestration |
John DaSilva - Ping Identity Nathan Langton - Ping Identity |
||
Prove You are You in a Zero Trust World |
Len Noe - CyberArk |
||
Radiant Logic Presents: Getting Better Sleep with Analytics-Driven Identity Data Management |
Sebastien Faivre - Brainwave GRC |
||
Realizing Universal Citizen-Centric Identity |
Elizabeth Garber - IDPartner Mark Haine - OpenID Foundation |
||
Transmit Security Presents: One Identity for Each CIAM User: How to Eliminate Siloed Directories with a Smooth Migration to Unified Customer Profiles |
Raj Galagali - Transmit Security Balu Santhosh - Transmit Security |
Not Available |
Not Available |
Digital Identity Across the Globe |
Dima Postnikov - Australian Payments Plus |
||
HYPR Presents: Our Drive to Zero Passwords |
Ryan Rowcliffe - HYPR Cisa Kurian - CVS Health |
||
Pandemic of Risk Perception: Understanding Human Behavior to Improve Identity Security |
Sarah Handler - Netflix |
||
The Four Horsemen of the SSI Apocalypse |
Jeremy Grant - Venable LLP |
||
The History and Future of Digital Wallets |
Stephen Wilson - Lockstep Consulting |
||
Transmit Security Presents: Is It Time to Panic? How Attackers are Leveraging ChatGPT & How to Respond with Intelligent Identity-Security |
David Mahdi - Transmit Security |
||
Trusting the Process - Real-life Lessons on Using Change Management for Zero Trust Success |
Sarah Villarmarzo - Easy Dynamics |
||
Amazon Web Services Presents: A Journey to First-Class, Personalized CIAM, Featuring Neiman Marcus Group |
Marc von Mandel - Amazon Web Services Sriram Vaidyanthan - Neiman Marcus Group |
Not Available |
|
Identity Under Attack: How Generative AI is Fueling Cybercrime as a Service |
Ashish Jain - Arkose Labs |
||
Lightweight Verifiable Credential Schema and Process |
Abbie Barbir - CVS Kim Duffy - Centre Consortium |
||
Tuebora Presents: Policy-driven IGA – Why this approach produces better outcomes? |
Brian Iverson - Tuebora |
||
Verifiable Credentials for the Identity Practitioner |
Vittorio Bertocci - Auth0/Okta |
||
What is a Smart Wallet and How Might It be Implemented? |
Mark Haine - OpenID Foundation Nick Mothershaw - Open Identity Exchange |
||
Who is PAM? Get to Know Her — She Should be a Part of Every Identity Conversation |
Grace Sands - KPMG Zach Limacher - KPMG |
||
Can Subsidiarity Save Decentralization? |
Eve Maler - ForgeRock |
Not Available |
|
E-Commerce Accounts' Anti-Fraud Measures: Balancing Security and Customer Friction |
Karthik Kotha - Kroger |
||
Finding Your Calling: Becoming the Identity Professional |
Janelle Allen - Cisco - Webex Identity |
||
IDMWORKS presents: Correctly planning your Identity & Access Management Journey |
Paul Bedi - IDMWORKS |
||
SGNL Presents: Enterprise Scale Access Management |
Marc Jordan - SGNL |
Not Available |
Not Available |
The European Union Goes Decentralized — Standards and Technical Architecture Behind eIDAS v2 |
Torsten Lodderstedt - yes IDP GmbH Kristina Yasuda - Microsoft |
||
The Ubiquitous Credential - Government-issued Identity in Your Phone and Your Life |
Heather Flanagan - Spherical Cow Consulting Mike Kiser - SailPoint |
||
Amazon Web Services presents: Modernize permissions for your application using Amazon Verified Permissions |
Not Available
|
Not Available |
Not Available |
Silverfort presents: How Ciena Extended MFA & Zero Trust to Legacy Systems, A Customer Story |
Not Available |
Not Available |
Not Available |
Ping Identity presents: Access Controlled: Why Authorization Matters in a Digital Jungle |
Not Available |
Not Available |
Not Available |
PlainID presents: The Role of Authorization in Driving Zero Trust and Identity-First Security |
Not Available |
Not Available |
Not Available |
Telesign presents: Onboarding: Minimizing Friction with Identity Verification Powered by Machine Learning |
Not Available |
Not Available |
Not Available |
CyberArk presents: Identity - The Evolving Attack Surface |
Not Available |
Not Available |
Not Available |
iC Consult presents: ChatGPT & Identity |
Not Available |
Not Available |
Not Available |
Optiv presents: Enabling IGA Adoption through Identity Automation |
Not Available |
Not Available |
Not Available |
Session Title |
Speaker(s) |
Recording |
Presentation |
---|---|---|---|
1Password presents: What Comes next with Passwordless? Discover How a Passkey-centric Future will Change your Business |
Not Available |
Not Available |
Not Available |
Microsoft presents: Identity Risk: Finding the Balance between Security and IAM |
Not Available |
Not Available |
Not Available |
Web3 - The Identity Prince that was Promised |
David Lee - Identity Jedi Solutions |
Not Available |
|
Identity in the C-Suite? The Role of the Chief Identity Officer |
Ian Glazer - IDPro Clar Rosso - (ISC)2 Heather Hinton - PagerDuty Heidi Wachs - Stroz Friedberg, an Aon company Andi Hindle - Identiverse |
Not Available |
|
The Future of Wallets |
Daniel Goldscheider - Open Wallet Foundation Loffie Jordaan - American Association of Motor Vehicle Administrators Ramesh Narayanan - MOSIP Patrick Harding - Ping Identity |
Not Available |
|
Aquera presents: Wrap-n-Extend Your Identity Technology with Aquera’s Industry Leading Identity Platform |
Not Available |
Not Available |
Not Available |
HYPR presents: HYPR + Ping Demo - Best-of-Breed for Passwordless MFA and IDP |
Not Available |
Not Available |
Not Available |
Okta presents: Top Insights from Okta's State of Secure Identity Report |
Not Available |
Not Available |
Not Available |
Are Businesses Ready to Accept Digital Identities? |
Nick Mothershaw - Open Identity Exchange Scott Stuewe - DirectTrust Jeff Highman - Trua Rick Iversen - Australian Payments Plus |
Not Available |
Not Available |
Distributed and Delegated Access Management |
Hans Zandbelt - ZmartZone IAM |
||
IDMWORKS presents: Enabling a data driven Identity program using Data, Process and Risk Management |
Bill Willis - IDMWORKS |
||
Investing in Identity: NIST's Digital Identity Roadmap |
Ryan Galluzzo - NIST Ketan Mehta - NIST Andrew Regenscheid - NIST |
||
Liminal Presents: Consumer Identity: Trends, Innovations, and Customer Perspectives |
Julie Dawson - Yoti Gilad Rosner - Liminal Eve Maler - ForgeRock |
||
Ping Identity Presents: Decentralized Identity, The Tip of Identity's Spear |
Diana Jouard - Ping Identity Gaurav Khot - Ping Identity |
Not Available |
Not Available |
Tuebora Presents: Workload Identities – How to Manage, Govern and Secure Them |
Iranna Hurakadli - Tuebora |
Not Available |
Not Available |
Verifiable Digital Credentials: Comparison and Analysis of Emerging Issuance Protocol Standards |
Andrew Hughes - Ping Identity Torsten Lodderstedt - yes IDP GmbH |
||
A Year with Passkeys |
Tim Cappalli - Microsoft Christiaan Brand - Google Matthew Miller - Cisco Christine Owen - Guidehouse Megan Shamas - FIDO Alliance |
||
BeyondTrust Presents: Automation, Authorization, & Authentication For Your Enterprise |
Rich Keith - BeyondTrust |
Not Available |
Not Available |
Building Interoperable, Decentralized Identity Systems with OpenID for Verifiable Credentials |
Torsten Lodderstedt - yes IDP GmbH Kristina Yasuda - Microsoft |
||
Enforcing Consent Conformance in Your Authorization Logic with a Fine-Grained Permissions Model |
Jean-Francois Lombardo - Amazon Web Services Jeremy Ware - Amazon Web Services |
||
Liminal Presents: Protecting Children Online: How Age Assurance Became the Use Case to Solve For |
Filip Verley - Google Travis Jarae - Liminal Scott Edington - Deep Labs |
Not Available |
Not Available |
QOMPLX Presents: Hybrid Active Directory Attacks: Anatomy and Defenses |
Derek Melber - QOMPLX, Inc. |
||
Radiant Logic Presents: How to Tackle the 4 C’s on Your Road to Zero Trust |
Wade Ellery - Radiant Logic |
||
We the People: Creating a More Perfect Union Starts By Advancing Digital Identity Equity |
Kay Chopard - Kantara Initiative Jordan Burris - Socure Ryan Galluzzo - NIST |
Not Available |
Not Available |
Thales presents: B2B IAM: A Gap Between Modern Demands and Current Practices |
Not Available |
Not Available |
Not Available |
Arkose Labs presents: How Major B2C Brands Use Human Behaviors to Beat Bots at Their Own Game |
Not Available |
Not Available |
Not Available |
CyberSolve presents: An Actionable IAM Assessment - How do we determine what we SHOULD do vs. what we COULD do? |
Not Available |
Not Available |
Not Available |
Microsoft presents: Reduce Fraud and Improve Engagement using Digital Wallets |
Not Available |
Not Available |
Not Available |
BIPA Update |
Doug (OG) OGorden - Dr. BIPA Stewart Baker - Steptoe & Johnson Brian Tengel - Venable LLP |
Not Available |
Not Available |
Bringing National Australia Bank’s Digital Identity to Life: From Ideation to Market Launch |
Rick Iversen - Australian Payments Plus Natalie Reed - Deloitte Australia Linden Dawson - National Australia Bank |
||
High Security and Interoperable OAuth 2.0: What’s the Latest? |
Daniel Fett - Authlete Joseph Heenan - Authlete |
||
IDMWORKS Presents: Modernizing your Consumer IAM Capabilities |
Nick Hunt - IDMWORKS |
||
The Laws of Identity in the Era of Ubiquitous Identity |
Nat Sakimura - OpenID Foundation |
||
Transmit Security Presents: Build a Robust New Account Opening Experience Without Compromising on Security |
Jacob Lehmann - Transmit Security Jim Winters - Transmit Security |
||
Tuebora Presents: How to Improve Safety and Reliability of IT System Onboarding for Identity Governance and Administration |
Brian Iverson - Tuebora |
Not Available |
Not Available |
Authentication: Tales from the Field |
David Martinache - Wavestone |
||
Beam Me Up, Target: Enterprise Scale Zero Trust with Zero Friction |
Ryan Gregus - Target Dileep Sivaraman - Target |
Not Available |
Not Available |
History is Written by the Anomalies—Know the Numbers or be the News |
Pamela Dingle - Microsoft Tia Louden - Microsoft |
Not Available |
Not Available |
How Much Data Do You Really Need to Collect to Know Your Customer? |
Denny Prvu - RBC |
||
Microsoft Presents: The Imperative to Modernize – Saying Goodbye to ADFS and Going Beyond AD |
TJ Cutting - Microsoft David Gregory - Microsoft |
||
Ping Identity Presents: Taking Decentralized Identity from Concept to Reality |
Diana Jouard - Ping Identity Aubrey Turner - Ping Identity |
Not Available |
Not Available |
Transmit Security: Fireside Chat with KeyBank - The State of CIAM and Why Focused Customer Solutions Are Critically Different than Workforce |
David Mahdi - Transmit Security Christopher Nygard - KeyBank |
Not Available |
Not Available |
BeyondTrust Presents: The 2023 Microsoft Vulnerabilities Report – Dissected |
Morey Haber - BeyondTrust |
||
How Hyatt is Driving Exceptional Customer Experiences with Modern FIDO Passwordless Authentication |
Derek Hanson - Yubico Art Chernobrov - Hyatt Hotels Corporation |
||
Identity as a Revenue Driver: Tales from the Product Side of Identity |
Hannah Sutor - GitLab |
||
IDMWORKS Presents: Create your Identity Strategy for Building a Solid Foundation to Allow the Enforcement of Zero Trust Principles |
Abhi Sarmah - IDMWORKS |
||
QOMPLX Presents: The Silent Scream of Every Network: The Horror that is Hybrid Active Directory Security |
Derek Melber - QOMPLX, Inc. |
||
Tectonic Collisions Between Identity and Security in 2023 |
Alexander Weinert - Microsoft |
Not Available |
Not Available |
Tilting at White Towers: Making Your Identity Architecture Actionable |
Stephen Hutchinson - Mitsubishi Bank of Tokyo |
||
1Kosmos Presents: Bringing Verified Identity and Passwordless to the Masses |
Mike Engle - 1Kosmos Kevin Shanley - Amazon Web Services |
||
Crumbling the Cookie: Fixing a Weak Link in Authentication on the Web |
Zachary Voase - Netflix |
||
Do I Panic Now or Later? A Guide to Incident Response and Pressure Management |
Tia Louden - Microsoft |
||
Ping Identity Presents: Navigating the Passwordless Journey |
Samuel Brown - Ping Identity Jay Romero - Erickson Senior Living |
Not Available |
Not Available |
Securing Cross-Device Flows Using Zero Trust Principles |
Nick Ludwig - Microsoft Pieter Kasselman - Microsoft |
||
The Not-So-Obvious Parts of Application Onboarding |
Tabitha Hancock - UberEther |
||
Zero Identity |
Stephen Wilson - Lockstep Consulting |
||
Identity, Inclusion and the Importance of Mentorship |
Eliza Kuzmenko - Amazon Web Services Sarah Handler - Netflix |
||
Lessons Learned in Implementing a Decentralised Identity Platform |
Daniel McGrogan - Workday |
||
Okta Presents: Top Trends from Okta's 2023 Business at Work Report |
Eila Shargh - Okta |
||
Radiant Logic Presents: How to Get to Zero Trust Without Annoying Everyone |
Davis Arora - Honeywell David Prudenti - Honeywell |
Not Available |
Not Available |
Representing Application Permissions Models via the SCIM 2.0 Roles and Entitlements Attributes |
Danny Zollner - Microsoft |
||
Sharing is Caring even with Security—A Journey into the Shared Signals Framework |
Sean O'Dell - The Walt Disney Company |
Not Available |
Not Available |
Thinking Differently About Passkeys - New Threats Require a New Threat Model |
Dean Saxe - Amazon Web Services |
||
Bringing Continual Dynamic Authorization to COTS Applications |
Paul Heaney - ProofID |
||
CAEP Deep Dive: Implementing Session Revocation and Authorization |
Atul Tulshibagwale - SGNL Tim Cappalli - Microsoft |
||
Critical Infrastructure: Can Legacy Apps and Modern MFA Coexist? |
Michael Rothschild - HYPR |
||
Lessons Learned from Lessons Taught |
Lance Peterman - Equitable / Univ of North Carolina at Charlotte |
||
Maximize your Impact as an Identity Professional |
Heather Vescent - The Purple Tornado, Inc |
Not Available |
Not Available |
Securing Microservice-based APIs |
Jonas Iggbom - Curity |
||
Tuebora Presents: CIEM – What to Expect from an IGA Solution in a Multi-Cloud Environment |
Ashish Jhunjhunwala - Tuebora |
Session Title |
Speaker(s) |
Recording |
Presentation |
---|---|---|---|
Bringing Identity Standards into the World of Critical Infrastructure |
Steven Venema - ForgeRock |
||
Building the Plane While Flying, (Or, How to Develop New Identity Talent) |
Arynn Crow - Amazon Web Services |
||
Know thy Enemy: Understanding the Psychology of the Modern Identity Fraudster |
Halil Cem Tonguc - Onfido |
||
Leveraging Multi-Device Passkeys in Regulated Markets |
Rolf Lindemann - Nok Nok |
||
Open Banking and Open Data -The Global State of Play |
Dima Postnikov - Australian Payments Plus Ralph Bragg - Raidiam |
||
The Real Dangers of Synthetic ID |
Amy Shuart - Onfido |
||
Closing the Identity Gap |
Kay Chopard - Kantara Initiative |
||
Jumpstart Your Privileged Account Management Program |
Ken Robertson - Fifth Third Bank |
||
Navigating Your Career Development as an Identity Professional |
Jon Lehtinen - IDPro/Okta |
||
New Approach to IGA Governance: combining Identity, Device and Target governance into one - IDT. |
Vladislav Shapiro - Costidity Inc. |
||
Open Banking: Is It Actually Benefiting Fintechs, Banks, and End Users? |
Joseph Heenan - Authlete Dima Postnikov - Australian Payments Plus |
||
O Say, Can You See...an American Digital Identity Strategy? |
Jeremy Grant - Venable LLP |
||
Programming Engineers: How Standards Shape the Way We Work |
Justin Richer - Bespoke Engineering |
||
Standards in IoT & Identity - How do they Play Together and What are the Gaps to Solve? |
Andre Priebe - iC Consult |
||
Best Practices to Peacefully (and Successfully) Migrate from Password and Passwordless |
Chintan Jain - Hilton |
||
Future-Proofing Against Quantum Computing Threats |
Teresa Wu - IDEMIA Olivier Nora - IDEMIA |
||
Getting it Right: The Business Case for Knowing Your Customers |
Vikas Mundada - Ping Identity Lynette Hushen - Ping Identity |
||
Identity Expansion Across Highly Regulated Jurisdictions |
Brittany Weinstein - KPMG |
||
Jumping the Identity S Curve: Achieving Privacy- Preserving Identity Verification and Federation While Reducing IT and Security Costs |
Tina Srivastava - Badge Inc. |
||
The Butterfly Effect of Standards Development |
Heather Flanagan - Spherical Cow Consulting Mike Kiser - SailPoint |
||
A Miracle Pill for Enterprise SAML |
David Brossard - Axiomatics Sam Rosen - Salesforce Pranesh Radhakrishnan - Salesforce |
||
Building and Protecting a Digital Society: Lessons Learned Unlocking Digital Identities |
Joseph Carson - Delinea |
||
Journey to Integrating Custom Applications to MFA |
Sandeep Talwar - Accenture |
Not Available |
Not Available |
Moving Beyond FIDO2 Limitations with Anonymous Credentials, a Privacy-Preserving Extension, and More |
Michal Kepkowski - Macquarie University Maciej Machulak - Credit Suisse |
Not Available |
Not Available |
What to Consider to Build a Great Passkey User Experience |
Huan Liu - Block Inc. |
||
Authorization: The New Frontier |
Andi Hindle - Identiverse David Brossard - Axiomatics Allan Foster - ForgeRock Galina Livit - Ford Motor Co |
Not Available |
|
Closing Remarks |
Andi Hindle - Identiverse |
Not Available |