
Identiverse 2023 Downloads
The keynote and session recordings, along with the presentation files for the sessions we are able to share are provided below.
Session Title  | 
                    Speaker(s)  | 
                    Recording  | 
                    Presentation  | 
            
|---|---|---|---|
How to Audit an AI Model for Bias  | 
                            Brenda Leong - BNH.AI Tatiana Rice - Future of Privacy Forum  | 
                            ||
Identity Is the Key to Supply Chain Security  | 
                            Marc Boorshtein - Tremolo Security  | 
                            ||
Introduction to Identity  | 
                            Espen Bago - Norwegian Labour and Welfare Admin Lance Peterman - Equitable / Univ of North Carolina at Charlotte  | 
                            ||
Kantara Initiative - Global Leader in Digital Identity  | 
                            Kay Chopard - Kantara Initiative Lynzie Adams - Kantara Initiative  | 
                            ||
2023 Trends in Securing Digital Identities  | 
                            Diane Hagglund - Dimensional Research Rajnish Bhatia - Comcast Jeff Reich - Identity Defined Security Alliance Bernard Diwakar - Intuit Tom Sheffield - Target  | 
                            Not Available  | 
                            Not Available  | 
                    
Go Passwordless with Passkeys: A WebAuthn Developer Workshop  | 
                            Matthew Miller - Cisco Megan Shamas - FIDO Alliance Nick Steele - 1Password Shane Weeden - IBM  | 
                            
 
  | 
                            |
Introduction to Privacy  | 
                            Jamie Danker - Venable LLP Ivy Orecchio - Venable LLP Zachary Martin - Venable LLP  | 
                            ||
Seven White Papers on Identity and the OpenID Foundation Strategy  | 
                            Gail Hodges - OpenID Foundation Nancy Cam-Winget - Cisco Nat Sakimura - OpenID Foundation Vittorio Bertocci - Auth0/Okta Ramesh Narayanan - MOSIP  | 
                            ||
Solving the Identity Skills Gap - What Skills are Needed and How Can We Grow New Talent  | 
                            Miki Brotzler - NAB Kevin Streater - ForgeRock  | 
                            ||
Welcome to Identiverse  | 
                            Andi Hindle - Identiverse  | 
                            Not Available  | 
                    |
Identity Under Attack  | 
                            Andre Durand - Ping Identity  | 
                            ||
The CISO Conversation  | 
                            Ed Harris - Mauser Packaging Sean Zadig - Yahoo Parham Eftekhari - CyberRisk Alliance Bezawit Sumner - CRISP  | 
                            Not Available  | 
                    |
Investing in Identity  | 
                            James Mirfin - Visa Kathleen Peters - Experian Travis Jarae - Liminal Bob Anderson - Great Hill Partners  | 
                            Not Available  | 
                    |
Guest Keynote  | 
                            MJ Hegar  | 
                            Not Available  | 
                            Not Available  | 
                    
Authlete Presents: Security Offered as Components Empowering Enterprises to Gain Control  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
LastPass Presents: Thinking Passwordless? Start with a Password Manager  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Veza Presents: Go Beyond IAM with Authorization - Explore the Future of Access Control  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Session Title  | 
                    Speaker(s)  | 
                    Recording  | 
                    Presentation  | 
            
|---|---|---|---|
Axiomatics Presents: Measuring Success and ROI on Fine-Grained Authorization Initiatives  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
KPMG Presents: Succeeding and Supporting Women in Security (panel) 
  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Making Passkeys Inevitable  | 
                            Andrew Shikiar - FIDO Alliance  | 
                            ||
Making Things Safer  | 
                            Ken Munro - Pen Test Partners  | 
                            Not Available  | 
                    |
Open Standards for the Intelligent Trust Fabric  | 
                            Alex Simons - Microsoft  | 
                            ||
Bah-da-bah-bah Bottleneck: Addressing Crew Onboarding Challenges at McDonald’s  | 
                            Ebony Love - McDonald's  | 
                            ||
Optiv Presents: Building the Customer Identity Business Case  | 
                            James Bonifield - Optiv Security Inc.  | 
                            Not Available  | 
                            Not Available  | 
                    
Passkeys are Here! What Now?  | 
                            Christiaan Brand - Google  | 
                            ||
Ping Identity Presents: MFA Prompt Bombing Dismantled  | 
                            Patrick Abreo - PayPal Ayelet Avni - Ping Identity  | 
                            Not Available  | 
                            Not Available  | 
                    
Stealing Identities and Privilege Escalation: The Real-World Story of a Ransomware Attack  | 
                            Joseph Carson - Delinea  | 
                            ||
Your Customer Doesn't Have a Credential — Now What?  | 
                            Steve Pannifer - Consult Hyperion  | 
                            ||
Zero Trust Architecture for B2C Identity at General Motors  | 
                            Andrew Cameron - GM  | 
                            ||
Liminal Presents: The Evolving Digital Identity Landscape  | 
                            Travis Jarae - Liminal  | 
                            ||
Oops, I got 10 Billion Users! Top 10 Steps to a Healthy and Valuable Account System  | 
                            Robin Goldstein - Microsoft  | 
                            ||
Radiant Logic Presents: From Seven Companies to One: The Journey to One Person, One Identity at AmFam Group  | 
                            Reginald Owens - American Family Insurance  | 
                            Not Available  | 
                            Not Available  | 
                    
Seamless and Secure — Give Your Customers the Experience They Deserve  | 
                            Tom Eggleston - ProofID  | 
                            ||
Securing Organizations against Large Scale Identity Attacks  | 
                            Jose Rodriguez - IBM Priti Patil - IBM  | 
                            ||
The State of OAuth  | 
                            Aaron Parecki - Okta  | 
                            ||
Veza Presents: IGA Strategies for Achieving Least Privilege  | 
                            Rich Dandliker - Veza David Tyburski - Wynn Resorts  | 
                            ||
A Time Traveler’s Log-In: 5 Customer IAM 'A-ha' Moments from the Future Front Lines  | 
                            Matt Connors - Southern New Hampshire University Robert Block - Strivacity  | 
                            Not Available  | 
                            Not Available  | 
                    
Bassam Al-Khalidi - Axiad Mark Gardner - MIT Lincoln Laboratory  | 
                            Not Available  | 
                            Not Available  | 
                    |
BeyondTrust Presents: Cyber-Defense Strategies to Protect Cloud Resources & Identities  | 
                            Morey Haber - BeyondTrust  | 
                            ||
Ceremonies  | 
                            Ian Glazer - IDPro  | 
                            ||
Connected Car Identity at Scale  | 
                            Steven Venema - ForgeRock  | 
                            ||
Liminal Presents: Unlocking the Power of Entity Verification  | 
                            Will Charnley - Liminal  | 
                            ||
Mission Possible: How I Defused an In-Progress Identity System Attack  | 
                            Guido Grillenmeier - Semperis  | 
                            ||
Signing Out and Session Management in 2023  | 
                            Vittorio Bertocci - Auth0/Okta  | 
                            ||
Collision Course: Ethics vs. Human-Centered Design in the New Perimeter  | 
                            Nishant Kaushik - Uniken Inc.  | 
                            ||
Full Disclosure: Behind the Scenes of SD-JWT  | 
                            Brian Campbell - Ping Identity  | 
                            ||
Is FIDO2 a Silver Bullet? A Usability Study of Challenges from Going Passwordless  | 
                            Michal Kepkowski - Macquarie University Maciej Machulak - Credit Suisse Nathan Macrides - Credit Suisse  | 
                            Not Available  | 
                            Not Available  | 
                    
Liminal Presents: The Business Case for Verifiable Credential Management  | 
                            Gilad Rosner - Liminal  | 
                            ||
Passwordless Isn't Just for Tech: Let's Talk about Manufacturing  | 
                            Alyson Ruff - Otis Elevator  | 
                            Not Available  | 
                            Not Available  | 
                    
PlainID Presents: Driving Cybersecurity Resilience with Next Generation Authorization  | 
                            Tom Ammirati - PlainID Gal Helemski - PlainID  | 
                            Not Available  | 
                            Not Available  | 
                    
Post-Compromise Persistence and Detection within IdPs  | 
                            Chaim Sanders - Lyft  | 
                            ||
QOMPLX Presents: The Whole Nine Yards: Establish a Comprehensive Identity Security Stack for Your Business  | 
                            Derek Melber - QOMPLX, Inc.  | 
                            ||
CDW presents: Is Zero Trust Just IAM Done Right?  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
iProov Limited presents: Biometrics Mythbuster: Convenience, Inclusivity, and Trust - Fact or Fiction  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Saviynt presents: Distilling the Secrets Behind Converged Identity Management with Jack Daniel's  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
SGNL presents: With Great Access Comes Great Responsibility: Enable Apps for Continuous Adaptive Access  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
1Kosmos presents: Fast Track Passwordless MFA by Avoiding Five Common Pitfalls  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Axiad presents: The Pragmatic Approach to Phishing-Resistant Authentication: Passkey + CBA  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
ForgeRock presents: Never Login Again: The Path to Passwordless is Paved with Orchestration  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
BeyondTrust Presents: Protecting your Endpoints with Least Privilege  | 
                            Brian Kelly - BeyondTrust Rich Keith - BeyondTrust  | 
                            Not Available  | 
                            Not Available  | 
                    
Digital Credentials: Looking Beyond the CSP Model  | 
                            Kay Chopard - Kantara Initiative Jonathan Prisby - US Department of Homeland Security Jason Lim - Transportation Security Administration Ketan Mehta - NIST  | 
                            Not Available  | 
                            Not Available  | 
                    
Optimizing UX for Passkeys  | 
                            Kevin Goldman - Trusona Cam Champeau - Sony Interactive Entertainment Niharika Ved - Intuit Sierre Wolfkostin - Cisco  | 
                            ||
PII in Practice: Protecting and Understanding Identity and its Vulnerabilities in Black Communities  | 
                            James Lee - Identity Theft Resource Center Glenance Green - Black Researchers Collective Tiye McKethen - ITRC  | 
                            ||
Ping Identity Presents: Passwords Gone in 60 Seconds  | 
                            John DaSilva - Ping Identity Yariv Levavi - Ping Identity  | 
                            ||
QOMPLX Presents: Mind the Gap in Traditional Security: ITDR and Where It Fits in Your Identity Security Stack  | 
                            Brian Freedman - QOMPLX, Inc.  | 
                            ||
Understanding NIST Digital Identity Guidelines: A NIST SP 800-63-4 Master Class  | 
                            Ryan Galluzzo - NIST Andrew Regenscheid - NIST  | 
                            ||
Expanding Identity Verification for Non-Residents in Financial Services  | 
                            Parilee Wang - Alloy Mitul Parmar - NeuroID Priya Narka - Nova Credit Martina Huzell - Majority  | 
                            Not Available  | 
                            Not Available  | 
                    
Passkey Early Adopters Fireside Chat  | 
                            Andrew Shikiar - FIDO Alliance Rakan Khalid - Intuit Christiaan Brand - Google Hannah Hodak - Hyatt Hotels Corporation  | 
                            ||
Ping Identity Presents: Faster User Experiences with Orchestration  | 
                            John DaSilva - Ping Identity Nathan Langton - Ping Identity  | 
                            ||
Prove You are You in a Zero Trust World  | 
                            Len Noe - CyberArk  | 
                            ||
Radiant Logic Presents: Getting Better Sleep with Analytics-Driven Identity Data Management  | 
                            Sebastien Faivre - Brainwave GRC  | 
                            ||
Realizing Universal Citizen-Centric Identity  | 
                            Elizabeth Garber - IDPartner Mark Haine - OpenID Foundation  | 
                            ||
Transmit Security Presents: One Identity for Each CIAM User: How to Eliminate Siloed Directories with a Smooth Migration to Unified Customer Profiles  | 
                            Raj Galagali - Transmit Security Balu Santhosh - Transmit Security  | 
                            Not Available  | 
                            Not Available  | 
                    
Digital Identity Across the Globe  | 
                            Dima Postnikov - Australian Payments Plus  | 
                            ||
HYPR Presents: Our Drive to Zero Passwords  | 
                            Ryan Rowcliffe - HYPR Cisa Kurian - CVS Health  | 
                            ||
Pandemic of Risk Perception: Understanding Human Behavior to Improve Identity Security  | 
                            Sarah Handler - Netflix  | 
                            ||
The Four Horsemen of the SSI Apocalypse  | 
                            Jeremy Grant - Venable LLP  | 
                            ||
The History and Future of Digital Wallets  | 
                            Stephen Wilson - Lockstep Consulting  | 
                            ||
Transmit Security Presents: Is It Time to Panic? How Attackers are Leveraging ChatGPT & How to Respond with Intelligent Identity-Security  | 
                            David Mahdi - Transmit Security  | 
                            ||
Trusting the Process - Real-life Lessons on Using Change Management for Zero Trust Success  | 
                            Sarah Villarmarzo - Easy Dynamics  | 
                            ||
Amazon Web Services Presents: A Journey to First-Class, Personalized CIAM, Featuring Neiman Marcus Group  | 
                            Marc von Mandel - Amazon Web Services Sriram Vaidyanthan - Neiman Marcus Group  | 
                            Not Available  | 
                    |
Identity Under Attack: How Generative AI is Fueling Cybercrime as a Service  | 
                            Ashish Jain - Arkose Labs  | 
                            ||
Lightweight Verifiable Credential Schema and Process  | 
                            Abbie Barbir - CVS Kim Duffy - Centre Consortium  | 
                            ||
Tuebora Presents: Policy-driven IGA – Why this approach produces better outcomes?  | 
                            Brian Iverson - Tuebora  | 
                            ||
Verifiable Credentials for the Identity Practitioner  | 
                            Vittorio Bertocci - Auth0/Okta  | 
                            ||
What is a Smart Wallet and How Might It be Implemented?  | 
                            Mark Haine - OpenID Foundation Nick Mothershaw - Open Identity Exchange  | 
                            ||
Who is PAM? Get to Know Her — She Should be a Part of Every Identity Conversation  | 
                            Grace Sands - KPMG Zach Limacher - KPMG  | 
                            ||
Can Subsidiarity Save Decentralization?  | 
                            Eve Maler - ForgeRock  | 
                            Not Available  | 
                            |
E-Commerce Accounts' Anti-Fraud Measures: Balancing Security and Customer Friction  | 
                            Karthik Kotha - Kroger  | 
                            ||
Finding Your Calling: Becoming the Identity Professional  | 
                            Janelle Allen - Cisco - Webex Identity  | 
                            ||
IDMWORKS presents: Correctly planning your Identity & Access Management Journey  | 
                            Paul Bedi - IDMWORKS  | 
                            ||
SGNL Presents: Enterprise Scale Access Management  | 
                            Marc Jordan - SGNL  | 
                            Not Available  | 
                            Not Available  | 
                    
The European Union Goes Decentralized — Standards and Technical Architecture Behind eIDAS v2  | 
                            Torsten Lodderstedt - yes IDP GmbH Kristina Yasuda - Microsoft  | 
                            ||
The Ubiquitous Credential - Government-issued Identity in Your Phone and Your Life  | 
                            Heather Flanagan - Spherical Cow Consulting Mike Kiser - SailPoint  | 
                            ||
Amazon Web Services presents: Modernize permissions for your application using Amazon Verified Permissions  | 
                            Not Available 
  | 
                            Not Available  | 
                            Not Available  | 
                    
Silverfort presents: How Ciena Extended MFA & Zero Trust to Legacy Systems, A Customer Story  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Ping Identity presents: Access Controlled: Why Authorization Matters in a Digital Jungle  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
PlainID presents: The Role of Authorization in Driving Zero Trust and Identity-First Security  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Telesign presents: Onboarding: Minimizing Friction with Identity Verification Powered by Machine Learning  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
CyberArk presents: Identity - The Evolving Attack Surface  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
iC Consult presents: ChatGPT & Identity  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Optiv presents: Enabling IGA Adoption through Identity Automation  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Session Title  | 
                    Speaker(s)  | 
                    Recording  | 
                    Presentation  | 
            
|---|---|---|---|
1Password presents: What Comes next with Passwordless? Discover How a Passkey-centric Future will Change your Business  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Microsoft presents: Identity Risk: Finding the Balance between Security and IAM  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Web3 - The Identity Prince that was Promised  | 
                            David Lee - Identity Jedi Solutions  | 
                            Not Available  | 
                    |
Identity in the C-Suite? The Role of the Chief Identity Officer  | 
                            Ian Glazer - IDPro Clar Rosso - (ISC)2 Heather Hinton - PagerDuty Heidi Wachs - Stroz Friedberg, an Aon company Andi Hindle - Identiverse  | 
                            Not Available  | 
                    |
The Future of Wallets  | 
                            Daniel Goldscheider - Open Wallet Foundation Loffie Jordaan - American Association of Motor Vehicle Administrators Ramesh Narayanan - MOSIP Patrick Harding - Ping Identity  | 
                            Not Available  | 
                    |
Aquera presents: Wrap-n-Extend Your Identity Technology with Aquera’s Industry Leading Identity Platform  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
HYPR presents: HYPR + Ping Demo - Best-of-Breed for Passwordless MFA and IDP  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Okta presents: Top Insights from Okta's State of Secure Identity Report  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Are Businesses Ready to Accept Digital Identities?  | 
                            Nick Mothershaw - Open Identity Exchange Scott Stuewe - DirectTrust Jeff Highman - Trua Rick Iversen - Australian Payments Plus  | 
                            Not Available  | 
                            Not Available  | 
                    
Distributed and Delegated Access Management  | 
                            Hans Zandbelt - ZmartZone IAM  | 
                            ||
IDMWORKS presents: Enabling a data driven Identity program using Data, Process and Risk Management  | 
                            Bill Willis - IDMWORKS  | 
                            ||
Investing in Identity: NIST's Digital Identity Roadmap  | 
                            Ryan Galluzzo - NIST Ketan Mehta - NIST Andrew Regenscheid - NIST  | 
                            ||
Liminal Presents: Consumer Identity: Trends, Innovations, and Customer Perspectives  | 
                            Julie Dawson - Yoti Gilad Rosner - Liminal Eve Maler - ForgeRock  | 
                            ||
Ping Identity Presents: Decentralized Identity, The Tip of Identity's Spear  | 
                            Diana Jouard - Ping Identity Gaurav Khot - Ping Identity  | 
                            Not Available  | 
                            Not Available  | 
                    
Tuebora Presents: Workload Identities – How to Manage, Govern and Secure Them  | 
                            Iranna Hurakadli - Tuebora  | 
                            Not Available  | 
                            Not Available  | 
                    
Verifiable Digital Credentials: Comparison and Analysis of Emerging Issuance Protocol Standards  | 
                            Andrew Hughes - Ping Identity Torsten Lodderstedt - yes IDP GmbH  | 
                            ||
A Year with Passkeys  | 
                            Tim Cappalli - Microsoft Christiaan Brand - Google Matthew Miller - Cisco Christine Owen - Guidehouse Megan Shamas - FIDO Alliance  | 
                            ||
BeyondTrust Presents: Automation, Authorization, & Authentication For Your Enterprise  | 
                            Rich Keith - BeyondTrust  | 
                            Not Available  | 
                            Not Available  | 
                    
Building Interoperable, Decentralized Identity Systems with OpenID for Verifiable Credentials  | 
                            Torsten Lodderstedt - yes IDP GmbH Kristina Yasuda - Microsoft  | 
                            ||
Enforcing Consent Conformance in Your Authorization Logic with a Fine-Grained Permissions Model  | 
                            Jean-Francois Lombardo - Amazon Web Services Jeremy Ware - Amazon Web Services  | 
                            ||
Liminal Presents: Protecting Children Online: How Age Assurance Became the Use Case to Solve For  | 
                            Filip Verley - Google Travis Jarae - Liminal Scott Edington - Deep Labs  | 
                            Not Available  | 
                            Not Available  | 
                    
QOMPLX Presents: Hybrid Active Directory Attacks: Anatomy and Defenses  | 
                            Derek Melber - QOMPLX, Inc.  | 
                            ||
Radiant Logic Presents: How to Tackle the 4 C’s on Your Road to Zero Trust  | 
                            Wade Ellery - Radiant Logic  | 
                            ||
We the People: Creating a More Perfect Union Starts By Advancing Digital Identity Equity  | 
                            Kay Chopard - Kantara Initiative Jordan Burris - Socure Ryan Galluzzo - NIST  | 
                            Not Available  | 
                            Not Available  | 
                    
Thales presents: B2B IAM: A Gap Between Modern Demands and Current Practices  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Arkose Labs presents: How Major B2C Brands Use Human Behaviors to Beat Bots at Their Own Game  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
CyberSolve presents: An Actionable IAM Assessment - How do we determine what we SHOULD do vs. what we COULD do?  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
Microsoft presents: Reduce Fraud and Improve Engagement using Digital Wallets  | 
                            Not Available  | 
                            Not Available  | 
                            Not Available  | 
                    
BIPA Update  | 
                            Doug (OG) OGorden - Dr. BIPA Stewart Baker - Steptoe & Johnson Brian Tengel - Venable LLP  | 
                            Not Available  | 
                            Not Available  | 
                    
Bringing National Australia Bank’s Digital Identity to Life: From Ideation to Market Launch  | 
                            Rick Iversen - Australian Payments Plus Natalie Reed - Deloitte Australia Linden Dawson - National Australia Bank  | 
                            ||
High Security and Interoperable OAuth 2.0: What’s the Latest?  | 
                            Daniel Fett - Authlete Joseph Heenan - Authlete  | 
                            ||
IDMWORKS Presents: Modernizing your Consumer IAM Capabilities  | 
                            Nick Hunt - IDMWORKS  | 
                            ||
The Laws of Identity in the Era of Ubiquitous Identity  | 
                            Nat Sakimura - OpenID Foundation  | 
                            ||
Transmit Security Presents: Build a Robust New Account Opening Experience Without Compromising on Security  | 
                            Jacob Lehmann - Transmit Security Jim Winters - Transmit Security  | 
                            ||
Tuebora Presents: How to Improve Safety and Reliability of IT System Onboarding for Identity Governance and Administration  | 
                            Brian Iverson - Tuebora  | 
                            Not Available  | 
                            Not Available  | 
                    
Authentication: Tales from the Field  | 
                            David Martinache - Wavestone  | 
                            ||
Beam Me Up, Target: Enterprise Scale Zero Trust with Zero Friction  | 
                            Ryan Gregus - Target Dileep Sivaraman - Target  | 
                            Not Available  | 
                            Not Available  | 
                    
History is Written by the Anomalies—Know the Numbers or be the News  | 
                            Pamela Dingle - Microsoft Tia Louden - Microsoft  | 
                            Not Available  | 
                            Not Available  | 
                    
How Much Data Do You Really Need to Collect to Know Your Customer?  | 
                            Denny Prvu - RBC  | 
                            ||
Microsoft Presents: The Imperative to Modernize – Saying Goodbye to ADFS and Going Beyond AD  | 
                            TJ Cutting - Microsoft David Gregory - Microsoft  | 
                            ||
Ping Identity Presents: Taking Decentralized Identity from Concept to Reality  | 
                            Diana Jouard - Ping Identity Aubrey Turner - Ping Identity  | 
                            Not Available  | 
                            Not Available  | 
                    
Transmit Security: Fireside Chat with KeyBank - The State of CIAM and Why Focused Customer Solutions Are Critically Different than Workforce  | 
                            David Mahdi - Transmit Security Christopher Nygard - KeyBank  | 
                            Not Available  | 
                            Not Available  | 
                    
BeyondTrust Presents: The 2023 Microsoft Vulnerabilities Report – Dissected  | 
                            Morey Haber - BeyondTrust  | 
                            ||
How Hyatt is Driving Exceptional Customer Experiences with Modern FIDO Passwordless Authentication  | 
                            Derek Hanson - Yubico Art Chernobrov - Hyatt Hotels Corporation  | 
                            ||
Identity as a Revenue Driver: Tales from the Product Side of Identity  | 
                            Hannah Sutor - GitLab  | 
                            ||
IDMWORKS Presents: Create your Identity Strategy for Building a Solid Foundation to Allow the Enforcement of Zero Trust Principles  | 
                            Abhi Sarmah - IDMWORKS  | 
                            ||
QOMPLX Presents: The Silent Scream of Every Network: The Horror that is Hybrid Active Directory Security  | 
                            Derek Melber - QOMPLX, Inc.  | 
                            ||
Tectonic Collisions Between Identity and Security in 2023  | 
                            Alexander Weinert - Microsoft  | 
                            Not Available  | 
                            Not Available  | 
                    
Tilting at White Towers: Making Your Identity Architecture Actionable  | 
                            Stephen Hutchinson - Mitsubishi Bank of Tokyo  | 
                            ||
1Kosmos Presents: Bringing Verified Identity and Passwordless to the Masses  | 
                            Mike Engle - 1Kosmos Kevin Shanley - Amazon Web Services  | 
                            ||
Crumbling the Cookie: Fixing a Weak Link in Authentication on the Web  | 
                            Zachary Voase - Netflix  | 
                            ||
Do I Panic Now or Later? A Guide to Incident Response and Pressure Management  | 
                            Tia Louden - Microsoft  | 
                            ||
Ping Identity Presents: Navigating the Passwordless Journey  | 
                            Samuel Brown - Ping Identity Jay Romero - Erickson Senior Living  | 
                            Not Available  | 
                            Not Available  | 
                    
Securing Cross-Device Flows Using Zero Trust Principles  | 
                            Nick Ludwig - Microsoft Pieter Kasselman - Microsoft  | 
                            ||
The Not-So-Obvious Parts of Application Onboarding  | 
                            Tabitha Hancock - UberEther  | 
                            ||
Zero Identity  | 
                            Stephen Wilson - Lockstep Consulting  | 
                            ||
Identity, Inclusion and the Importance of Mentorship  | 
                            Eliza Kuzmenko - Amazon Web Services Sarah Handler - Netflix  | 
                            ||
Lessons Learned in Implementing a Decentralised Identity Platform  | 
                            Daniel McGrogan - Workday  | 
                            ||
Okta Presents: Top Trends from Okta's 2023 Business at Work Report  | 
                            Eila Shargh - Okta  | 
                            ||
Radiant Logic Presents: How to Get to Zero Trust Without Annoying Everyone  | 
                            Davis Arora - Honeywell David Prudenti - Honeywell  | 
                            Not Available  | 
                            Not Available  | 
                    
Representing Application Permissions Models via the SCIM 2.0 Roles and Entitlements Attributes  | 
                            Danny Zollner - Microsoft  | 
                            ||
Sharing is Caring even with Security—A Journey into the Shared Signals Framework  | 
                            Sean O'Dell - The Walt Disney Company  | 
                            Not Available  | 
                            Not Available  | 
                    
Thinking Differently About Passkeys - New Threats Require a New Threat Model  | 
                            Dean Saxe - Amazon Web Services  | 
                            ||
Bringing Continual Dynamic Authorization to COTS Applications  | 
                            Paul Heaney - ProofID  | 
                            ||
CAEP Deep Dive: Implementing Session Revocation and Authorization  | 
                            Atul Tulshibagwale - SGNL Tim Cappalli - Microsoft  | 
                            ||
Critical Infrastructure: Can Legacy Apps and Modern MFA Coexist?  | 
                            Michael Rothschild - HYPR  | 
                            ||
Lessons Learned from Lessons Taught  | 
                            Lance Peterman - Equitable / Univ of North Carolina at Charlotte  | 
                            ||
Maximize your Impact as an Identity Professional  | 
                            Heather Vescent - The Purple Tornado, Inc  | 
                            Not Available  | 
                            Not Available  | 
                    
Securing Microservice-based APIs  | 
                            Jonas Iggbom - Curity  | 
                            ||
Tuebora Presents: CIEM – What to Expect from an IGA Solution in a Multi-Cloud Environment  | 
                            Ashish Jhunjhunwala - Tuebora  | 
                            
Session Title  | 
                    Speaker(s)  | 
                    Recording  | 
                    Presentation  | 
            
|---|---|---|---|
Bringing Identity Standards into the World of Critical Infrastructure  | 
                            Steven Venema - ForgeRock  | 
                            ||
Building the Plane While Flying, (Or, How to Develop New Identity Talent)  | 
                            Arynn Crow - Amazon Web Services  | 
                            ||
Know thy Enemy: Understanding the Psychology of the Modern Identity Fraudster  | 
                            Halil Cem Tonguc - Onfido  | 
                            ||
Leveraging Multi-Device Passkeys in Regulated Markets  | 
                            Rolf Lindemann - Nok Nok  | 
                            ||
Open Banking and Open Data -The Global State of Play  | 
                            Dima Postnikov - Australian Payments Plus Ralph Bragg - Raidiam  | 
                            ||
The Real Dangers of Synthetic ID  | 
                            Amy Shuart - Onfido  | 
                            ||
Closing the Identity Gap  | 
                            Kay Chopard - Kantara Initiative  | 
                            ||
Jumpstart Your Privileged Account Management Program  | 
                            Ken Robertson - Fifth Third Bank  | 
                            ||
Navigating Your Career Development as an Identity Professional  | 
                            Jon Lehtinen - IDPro/Okta  | 
                            ||
New Approach to IGA Governance: combining Identity, Device and Target governance into one - IDT.  | 
                            Vladislav Shapiro - Costidity Inc.  | 
                            ||
Open Banking: Is It Actually Benefiting Fintechs, Banks, and End Users?  | 
                            Joseph Heenan - Authlete Dima Postnikov - Australian Payments Plus  | 
                            ||
O Say, Can You See...an American Digital Identity Strategy?  | 
                            Jeremy Grant - Venable LLP  | 
                            ||
Programming Engineers: How Standards Shape the Way We Work  | 
                            Justin Richer - Bespoke Engineering  | 
                            ||
Standards in IoT & Identity - How do they Play Together and What are the Gaps to Solve?  | 
                            Andre Priebe - iC Consult  | 
                            ||
Best Practices to Peacefully (and Successfully) Migrate from Password and Passwordless  | 
                            Chintan Jain - Hilton  | 
                            ||
Future-Proofing Against Quantum Computing Threats  | 
                            Teresa Wu - IDEMIA Olivier Nora - IDEMIA  | 
                            ||
Getting it Right: The Business Case for Knowing Your Customers  | 
                            Vikas Mundada - Ping Identity Lynette Hushen - Ping Identity  | 
                            ||
Identity Expansion Across Highly Regulated Jurisdictions  | 
                            Brittany Weinstein - KPMG  | 
                            ||
Jumping the Identity S Curve: Achieving Privacy- Preserving Identity Verification and Federation While Reducing IT and Security Costs  | 
                            Tina Srivastava - Badge Inc.  | 
                            ||
The Butterfly Effect of Standards Development  | 
                            Heather Flanagan - Spherical Cow Consulting Mike Kiser - SailPoint  | 
                            ||
A Miracle Pill for Enterprise SAML  | 
                            David Brossard - Axiomatics Sam Rosen - Salesforce Pranesh Radhakrishnan - Salesforce  | 
                            ||
Building and Protecting a Digital Society: Lessons Learned Unlocking Digital Identities  | 
                            Joseph Carson - Delinea  | 
                            ||
Journey to Integrating Custom Applications to MFA  | 
                            Sandeep Talwar - Accenture  | 
                            Not Available  | 
                            Not Available  | 
                    
Moving Beyond FIDO2 Limitations with Anonymous Credentials, a Privacy-Preserving Extension, and More  | 
                            Michal Kepkowski - Macquarie University Maciej Machulak - Credit Suisse  | 
                            Not Available  | 
                            Not Available  | 
                    
What to Consider to Build a Great Passkey User Experience  | 
                            Huan Liu - Block Inc.  | 
                            ||
Authorization: The New Frontier  | 
                            Andi Hindle - Identiverse David Brossard - Axiomatics Allan Foster - ForgeRock Galina Livit - Ford Motor Co  | 
                            Not Available  | 
                    |
Closing Remarks  | 
                            Andi Hindle - Identiverse  | 
                            Not Available  | 
                    

