Session Title |
Speaker(s) |
Recording |
Presentation |
|
---|---|---|---|---|
Opening Keynote: Andre Durand, Ping Identity |
|
|||
The Economic Impact of Identity Inclusivity |
Kimberly Sutherland - LexisNexis Risk Solutions |
|||
Keynote: Digital Identity at United Airlines |
Deneen DeFiore - United Airlines |
|||
Special Guest: Tucker Bryant |
Tucker Bryant |
|||
Introduction to Privacy |
Jamie Danker - Venable LLP |
Not Available |
||
Attack Path Management 101 |
Eric Woodruff - Semperis |
Not Available |
||
Confidential Computing: The Internet’s Missing Cryptography Engine |
Mike Bursell - Confidential Computing Consortium |
|||
Data Sharing Using Verifiable Credentials in the Agricultural Sector |
Paul Ashley - Anonyome Labs |
|||
Global Trends & 2024 Strategy: OpenID Foundation Board Insights |
John Bradley - Yubico |
|||
2024 Trends in Securing Digital Identities |
Rajnish Bhatia - Comcast |
Not Available |
||
|
Megan Shamas - FIDO Alliance |
Not Available |
||
OIX Workshop: The DNA of DigitalID |
Nick Mothershaw - Open Identity Exchange |
|||
Innovation Workshop: Overcoming Obstacles to Empower Innovators to Advance Identity and Security |
Pamela Dingle - Microsoft |
Not Available |
||
Enabling a Trusted Ecosystem for the US Pharmacy Supply Chain |
Mark Karhoff - Ten Count Consulting |
|||
The Kantara Initiative in 2024 |
Kay Chopard - Kantara Initiative |
|||
Introduction to Identity |
Lance Peterman - Dick’s Sporting Goods |
|||
The Authorization Conversation |
Alexandre Babeanu - 3 Edges |
|||
|
Luke Jennings - Push Security |
|||
Untangling the Tangled Web of Digital Identity Online Presentation |
John Bradley - Yubico |
Session Title |
Speaker(s) |
Recording |
Presentation |
||
---|---|---|---|---|---|
Eye on Identity: Observing the Unseen with Data and AI
|
John Pritchard - Radiant Logic |
||||
Bringing Digital Identity to the UK Economy |
Hannah Rutter - Department for Science, Innovation & Technology |
Not Available |
Not Available |
||
|
|
||||
The Pitch Hit |
Pamela Dingle - Microsoft |
||||
General Motors Road to Modern Consumer Identity |
Andrew Cameron - GM |
||||
|
Sriram Karra - Google Inc Christiaan Brand - Google Inc |
||||
PETs: Not Your Parent’s Digital Identity Solutions |
|
||||
Ping Identity Presents: From Legacy to Leading-Edge: New American Funding's IAM Transformation |
Adam Preis - Ping Identity |
||||
|
Danny Kadyshevitch - Transmit Security |
||||
Radiant Logic Presents: From Complexity to Clarity: AdventHealth's Journey to Modern Identity Management |
David Moosavifazel - AdventHealth |
||||
|
Kaliya Young - Identity Woman in Business |
||||
ACR: The Missing Security Control |
Pamela Dingle - Microsoft |
||||
Cisco Presents: Give Your Users a Diamond Status Authentication Experience |
Chris Anderson - Cisco Duo |
||||
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape |
David Brossard - Axiomatics |
||||
|
Soumya Banerjee - McKinsey & Co |
||||
2024 Design Guidelines for Passkeys |
Kevin Goldman - FIDO Alliance |
||||
Shielding Consumers: Defense in Depth Strategies Against Credential Abuse |
Brock Humes - Fifth Third Bank |
||||
CyberArk Presents: Navigating the Risk Spectrum: Enhancing Security for High-Risk Workforce Users |
Jared Brodsky - CyberArk |
||||
|
John Wunderlich - JLINC Labs |
||||
This Is the Sign You Have Been Looking For |
Katryna Dow - Meeco |
||||
|
Gemma Bird - iProov |
||||
Debugging FIDO At Scale |
Jaimin Bhatt - AWS Identity |
||||
Identity Security with CAEP, the Hype is Real! |
Tim Cappalli - Okta |
Not Available |
Not Available |
||
Radiant Logic Presents: How to Transform Rubber Stamp Access Reviews into a Powerful Security Operation with AI |
Wade Ellery - Radiant Logic |
||||
Decoding Mobile ID Ecosystem Dynamics through Public-Private Partnerships |
William Fisher - NIST |
||||
Ping Identity Presents: The Power of Orchestration: Navigating Multi-Brand Experiences |
Nathan Langton - Ping Identity |
||||
IDMWORKS Presents: Not Another Breach - Healthcare Challenges with IAM and the Healthcare Renaissance |
Nicholas Hunt - IDMWorks |
||||
Cisco Presents: Defining & Building an Identity Graph |
Didi Dotan - Cisco |
||||
FIDO, Passkeys and the State of Passwordless |
Andrew Shikiar - FIDO Alliance |
||||
|
Linden Dawson - NAB |
||||
Guardians of the Digital Estate: Navigating Identity Threats with Confidence |
Andrew Cameron - GM |
||||
Delighting Business with Identity: The Power of Listening |
Alyson Ruff - Otis Elevator |
||||
|
Michael Harries - Robotics Hub |
||||
IDMWORKS Presents: PAM Current State and Maturity Model |
Nicholas Hunt - IDMWorks |
||||
Microsoft Presents: Secure Access for Any Trustworthy Identity, Anywhere, to Anything |
Nichole Peterson - Microsoft |
||||
|
David Brossard - Axiomatics |
||||
Crushing SMS Toll Fraud: Yahoo's Strategy to Win the Battle Against SMS Pumping Attacks |
Gary Gwin - Yahoo |
Not Available |
Not Available |
||
CyberSolve Presents: Maximizing ROI from IGA Programs - A Fast Lane Case Example |
Mohit Vaish - CyberSolve |
||||
Are Buyers Ready for Digital ID? Or Are They Confused? |
|
||||
|
Ritu Rajan - Liberty Mutual |
Not Available |
|||
A New Normal: Insights From AWS' Journey to Enforce MFA |
Arynn Crow - AWS |
Not Available |
|||
Google Presents: Passkeys, Credential Manager, and the Future of Android Authentication |
Diego Zavala - Google |
Not Available |
|||
CyberArk Presents: Sin City: Pop. 26 Million. The Explosion of Stolen Passwords and Where We Go from Here |
|
||||
Getting Intentional About Intentions: A Conversation About the Ethics Imperative in Digital Identity |
Nishant Kaushik - Uniken Inc. |
||||
|
|
||||
1Kosmos Presents: Biometric Authentication Versus the Threat of Deepfakes |
|
||||
Lessons Learned: Nationwide eID Recovery with Remote Identity Proofing |
|
||||
A New Approach to Inclusive, Accessible ID Verification Using Vouching |
Chloe Coleman - Interrobang |
||||
|
Todd Fletcher - Versent |
||||
Axiad Presents: Authentication: Upheaval or Evolution? |
Bassam AI-Khalidi - Axiad |
||||
BeyondTrust Presents: Does Your Organization Suffer from an Identity Crisis? |
Morey Haber - BeyondTrust |
||||
Five Challenges to Building Your Own Identity Platform …and How to be Successful Anyway |
Tom Sheffield - Target |
||||
The Dawn of a New Age in DEIA |
Kay Chopard - Kantara Initiative |
||||
The Highway to Hell is Littered with Unverified Passkeys |
Jeff Corrigan - Yahoo |
||||
Dashlane Presents: How Stanford Protects 50,000 Students, Faculty and Employees from Identity-Focused Threats |
John Bennett - Dashlane |
||||
HYPR Presents: Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats |
Ryan Rowcliffe - HYPR |
||||
CDW Presents: Delivering Customer Experiences in the Age of Digital Identities: A Vision |
Chris Olive - CDW |
||||
The State of OAuth 2024 |
Aaron Parecki - Okta |
||||
Droids at the Helm: Mastering Workload Identity in a Universe of Automation |
Matt Topper - UberEther |
||||
The State of Digital Trust |
|
Not Available |
|||
We Built a Mentorship Program for Women in Technology (WIT) From the Ground Up |
Alyson Ruff - Otis Elevator |
||||
Thales Presents: Identity Convergence: Navigating the Intersection of Digital and Physical Spaces |
|
Not Available |
|||
|
Bertrand Carlier - Wavestone |
||||
The Paradigm Shift: From Centralized to Decentralized Identity |
Travis Spencer - Curity |
||||
PlainID Presents: Mitigate Identity-Related Breaches in the Era of Identity-Centric Security |
Gal Helemski - PlainID |
||||
SailPoint Presents: Identity for Security and Business at AES and NVIDIA |
Vidya Ganesh - AES Corp |
||||
Extending SCIM Standards for Hyperscale Implementations |
Dean Saxe - AWS Identity |
Not Available |
|||
A Year of NO: Building Organizational IAM Guardrail Policies That Work |
Noam Dahan - Tenable |
Not Available |
Session Title |
Speaker(s) |
Recording |
Presentation |
|
---|---|---|---|---|
The IAM Evolution - Forging a Path to Idealized Identity Security |
Matt Caulfield - Cisco |
|||
Beyond the Surface: The Dark Side of Digital Identity |
Ashish Jain - Arkose Labs |
|||
The Power of Passwordless |
Andrew Shikiar - FIDO Alliance |
|||
CyberArk Presents: Transforming Identity: No-Code Solutions for Ditching Legacy and Embracing Modern IAM |
|
|||
Tuebora Presents: Revolutionizing IGA with Generative AI Capabilities |
Sanjay Nadimpalli - Tuebora |
|||
Redefining Privacy: Zero Identity in a Zero Trust World |
|
|||
What I Wish I Knew When I was an Identity n00b |
Beth Abramowitz - MITRE Corporation |
|||
Why VCs Want to Fund Identity Startups in 2024 |
|
|||
|
Remy Lyle - Ping Identity |
|||
Providing and Quantifying Equitable Opportunities in Digital Identity |
Tiffany Andrews - GSA - Login.gov |
|||
Digital Identity, the G20, and the SIDI Hub Survey |
Gail Hodges - OpenID Foundation |
|||
CyberSolve Presents: ServiceNow + Identity NOW - A Match in Heaven! Or Hell! - A Coexistence Demo |
Mak Tomar - CyberSolve |
Not Available |
||
Ping Identity Presents: Device Trust: Key to a Seamless Passwordless Experience |
|
|||
Privacy & Identity in Incident Response |
Michael Borgia - Davis Wright Tremaine |
|||
10 years of OpenID Connect |
John Bradley - Yubico |
|||
|
David Lee - Identity Jedi Solutions |
|||
Hello, FIDO! Perspectives on FIDO and US Federal Agencies' Road to Zero Trust |
Jeremy Grant - Venable LLP |
|||
Co-Designing Australia's ConnectID |
|
|||
Google Presents: FedCM and Identity Best Practices |
|
|||
IDMWORKS Presents: What, Why and How of IGA Modernization with SaaS |
Abhi Sarmah - IDMWORKS |
|||
Navigating User Adoption: Challenges and Solutions in Passwordless Authentication |
Chase Evans - KPMG |
|||
SGNL Presents: Shrinking Blast Radius With Zero-Standing Access |
Atul Tulshibagwale - SGNL |
|||
Tuebora Presents: Governance Imperatives for Policy-Driven Administration |
Sanjay Nadimpalli - Tuebora |
|||
High-security & interoperable OAuth 2: What’s the Latest? |
Joseph Heenan - Authlete Daniel Fett - Authlete |
|||
Embracing Zero Standing Privilege: A New Era of Authorization |
Sean O'Dell - The Walt Disney Company |
Not Available |
Not Available |
|
|
Ann Wachholz - Andersen Corporation |
|||
Counselors in the Modern Era: Advancing Identity Management |
Ian Glazer - Weave Identity |
|||
Microsoft Presents: Secure Access with AI: Deep-Dive into IAM Powered by Microsoft Copilot for Security |
Sarah Scott - Microsoft |
|||
Radiant Logic Presents: How The Home Depot Delivers Workforce Directory and Authentication Modernization at Scale |
Megan Fotter - Home Depot |
|||
PAM Integration: Managing Apps & Non-Human Accounts |
Ken Robertson - Fifth Third Bank |
|||
Cost and Conversion Rates: Measuring CIAM Success 12 Months After Go-Live and Looking Ahead to the Next 12 |
Matt Connors - Southern New Hampshire University |
|||
Passkeys, Passwordless, & Practical Considerations: Stories from Netflix’s Enterprise Passwordless Journey |
Ian Haken - Netflix |
|||
SAML Post-Mortem: Evolution, Challenges, and Future Prospects |
Shannon Roddy - Berkeley |
|||
Fireside Chat: Login.gov Lessons Learned and Paths Ahead |
|
Not Available |
||
TechDemocracy Presents: Ensuring the Win: A Three-Stage Approach to IAM & CIAM Success |
Todd Rossin - TechDemocracy |
Not Available |
||
|
Andrew de Mesa - Okta |
|||
The Reality of Implementing Identity Governance: Notes from the Trenches |
Sonal Agrawal - Sprinklr |
Not Available |
||
Cisco Presents: Groundhog Day, but with Compromised Credentials |
Ted Kietzman - Cisco |
|||
Google Presents: Bringing Passkeys to Critical Mass |
Mitchell Galavan - Google |
Not Available |
||
Multilateral Federation: The Solution to the Problem that Identity Wallets Don’t Yet Understand They Have |
John Bradley - Yubico |
|||
Ping Identity Presents: Connecting the Dots with CIAM: Three Keys to Growing Your Bottom Line |
Clint Hardison - Navy Federal Credit Union |
|||
Top 5 Lessons - Implementing Decentralized Identity at Raiffeisen Bank |
Loren Russon - Ping Identity |
Not Available |
||
Global Identity Fraud: An Exclusive Look at the Real Numbers |
Ofer Friedman - AU10TIX |
|||
Lessons Learned from the World’s Largest Deployment of NIST High-Assurance Credentials |
Angela Gartland - Internal Revenue Service |
|||
Ping Identity Presents: Reimagine B2B and Third-Party Identity Management: Modern Requirements and Strategies |
|
|||
Saviynt Presents: Creating Brand Harmony: A VF Corporation Perspective on Converged Identity Playbook |
Bashira Baset - VF Corporation |
|||
Untangling FIDO and Passkey Concepts |
Danny Zollner - Microsoft |
|||
One McDonald's Way: The Global Identity & Access Journey at McDonald's |
George Roberts - McDonald's |
|||
Hidden Digital Identity Infrastructure |
|
|||
Cybersolve Presents: Unified IGA, PAM and AM Orchestration Based Approach for Maximizing IAM Adoption |
|
|||
Curity Presents: Securing Single Page Applications Using the Token Handler Pattern |
Jonas Iggbom - Curity |
|||
Revolutionizing North American Banking |
Joseph Heenan - Authlete |
|||
When Something Goes Wrong: Are You Ready? Real stories of IGA |
Vladislav Shapiro - Costidity Inc. |
|||
|
Dean Saxe - AWS Identity |
|||
Unmasking Fraud: Understanding the Operational Dynamics of Identity Deception |
Marcin Zimny - Ping Identity |
|||
|
Rich Dandliker - Veza |
|||
Read Out from the AuthZEN Interop Event |
|
|||
Better Identity: Five Years In, Is the Government Making Progress? |
Jeremy Grant - Venable LLP |
|||
|
Chris Hendrix - Styra |
|||
Identity as a Revenue Engine |
Aviad Mizrachi - Frontegg |
Not Available |
||
|
Sarah Cecchetti - Amazon Web Services |
|||
Using Standards: Some Assembly Required |
Mike Jones - Self-Issued Consulting, LLC |
|||
Identity for Life, Higher Education and Beyond! |
Paul Heaney - ProofID |
|||
KYC SOS: Optimizing KYC Friction to Balance Customer Experience Against Identity Vulnerabilities |
Brittany Allen - Sift |
|||
The Relentless Creep of Identity Proofing |
|
Session Title |
Speaker(s) |
Recording |
Presentation |
|
---|---|---|---|---|
Unlocking the Future: How Generation Alpha Will Redefine Identity and Authentication |
Chintan Jain - Hilton |
|||
IGA Paradigm Shift: Permission Life Cycle |
Jim Montgomery - TriVir |
|||
Navigating the Passkey Landscape: Early Adopter Insights |
Rew Islam - Dashlane |
|||
Graph-Based Harmony: Simplifying ZTA in the Age of Data Breaches |
Alexandre Babeanu - 3 Edges |
|||
Modern Apple Identity Management Best Practices |
Michael Epping - Microsoft |
|||
Do it Right: A Comparative Analysis of Authenticators |
Fei Liu - Okta |
|||
Architectural Patterns for Distributed Authorization |
Tim Hinrichs - Styra |
Not Available |
||
Quality (Identity) Data Makes the World Go Round |
|
|||
Understanding U.S. Public-Facing Identity Flows: Brownfield vs. Greenfield |
Jonathan Prisby - Dept. of Homeland Security |
|||
Use Identity for Zero Trust API Security |
Jonas Iggbom - Curity |
|||
Lessons Learned on the Road to Educating Your IAM Clients |
Duc Le - Bloomberg |
|||
|
Tia Louden - Microsoft |
|||
Requirements for Successful B2B Engagement |
Marco Venuti - Thales Group |
Not Available |
||
Your Passport Chip to the Rescue - Unphishable Account Recovery for Everyone |
Rob Brown - Inverid |
|||
Becoming the Strategic Identity Leader We Need |
Michelle Wan - Workday |
Not Available |
||
|
Siddharth Thakkar - Deloitte |
Not Available |
||
Mobile Identity, Native Authentication - Lessons Learned While Implementing the “OAuth 2.0 For First Party Apps” Draft |
Jeff Corrigan - Yahoo |
|||
|
Elvar Olafsson - JakobsenID |
|||
From Keynote to Action: Building Workload Identity Foundations with Standards |
George Fletcher - Capital One |
|||
Decoding Bias in Biometrics with a Strategic Source Selection Approach |
Teresa Wu - IDEMIA |
|||
Securing the Foundations of Verifiable Credential Ecosystems |
Joseph Heenan - Authlete |
|||
Digital Identities in the Metaverse and Virtual Worlds |
|
|||
|
Shane Weeden - IBM |
|||
|
Marc Castrovinci - HP Inc |
|||
CTAP 2.1: FIDO’s New Tricks for Passkeys on Security Keys |
Will Smart - Yubico |
|||
Securing Digital Identity Wallets Using FIDO Security Keys |
Joost Van Dijk - Yubico |
|||
Navigating Your Career Path in Identity and Access Management (IAM) |
Randy Harris - GE Vernova |
|||
Final Footprints: Shaping Digital Legacies |
Dean Saxe - AWS Identity |
|||
The Future of Authorization |
George Roberts - McDonald's |