
Identiverse 2024 Downloads
The keynote and session recordings, along with the presentation files for the sessions we are able to share are provided below.
| Session Title | Speaker(s) | Recording | Presentation | |
|---|---|---|---|---|
| Opening Keynote: Andre Durand, Ping Identity | 
 | |||
| The Economic Impact of Identity Inclusivity | Kimberly Sutherland - LexisNexis Risk Solutions | |||
| Keynote: Digital Identity at United Airlines | Deneen DeFiore - United Airlines | |||
| Special Guest: Tucker Bryant | Tucker Bryant | |||
| Introduction to Privacy | Jamie Danker - Venable LLP | Not Available | ||
| Attack Path Management 101 | Eric Woodruff - Semperis | Not Available | ||
| Confidential Computing: The Internet’s Missing Cryptography Engine | Mike Bursell - Confidential Computing Consortium | |||
| Data Sharing Using Verifiable Credentials in the Agricultural Sector | Paul Ashley - Anonyome Labs | |||
| Global Trends & 2024 Strategy: OpenID Foundation Board Insights | John Bradley - Yubico | |||
| 2024 Trends in Securing Digital Identities | Rajnish Bhatia - Comcast | Not Available | ||
| 
 | Megan Shamas - FIDO Alliance | Not Available | ||
| OIX Workshop: The DNA of DigitalID | Nick Mothershaw - Open Identity Exchange | |||
| Innovation Workshop: Overcoming Obstacles to Empower Innovators to Advance Identity and Security | Pamela Dingle - Microsoft | Not Available | ||
| Enabling a Trusted Ecosystem for the US Pharmacy Supply Chain | Mark Karhoff - Ten Count Consulting | |||
| The Kantara Initiative in 2024 | Kay Chopard - Kantara Initiative | |||
| Introduction to Identity | Lance Peterman - Dick’s Sporting Goods | |||
| The Authorization Conversation | Alexandre Babeanu - 3 Edges | |||
| 
 | Luke Jennings - Push Security | |||
| Untangling the Tangled Web of Digital Identity Online Presentation | John Bradley - Yubico | 
| Session Title | Speaker(s) | Recording | Presentation | ||
|---|---|---|---|---|---|
| Eye on Identity: Observing the Unseen with Data and AI 
 | John Pritchard - Radiant Logic | ||||
| Bringing Digital Identity to the UK Economy | Hannah Rutter - Department for Science, Innovation & Technology | Not Available | Not Available | ||
| 
 | 
 | ||||
| The Pitch Hit | Pamela Dingle - Microsoft | ||||
| General Motors Road to Modern Consumer Identity | Andrew Cameron - GM | ||||
| 
 | Sriram Karra - Google Inc Christiaan Brand - Google Inc | ||||
| PETs: Not Your Parent’s Digital Identity Solutions | 
 | ||||
| Ping Identity Presents: From Legacy to Leading-Edge: New American Funding's IAM Transformation | Adam Preis - Ping Identity | ||||
| 
 | Danny Kadyshevitch - Transmit Security | ||||
| Radiant Logic Presents: From Complexity to Clarity: AdventHealth's Journey to Modern Identity Management | David Moosavifazel - AdventHealth | ||||
| 
 | Kaliya Young - Identity Woman in Business | ||||
| ACR: The Missing Security Control | Pamela Dingle - Microsoft | ||||
| Cisco Presents: Give Your Users a Diamond Status Authentication Experience | Chris Anderson - Cisco Duo | ||||
| Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape | David Brossard - Axiomatics | ||||
| 
 | Soumya Banerjee - McKinsey & Co | ||||
| 2024 Design Guidelines for Passkeys | Kevin Goldman - FIDO Alliance | ||||
| Shielding Consumers: Defense in Depth Strategies Against Credential Abuse | Brock Humes - Fifth Third Bank | ||||
| CyberArk Presents: Navigating the Risk Spectrum: Enhancing Security for High-Risk Workforce Users | Jared Brodsky - CyberArk | ||||
| 
 | John Wunderlich - JLINC Labs | ||||
| This Is the Sign You Have Been Looking For | Katryna Dow - Meeco | ||||
| 
 | Gemma Bird - iProov | ||||
| Debugging FIDO At Scale | Jaimin Bhatt - AWS Identity | ||||
| Identity Security with CAEP, the Hype is Real! | Tim Cappalli - Okta | Not Available | Not Available | ||
| Radiant Logic Presents: How to Transform Rubber Stamp Access Reviews into a Powerful Security Operation with AI | Wade Ellery - Radiant Logic | ||||
| Decoding Mobile ID Ecosystem Dynamics through Public-Private Partnerships | William Fisher - NIST | ||||
| Ping Identity Presents: The Power of Orchestration: Navigating Multi-Brand Experiences | Nathan Langton - Ping Identity | ||||
| IDMWORKS Presents: Not Another Breach - Healthcare Challenges with IAM and the Healthcare Renaissance | Nicholas Hunt - IDMWorks | ||||
| Cisco Presents: Defining & Building an Identity Graph | Didi Dotan - Cisco | ||||
| FIDO, Passkeys and the State of Passwordless | Andrew Shikiar - FIDO Alliance | ||||
| 
 | Linden Dawson - NAB | ||||
| Guardians of the Digital Estate: Navigating Identity Threats with Confidence | Andrew Cameron - GM | ||||
| Delighting Business with Identity: The Power of Listening | Alyson Ruff - Otis Elevator | ||||
| 
 | Michael Harries - Robotics Hub | ||||
| IDMWORKS Presents: PAM Current State and Maturity Model | Nicholas Hunt - IDMWorks | ||||
| Microsoft Presents: Secure Access for Any Trustworthy Identity, Anywhere, to Anything | Nichole Peterson - Microsoft | ||||
| 
 | David Brossard - Axiomatics | ||||
| Crushing SMS Toll Fraud: Yahoo's Strategy to Win the Battle Against SMS Pumping Attacks | Gary Gwin - Yahoo | Not Available | Not Available | ||
| CyberSolve Presents: Maximizing ROI from IGA Programs - A Fast Lane Case Example | Mohit Vaish - CyberSolve | ||||
| Are Buyers Ready for Digital ID? Or Are They Confused? | 
 | ||||
| 
 | Ritu Rajan - Liberty Mutual | Not Available | |||
| A New Normal: Insights From AWS' Journey to Enforce MFA | Arynn Crow - AWS | Not Available | |||
| Google Presents: Passkeys, Credential Manager, and the Future of Android Authentication | Diego Zavala - Google | Not Available | |||
| CyberArk Presents: Sin City: Pop. 26 Million. The Explosion of Stolen Passwords and Where We Go from Here | 
 | ||||
| Getting Intentional About Intentions: A Conversation About the Ethics Imperative in Digital Identity | Nishant Kaushik - Uniken Inc. | ||||
| 
 | 
 | ||||
| 1Kosmos Presents: Biometric Authentication Versus the Threat of Deepfakes | 
 | ||||
| Lessons Learned: Nationwide eID Recovery with Remote Identity Proofing | 
 | ||||
| A New Approach to Inclusive, Accessible ID Verification Using Vouching | Chloe Coleman - Interrobang | ||||
| 
 | Todd Fletcher - Versent | ||||
| Axiad Presents: Authentication: Upheaval or Evolution? | Bassam AI-Khalidi - Axiad | ||||
| BeyondTrust Presents: Does Your Organization Suffer from an Identity Crisis? | Morey Haber - BeyondTrust | ||||
| Five Challenges to Building Your Own Identity Platform …and How to be Successful Anyway | Tom Sheffield - Target | ||||
| The Dawn of a New Age in DEIA | Kay Chopard - Kantara Initiative | ||||
| The Highway to Hell is Littered with Unverified Passkeys | Jeff Corrigan - Yahoo | ||||
| Dashlane Presents: How Stanford Protects 50,000 Students, Faculty and Employees from Identity-Focused Threats | John Bennett - Dashlane | ||||
| HYPR Presents: Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats | Ryan Rowcliffe - HYPR | ||||
| CDW Presents: Delivering Customer Experiences in the Age of Digital Identities: A Vision | Chris Olive - CDW | ||||
| The State of OAuth 2024 | Aaron Parecki - Okta | ||||
| Droids at the Helm: Mastering Workload Identity in a Universe of Automation | Matt Topper - UberEther | ||||
| The State of Digital Trust | 
 | Not Available | |||
| We Built a Mentorship Program for Women in Technology (WIT) From the Ground Up | Alyson Ruff - Otis Elevator | ||||
| Thales Presents: Identity Convergence: Navigating the Intersection of Digital and Physical Spaces | 
 | Not Available | |||
| 
 | Bertrand Carlier - Wavestone | ||||
| The Paradigm Shift: From Centralized to Decentralized Identity | Travis Spencer - Curity | ||||
| PlainID Presents: Mitigate Identity-Related Breaches in the Era of Identity-Centric Security | Gal Helemski - PlainID | ||||
| SailPoint Presents: Identity for Security and Business at AES and NVIDIA | Vidya Ganesh - AES Corp | ||||
| Extending SCIM Standards for Hyperscale Implementations | Dean Saxe - AWS Identity | Not Available | |||
| A Year of NO: Building Organizational IAM Guardrail Policies That Work | Noam Dahan - Tenable | Not Available | 
| Session Title | Speaker(s) | Recording | Presentation | |
|---|---|---|---|---|
| The IAM Evolution - Forging a Path to Idealized Identity Security | Matt Caulfield - Cisco | |||
| Beyond the Surface: The Dark Side of Digital Identity | Ashish Jain - Arkose Labs | |||
| The Power of Passwordless | Andrew Shikiar - FIDO Alliance | |||
| CyberArk Presents: Transforming Identity: No-Code Solutions for Ditching Legacy and Embracing Modern IAM | 
 | |||
| Tuebora Presents: Revolutionizing IGA with Generative AI Capabilities | Sanjay Nadimpalli - Tuebora | |||
| Redefining Privacy: Zero Identity in a Zero Trust World | 
 | |||
| What I Wish I Knew When I was an Identity n00b | Beth Abramowitz - MITRE Corporation | |||
| Why VCs Want to Fund Identity Startups in 2024 | 
 | |||
| 
 | Remy Lyle - Ping Identity | |||
| Providing and Quantifying Equitable Opportunities in Digital Identity | Tiffany Andrews - GSA - Login.gov | |||
| Digital Identity, the G20, and the SIDI Hub Survey | Gail Hodges - OpenID Foundation | |||
| CyberSolve Presents: ServiceNow + Identity NOW - A Match in Heaven! Or Hell! - A Coexistence Demo | Mak Tomar - CyberSolve | Not Available | ||
| Ping Identity Presents: Device Trust: Key to a Seamless Passwordless Experience | 
 | |||
| Privacy & Identity in Incident Response | Michael Borgia - Davis Wright Tremaine | |||
| 10 years of OpenID Connect | John Bradley - Yubico | |||
| 
 | David Lee - Identity Jedi Solutions | |||
| Hello, FIDO! Perspectives on FIDO and US Federal Agencies' Road to Zero Trust | Jeremy Grant - Venable LLP | |||
| Co-Designing Australia's ConnectID | 
 | |||
| Google Presents: FedCM and Identity Best Practices | 
 | |||
| IDMWORKS Presents: What, Why and How of IGA Modernization with SaaS | Abhi Sarmah - IDMWORKS | |||
| Navigating User Adoption: Challenges and Solutions in Passwordless Authentication | Chase Evans - KPMG | |||
| SGNL Presents: Shrinking Blast Radius With Zero-Standing Access | Atul Tulshibagwale - SGNL | |||
| Tuebora Presents: Governance Imperatives for Policy-Driven Administration | Sanjay Nadimpalli - Tuebora | |||
| High-security & interoperable OAuth 2: What’s the Latest? | Joseph Heenan - Authlete Daniel Fett - Authlete | |||
| Embracing Zero Standing Privilege: A New Era of Authorization | Sean O'Dell - The Walt Disney Company | Not Available | Not Available | |
| 
 | Ann Wachholz - Andersen Corporation | |||
| Counselors in the Modern Era: Advancing Identity Management | Ian Glazer - Weave Identity | |||
| Microsoft Presents: Secure Access with AI: Deep-Dive into IAM Powered by Microsoft Copilot for Security | Sarah Scott - Microsoft | |||
| Radiant Logic Presents: How The Home Depot Delivers Workforce Directory and Authentication Modernization at Scale | Megan Fotter - Home Depot | |||
| PAM Integration: Managing Apps & Non-Human Accounts | Ken Robertson - Fifth Third Bank | |||
| Cost and Conversion Rates: Measuring CIAM Success 12 Months After Go-Live and Looking Ahead to the Next 12 | Matt Connors - Southern New Hampshire University | |||
| Passkeys, Passwordless, & Practical Considerations: Stories from Netflix’s Enterprise Passwordless Journey | Ian Haken - Netflix | |||
| SAML Post-Mortem: Evolution, Challenges, and Future Prospects | Shannon Roddy - Berkeley | |||
| Fireside Chat: Login.gov Lessons Learned and Paths Ahead | 
 | Not Available | ||
| TechDemocracy Presents: Ensuring the Win: A Three-Stage Approach to IAM & CIAM Success | Todd Rossin - TechDemocracy | Not Available | ||
| 
 | Andrew de Mesa - Okta | |||
| The Reality of Implementing Identity Governance: Notes from the Trenches | Sonal Agrawal - Sprinklr | Not Available | ||
| Cisco Presents: Groundhog Day, but with Compromised Credentials | Ted Kietzman - Cisco | |||
| Google Presents: Bringing Passkeys to Critical Mass | Mitchell Galavan - Google | Not Available | ||
| Multilateral Federation: The Solution to the Problem that Identity Wallets Don’t Yet Understand They Have | John Bradley - Yubico | |||
| Ping Identity Presents: Connecting the Dots with CIAM: Three Keys to Growing Your Bottom Line | Clint Hardison - Navy Federal Credit Union | |||
| Top 5 Lessons - Implementing Decentralized Identity at Raiffeisen Bank | Loren Russon - Ping Identity | Not Available | ||
| Global Identity Fraud: An Exclusive Look at the Real Numbers | Ofer Friedman - AU10TIX | |||
| Lessons Learned from the World’s Largest Deployment of NIST High-Assurance Credentials | Angela Gartland - Internal Revenue Service | |||
| Ping Identity Presents: Reimagine B2B and Third-Party Identity Management: Modern Requirements and Strategies | 
 | |||
| Saviynt Presents: Creating Brand Harmony: A VF Corporation Perspective on Converged Identity Playbook | Bashira Baset - VF Corporation | |||
| Untangling FIDO and Passkey Concepts | Danny Zollner - Microsoft | |||
| One McDonald's Way: The Global Identity & Access Journey at McDonald's | George Roberts - McDonald's | |||
| Hidden Digital Identity Infrastructure | 
 | |||
| Cybersolve Presents: Unified IGA, PAM and AM Orchestration Based Approach for Maximizing IAM Adoption | 
 | |||
| Curity Presents: Securing Single Page Applications Using the Token Handler Pattern | Jonas Iggbom - Curity | |||
| Revolutionizing North American Banking | Joseph Heenan - Authlete | |||
| When Something Goes Wrong: Are You Ready? Real stories of IGA | Vladislav Shapiro - Costidity Inc. | |||
| 
 | Dean Saxe - AWS Identity | |||
| Unmasking Fraud: Understanding the Operational Dynamics of Identity Deception | Marcin Zimny - Ping Identity | |||
| 
 | Rich Dandliker - Veza | |||
| Read Out from the AuthZEN Interop Event | 
 | |||
| Better Identity: Five Years In, Is the Government Making Progress? | Jeremy Grant - Venable LLP | |||
| 
 | Chris Hendrix - Styra | |||
| Identity as a Revenue Engine | Aviad Mizrachi - Frontegg | Not Available | ||
| 
 | Sarah Cecchetti - Amazon Web Services | |||
| Using Standards: Some Assembly Required | Mike Jones - Self-Issued Consulting, LLC | |||
| Identity for Life, Higher Education and Beyond! | Paul Heaney - ProofID | |||
| KYC SOS: Optimizing KYC Friction to Balance Customer Experience Against Identity Vulnerabilities | Brittany Allen - Sift | |||
| The Relentless Creep of Identity Proofing | 
 | 
| Session Title | Speaker(s) | Recording | Presentation | |
|---|---|---|---|---|
| Unlocking the Future: How Generation Alpha Will Redefine Identity and Authentication | Chintan Jain - Hilton | |||
| IGA Paradigm Shift: Permission Life Cycle | Jim Montgomery - TriVir | |||
| Navigating the Passkey Landscape: Early Adopter Insights | Rew Islam - Dashlane | |||
| Graph-Based Harmony: Simplifying ZTA in the Age of Data Breaches | Alexandre Babeanu - 3 Edges | |||
| Modern Apple Identity Management Best Practices | Michael Epping - Microsoft | |||
| Do it Right: A Comparative Analysis of Authenticators | Fei Liu - Okta | |||
| Architectural Patterns for Distributed Authorization | Tim Hinrichs - Styra | Not Available | ||
| Quality (Identity) Data Makes the World Go Round | 
 | |||
| Understanding U.S. Public-Facing Identity Flows: Brownfield vs. Greenfield | Jonathan Prisby - Dept. of Homeland Security | |||
| Use Identity for Zero Trust API Security | Jonas Iggbom - Curity | |||
| Lessons Learned on the Road to Educating Your IAM Clients | Duc Le - Bloomberg | |||
| 
 | Tia Louden - Microsoft | |||
| Requirements for Successful B2B Engagement | Marco Venuti - Thales Group | Not Available | ||
| Your Passport Chip to the Rescue - Unphishable Account Recovery for Everyone | Rob Brown - Inverid | |||
| Becoming the Strategic Identity Leader We Need | Michelle Wan - Workday | Not Available | ||
| 
 | Siddharth Thakkar - Deloitte | Not Available | ||
| Mobile Identity, Native Authentication - Lessons Learned While Implementing the “OAuth 2.0 For First Party Apps” Draft | Jeff Corrigan - Yahoo | |||
| 
 | Elvar Olafsson - JakobsenID | |||
| From Keynote to Action: Building Workload Identity Foundations with Standards | George Fletcher - Capital One | |||
| Decoding Bias in Biometrics with a Strategic Source Selection Approach | Teresa Wu - IDEMIA | |||
| Securing the Foundations of Verifiable Credential Ecosystems | Joseph Heenan - Authlete | |||
| Digital Identities in the Metaverse and Virtual Worlds | 
 | |||
| 
 | Shane Weeden - IBM | |||
| 
 | Marc Castrovinci - HP Inc | |||
| CTAP 2.1: FIDO’s New Tricks for Passkeys on Security Keys | Will Smart - Yubico | |||
| Securing Digital Identity Wallets Using FIDO Security Keys | Joost Van Dijk - Yubico | |||
| Navigating Your Career Path in Identity and Access Management (IAM) | Randy Harris - GE Vernova | |||
| Final Footprints: Shaping Digital Legacies | Dean Saxe - AWS Identity | |||
| The Future of Authorization | George Roberts - McDonald's | 
