European Identity and Cloud Conference 2023

Hybrid Event
May 09 - 12, 2023
in Berlin

1500+
Attendees

250+
Speakers

230+
Sessions

60+
Partners

Agenda Highlights
Building the Roadmap for Your Future IAM
Pre-conference Event
Martin Kuppinger
KuppingerCole
Christopher Schütze
KuppingerCole
What’s Hot at the OpenID Foundation
Pre-conference Event
Dr. Michael B. Jones
Self-Issued Consulting
Nat Sakimura
OpenID Foundation
Dr. Torsten Lodderstedt
SPRIND - German Federal Agency for Disruptive Innovation
Joseph Heenan
Authlete Inc
Kristina Yasuda
SPRIND - German Federal Agency for Disruptive Innovation
Mark Haine
OpenID Foundation
Gail Hodges
OpenID Foundation
Dima Postnikov
ConnectID
Elizabeth Garber
OpenID Foundation
Steinar Noem
Udelt AS
Zero Trust with Zero Buzz
Combined Session
OpenWallet Deepdive
Workshop
Dr. Andre Kudra
TeleTrust
Drummond Reed
Gen Digital
Dr. Scott David, LL.M.
University of Washington - APL
Harm Jan Arendshorst
iLabs Technologies
Lasse Andresen
IndyKite
Andrew Hughes
FaceTec
Dr. Torsten Lodderstedt
SPRIND - German Federal Agency for Disruptive Innovation
Katryna Dow
Meeco
Adam Cooper
ID Crowd
Dirk Backofen
T-Systems International GmbH
Andrew Tobin
Gen Digital
Olaf Grewe
National Australia Bank
Oliver Terbu
Spruce Systems, Inc.
Rachelle Sellung
Fraunhofer IAO
Dr. Daniel Fett
Authlete
Nick Mothershaw
The Open Identity Exchange
Mark Haine
OpenID Foundation
Daniel Goldscheider
OpenWallet Foundation
Don Thibeau
OpenID Foundation
Annet Steenbergen
Independent Advisor
Denny Prvu
Royal Bank of Canada
Judith Fleenor
Trust Over IP Foundation
Dima Postnikov
ConnectID
Juliana Cafik
Microsoft
Louise Cole
International Air Transport Association (IATA)
Darrell Geusz
Ping Identity
Daniel Gasteiger
Procivis
Liv Freihow
Bank ID Bankaxept
Fabian Bormann
Cardano Foundation
Marie Austenaa
Visa Europe
Tess Rutgers van Rozenburg - Rottier
Netherlands Ministry of Economic Affairs and Climate Policy
Ricky Thiermann
Spherity
Fabian Hauck
University of Stuttgart
Kantara Initiative Meet-Up - The Identity Place To Be
Pre-conference Event
Andrew Hughes
FaceTec
Heather Flanagan
Spherical Cow Consulting
Kay Chopard
Kantara Initiative
John Wunderlich
JLINC Labs
Alec Laws
IDENTOS
Denny Prvu
Royal Bank of Canada
Jordan Burris
Socure
Sal D'Agostino
IDmachines
3 Dimensions of Digital Sovereignty
Keynote
Maarten Stultjens
Thales Digital Identity and Security
Benoît Jouffrey
Thales Digital Identity & Security
Ceremonies
Keynote
Ian Glazer
Weave Identity
Cyber Insurance Claims & Denials
Combined Session
Dr. Horst Walther
SiG software Integration
Patrick McBride
Beyond Identity
Steffen Nagel
Frankfurter Volksbank

Featured speakers

Identity as the Most Critical Element of Security
Blog Post  Jan 01, 1970
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing iden
Top 3 EIC Topics Picked by Martin Kuppinger
Blog Post  Jan 01, 1970
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud Conference.
Battling Insider Threats with Zero Trust
Blog Post  Jan 01, 1970
Battling Insider Threats with Zero Trust
When the COVID-19 pandemic broke out in 2020, many organizations were forced to digitize at a speed exceeding their security capabilities. Remote work meant that employees accessed company networks from potentially unsafe end devices. Today, many in the e-commerce business work in a hybrid mode – pa
Managing Privileged Access in Complex IT Environments for Business Benefit
Blog Post  Jan 01, 1970
Managing Privileged Access in Complex IT Environments for Business Benefit
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials. Access management, therefore, is an essential part of any cybersecurity strategy, but in the modern bu
The Disjointed State of CIAM
Blog Post  Jan 01, 1970
The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe.
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog Post  Jan 01, 1970
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a matu
The Path of Unifying Identities
Blog Post  Jan 01, 1970
The Path of Unifying Identities
One Identity Field Strategist Robert Byrne explains why he thinks that the identity community needs to better educate business and even IT managers who shortsightedly equate identity with their login account.
UK Data Protection – What Is Changing
Blog Post  Jan 01, 1970
UK Data Protection – What Is Changing
On March 8th, 2023, the UK Government introduced a new Data Protection and Digital Information Bill (2) into parliament. The government announcement of this bill claimed that “British Businesses to Save Billions Under New UK Version of GDPR”. What does this mean in practical terms for businesses
Avoiding Pitfalls in CIAM
Blog Post  Jan 01, 1970
Avoiding Pitfalls in CIAM
Sadrick Widmann, CEO at cidaas, thinks that the biggest risk to an organization’s network is the user. Therefore, users need to be supported by frictionless technology so they don't engage in risky behavior.
Are Cyber Insurance Policies Necessary?
Blog Post  Jan 01, 1970
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance policies are typically used to cover a wide variety of costs associated with cyber incidents, including reme

Key topics

Securing Identities for the Digital Supply Chain
Protecting digital identities is a crucial element of digital supply chain security.
Decentralized Identity: The Way Forward
Decentralized ledger technology helps emulate the trust between entities and enable individuals to use their identity securely.
Mastering the Customer Experience Challenge
How changing requirements for a deep consumer experience affect the Customer Identity (CIAM)
Identity & The Future of Zero Trust
With identity playing a central role in Zero Trust, talking about where ZT is evolving and how to make it work.
Identity Governance for a Modern World
Redefining Authorization and Policy-Based Access Control for an agile approach to any Zero Trust architecture.
Trends in (Mobile) Authentication
Customers struggle with the choice of authenticators beyond the smartphone.
Identity for Web3 & Metaverse
Global-scale decentralized systems need a decentralized IAM that can keep up with security challenges.
Artificial Intelligence in Cybersecurity & Identity Management
Changing the paradigm of identity security through AI.
Cloud as a Security Enabler
Modern cloud security introduces additional complexity since traditional security models are no longer applicable.
Navigating the IoT World
More companies are providing solutions to manage new IoT devices and to get control of legacy OT infrastructure.

Featured sponsors

Want to sponsor this event?
Join as a sponsor
Subscribe for updates
Please provide your email address