Early-bird Discount
expires in
Register Now

Blog

EIC 2025 Blog

Read the latest news and updates

Privacy and Data Protection – Do They Still Belong Together? 
In an era where privacy is overshadowed by convenience and AI's immense capabilities, critical misconceptions and stark realities loom large. Are companies and individuals ready to protect what little privacy remains, or is it a lost cause in today's digital age? Discover the provocative debates shaping the future of privacy.
Alexei Balaganski
Feb 27, 2025
Strong Authentication in a Post-Quantum World
The digital security apocalypse is looming, courtesy of quantum computing. Is your organization ready? As passwords cling to life, quantum computers threaten to dismantle existing encryption, rendering current authentication insufficient. Dive in to explore the dawn of post-quantum cryptography and the critical need for crypto-agility to safeguard your digital domain effectively.
Alexei Balaganski
Feb 18, 2025
The Future of Digital Travel Credentials: Trust, Adoption, and the eIDAS 2.0 Framework
Step into the future of travel where digital identity technologies are reshaping cross-border experiences. Explore the rise of innovations like automated verification, while uncovering regional success stories like SITA and India's Digi Yatra. Discover how international collaboration could make cumbersome passport checks a thing of the past. Welcome to the next era of seamless and secure global journeys.
Anne Bailey
Feb 07, 2025
What Can the Identity Fabric 2025 Update Teach You About Zero Trust Identity Security?​
Meet the future of identity security with Zero Trust and KuppingerCole’s Identity Fabric 2025! Unlock the secrets to dynamic, real-time protection, where differentiating identities and leveraging analytics aren't just optional—they're essential for surviving today's digital threats.
Cloud Security in the Age of Generative AI 
In 2025, CISOs must lead proactive cloud security strategies to safeguard operational resilience in multi-cloud environments. Explore the 4 foundational pillars of cloud security—Shared Responsibility, Identity-Centric Security, Data Protection, and Threat Resilience.
Mike Small
Jan 27, 2025
What’s Next in Customer Identity and Access Management 
Stay updated on the future of CIAM: Learn about integrating privacy management, fraud intelligence platforms, and CDPs to enhance security and customer experience.
John Tolbert
Jan 20, 2025
Rethinking Identity Governance and Administration in the Digital Era
Trust in yesterday's Identity Governance and Administration is crumbling; reclaim control with a revamped, agile approach fit for today's digital chaos. Read on to learn how to pivot your IGA strategies to secure your enterprise's future.
Martin Kuppinger
Jan 16, 2025
Almost Ready to Join European Identity and Cloud Conference 2025?
Reach out to our team with any remaining questions
Get in touch