Women in Identity
Facebook X LinkedIn

Women in Identity

Combined Session
Thursday, May 12, 2022 17:30—18:30
Location: A05-06

Challenges for Women in Identity and Security

It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security and identity is even worse, as some studies have shown. "Women in Identity" is a global organization whose mission is to develop solutions with diverse teams. This presentation will look at the various WID initiatives on a global and local level that support women in the industry and create solutions “for everyone built by everyone”.

Challenges for Women in Identity and Security
Event Recording
Challenges for Women in Identity and Security
Click here to watch the recording of this session. You'll need to log in to watch it.
Challenges for Women in Identity and Security
Presentation deck
Challenges for Women in Identity and Security
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Angelika Steinacker
Dr. Angelika Steinacker
IBM Security Services EMEA
Angelika has extensive experience in Security and Identity & Access Management. She has been working in the security industry for over 30 years and with a focus on IAM for 20 years. In her...

What if your digital twin misbehaves?

The concept of the digital twin comes originally from the Industry 4.0 domain with the idea of having a digital representation of real-life objects or processes. The representation of the digital twin consists of the physical object, the virtual product, and the connections between those. Data and its flow form the connection. Only recently has this concept been applied to people as well. While this concept is very promising for design or optimization scenarios, the fact that data is in the center of it, a missing overall data governance and security might be the next challenge. Thus, potentially leading to a misbehavior of the digital twin.

What if your digital twin misbehaves?
Event Recording
What if your digital twin misbehaves?
Click here to watch the recording of this session. You'll need to log in to watch it.
What if your digital twin misbehaves?
Presentation deck
What if your digital twin misbehaves?
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Silvia Knittl
Dr. Silvia Knittl
PwC GmbH WPG
Dr. Silvia Knittl is Director at PwC Germany in the Cyber & Privacy domain with a strong focus on  Enterprise Security Architecture as well as Identity & Access Governance. She...

Quo vadis, SSI? – Self-sovereign Identity on route to production

Self-sovereign identity (SSI) has reached the in-between stage: more than a concept, not yet fully deployed. This is where the work can get the most gruesome and exhausting, but also the most creative and rewarding. While the dedicated W3C standards are reaching maturity levels, we see regulators and government actors jump on board and asking for even more stability across specifications and standards in order to establish real world systems. In fact, we see large pilot projects and implementation programs worldwide. One promising but equally critical development is the eIDAS 2 regulation,  promising dependable answers to questions about governance and trust frameworks that will drive adoption. This short deep dive will give you an orientation of the state of play for SSI in the context of these greater developments – and might provide an outlook for your projects as well.

Quo vadis, SSI? – Self-sovereign Identity on route to production
Event Recording
Quo vadis, SSI? – Self-sovereign Identity on route to production
Click here to watch the recording of this session. You'll need to log in to watch it.
Quo vadis, SSI? – Self-sovereign Identity on route to production
Presentation deck
Quo vadis, SSI? – Self-sovereign Identity on route to production
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Irene Adamski
Irene Adamski
Jolocom
Subscribe for updates
Please provide your email address