Early-bird Discount
expires in
Register Now

Agenda

Authorization 2.0

Authorization 2.0

Combined Session
Thursday, June 06, 2024 17:30—18:30
Location: B 07-08
Log in to download presentations

Graph-Based Harmony: Simplifying Zero Trust Authorization in the Age of Data Breaches
17:30—17:50

Watch the video

 

In the face of escalating data breaches and relentless attacks on identity, the imperative to establish robust Zero Trust (ZT) architectures has never been more urgent. Yet, the complexity of this undertaking, coupled with the multitude of tools and stacks involved, can be overwhelming.

This session will examine the Zero-Trust reference architecture outlined by NIST, revealing that authorization sits at its very core. Building on this foundation, we'll showcase how harnessing the organizational power of graphs can effectively streamline the complexity of ZT initiatives.

While graphs are renowned for their effectivness in threat and fraud detection, their mostly untapped potential in Identity and Authorization remains a hidden gem. Beyond real-time applications, we'll explore how the analytical might of graphs, a cornerstone for various AI techniques, can revolutionize Identity practices.

Alexandre Babeanu
CTO
3Edges
Alex has been involved in Graphs and Graph databases for Identity and Access Management for almost 10 years. As a graph-certified and IAM-accredited consultant, he has implemented solutions for...
Dynamic Authorisation: The Key to Unlocking Open Banking Potential in the PSD3 Era
17:50—18:10

Watch the video

 

The next frontier of customer identity lies not in simply knowing who someone is, but in what they are allowed to do. This is more important than ever in the financial services industry, as the proposed Payment Services Directive 3 (PSD3) framework creates further opportunities to deliver highly personalised, secure, and scalable data-driven services through Open Banking. At the same time, customers are pushing their providers to give them the tools needed to delegate control of their finances to trusted persons, while doing more to secure their accounts against fraud.

The good news is that Dynamic Authorisation is purpose-built to address these industry problems. By centralising authorisation decisioning and enforcement, financial service providers can streamline authorisation workflows, ensure consistent and secure data sharing with third-party providers, improve loyalty and reduce fraud – all in one. Policy-based authorisation takes this even further by enabling dynamic rules that adapt to real-time context and risk factors.

Join authorisation experts Adam Rusbridge and Adam Preis of Ping Identity to learn how Dynamic Authorization can enable:

  • Fine-grained control: Define and enforce access controls for payments, transfers, account settings and data requests, minimising security risks and regulatory compliance headaches.
  • Enhanced user experience: Streamline API interactions and reduce friction for TPPs, accelerating Open Banking and Open Finance investments.
  • Data monetisation: Leverage granular control over data access opens doors for innovative data-driven services and revenue streams.
  • Agility and scalability: Respond swiftly to changing market needs and regulatory landscapes with adaptable authorisation policies.
Adam Preis
Director Solution Marketing
Ping Identity
Adam Preis is a Director of Product and Solution Marketing at Ping Identity, operating out of the U.K. with a global remit for financial services and authorisation. Adam brings over 12 years...
Adam Rusbridge
Senior Product Manager
Ping Identity
Adam Rusbridge is Senior Product Manager for Ping’s Authorisation products, with 20 years of experience leading the development and growth of products that govern secure access to resources....
Panel: Why Authorization Standardization is Imperative
18:10—18:30

Watch the video

 

Join this discussion about the efforts of the AuthZEN working group in the Open ID Foundation, which will include an overview of the authorization space, and the various technologies and players involved. The panel will also discuss why the group exists, the problems that it is trying to solve, and the state of the current work.

As Authorization appears to be the next horizon for standardization efforts, and the multiple technologies, often incompatible with each other, the need for standardization becomes more and more crucial. Come and hear how XACML, Cedar, Graph, IDQL, and more.

Alexandre Babeanu
CTO
3Edges
Alex has been involved in Graphs and Graph databases for Identity and Access Management for almost 10 years. As a graph-certified and IAM-accredited consultant, he has implemented solutions for...
David Brossard
Chief Technology Officer
Axiomatics AB
In his role as CTO, David drives the technology vision and strategy for Axiomatics based on both identity and access management (IAM) market trends as well as customer feedback. He also leads the...
Allan Foster
Chief Evangelist
Identity Evangelist
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of...
Adam Rusbridge
Senior Product Manager
Ping Identity
Adam Rusbridge is Senior Product Manager for Ping’s Authorisation products, with 20 years of experience leading the development and growth of products that govern secure access to resources....
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch