Early-bird Discount
expires in
Register Now

Agenda

Human-Centric Security: Behavioral Analytics and User Education

Human-Centric Security: Behavioral Analytics and User Education

Combined Session
Wednesday, May 07, 2025 12:05—13:05
Location: B09

Navigating Threat Response when Security Relies on User Behavior
12:05—12:25
 

My talk, titled "Navigating Threat Response when security rely on user behavior ," will address critical areas including:

- Identifying and mitigating threats where cloud providers cannot assist.
- Implementing robust in-house security measures and protocols.
- Case studies on successful threat responses when security rely on security behaviors.
- Strategies to response to user misconfigurations or bypassing security baselines.

In today’s digital landscape, relying solely on cloud providers for security can leave organizations vulnerable. My presentation aims to equip attendees with practical knowledge and strategies to enhance their threat response capabilities independently when security relies on user behavior.

Sergio Albea
Security Architect /Enginner
SWITCH
With over 15 years of experience, I have immersed myself in the dynamic field of security, focusing on diverse IT landscapes and ensuring robust protection against threats and vulnerabilities. My...
Refreshing our Approach to Mobile App Security
12:25—12:45
 

Digital transformation is everywhere and a new generation of digital-native consumers expects to access every service they need on the go, via a truly mobile-first experience. The rise of Digital Wallets across the EU is only going to accelerate this adoption of the mobile device as the de facto mechanism for enabling quick and friction-free access across all facets of an individual's digital life.

As identity professionals, we need to ensure that every interaction on the mobile phone is secured - through authenticating, authorising and monitoring every click and swipe. At the same time, we need ways to minimise friction for end users, or else risk removing the very value that consumers seek to gain from these mobile interactions.

In this session, Rob will share ideas and best practices regarding truly integrated mobile-first security journeys that leverage modern Identity Orchestration and Threat protection techniques to balance a great user experience with real protection.

Rob Otto
Field CTO
Ping Identity
Rob Otto is a Principal Architect at Ping Identity and the Field CTO for Europe, the Middle East, and Africa. With over 20 years of experience in identity and access management, Rob has...
PANEL: Identity-Centric Security: Cutting Through the Buzz and Driving Business Value
12:45—13:05
 

As organizations are confronted with increasingly sophisticated cyber threats focusing on identities, the concept of Identity-Centric Security has gained prominence. However, the landscape is saturated with buzzwords, making it challenging for businesses to discern the true value behind the different approaches. In this session, Identity-Centric Security will be demystified, and a clear framework will be provided for identifying the most effective strategies, technologies, and products.

Key points to be covered include:

• Identifying the Value in the Buzz: The jargon will be broken down to reveal the real benefits of Identity-Centric Security.
• Understanding the Clustered Identity-Centric Security Landscape: The various components and how they work together to create a cohesive security strategy will be examined.
• Explaining it to the Business: Technical concepts will be translated into business outcomes that resonate with non-technical stakeholders and show the return on investment.

Andre Priebe
Chief Technology Officer
iC Consult Group GmbH
Andre Priebe serves as the Chief Technology Officer at iC Consult Group, a vendor-independent system integrator specializing in Identity & Access Management, with a global team of over 800...
Almost Ready to Join the EIC 2025?
Reach out to our team with any remaining questions
Get in touch