Early-bird Discount
expires in
Register Now

Agenda

Fortress Identity

Fortress Identity

Track
Thursday, June 06, 2024 14:30—18:30
Location: A 05-06

The "Fortress Identity" track is dedicated to dissecting the critical nexus of identity management and security. In an age where digital identities are as valuable as physical assets, safeguarding them against escalating threats and vulnerabilities is paramount. This track explores innovative strategies, technologies, and frameworks to fortify identity systems. Join industry leaders and security experts as they navigate the complexities of authentication, authorization, and identity assurance, offering insights into building resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 3 CPE Credits for this track.

After attending this track, participants will be able to:

  • Discuss the critical nexus of identity management and security
  • Recognize the complexities of authentication, authorization, and identity assurance
  • Describe how to build resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats
  • Identify the potential risks of generative AI in Identity and security

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Moderation

Lead Analyst & CTO
KuppingerCole
Research Analyst
KuppingerCole

Sessions

June 06, 2024
14:30 - 14:50
Is Least Privileged Even Possible?
Are role models and least privileged at odds? When defining roles, we tend to grant more access in one role to avoid having to create multiple similar roles or managing exceptions. So where does that leave our pursuit of implementing a least privileged access model in a zero trust environment?



June 06, 2024
14:50 - 15:10
PAM Design Patterns and Anti-Patterns: Assessing Your Organization's Best Practices
In today's cybersecurity landscape, organizations are increasingly recognizing the importance of implementing robust Privileged Access Management (PAM) programs. This recognition is primarily driven by regulatory requirements and the growing pressure from malicious actors. However, despite the availability of mature baseline capabilities for PAM products in the market, the implementation of privileged access often falls behind leading practices in typical organizations. In this talk, we will...



June 06, 2024
15:10 - 15:30
Myths of Least Privilege Management (POLP)
The principle of Least Privilege (PoLP) requires granting identities only the minimum permissions needed to perform their tasks. However, many technical and human factors make PoLP difficult to achieve.In this talk, we will go through the various dimensions which need to be considered when we are implementing PoLP and what are the challenges in achieving it. While the obvious consideration for least privilege is the set of permissions, we show why factors such as grant timing and duration,...

Andromeda Security


June 06, 2024
15:30 - 15:45
Biometric Myths and Legends
Biometric authentication has achieved huge success in consumer applications like smartphones, payment cards and door locks. However several myths and misconceptions surrounding biometrics remain today, that can limit the adoption. In this myth busting session we will discuss some of those misconceptions and review future trends.

Leading Cyber Ladies | Fingerprints


June 06, 2024
15:45 - 16:00
Unlocking Identity Security with Behavioral Biometrics and AI
This session will explore the expansive role of Behavioral Biometrics and AI in the broader scope of identity and cybersecurity. Our discussion will encompass a range of advanced techniques, including traditional typing habits and mouse movements, as well as cutting-edge methods such as voice recognition, gait analysis, and understanding interactions with mobile devices. We will explore how these unique behavioral aspects offer a more holistic and secure approach to identity verification,...



June 06, 2024
16:00 - 16:15
Cloudy with a Chance of Breaches: Why Cloud-Based Biometrics Pose Privacy Concerns
Centralized biometrics protect user privacy like a band-aid protects a leak. In this session cryptography scholar Paolo Gasti will explain in simple terms why cloud-based biometrics as it currently exists puts biometric data at risk. Dr. Gasti will explain how to avoid the pitfalls associated with centralized storage systems and several emerging approaches that are tackling it.

New York Institute of Technology, Keyless


June 06, 2024
16:15 - 16:30
AI@IAM
In recent years, the maturity and coverage level in identity and access management have been continuously expanded. The information and tasks in extend far beyond IT, usually involving the entire organization and requiring additional efforts. With AI, relief could be provided for end users and process participants in specific scenarios. The presentation will introduce concrete use cases and their prerequisites that we observe with our clients.

Cybrex GmbH


June 06, 2024
17:30 - 18:00
One-Click Login as a Convenient Solution for Multi-Factor Authentication According to NIS2 Requirements
Starting from October 2024, all companies with critical infrastructure are mandated to grant access to their IT systems to customers and employees solely through secure multi-factor authentication. This requirement poses a significant challenge for businesses, especially in maintaining customer conversion rates. Implementing this regulatory obligation by adding a second factor (e.g., one-time password via SMS, email, or a separate authenticator app) incurs additional efforts for users and...



June 06, 2024
18:00 - 18:30
Panel: Building Identity Resilience - Strategies for Navigating the Evolving Threat Landscape
In this engaging panel session we will explore the critical topic of Identity Resilience in today's rapidly evolving threat landscape. As organizations face increasingly sophisticated cyber threats and regulatory challenges, the resilience of identity management systems and practices is paramount to safeguarding sensitive information and maintaining trust in digital interactions. The panelists will share insights, best practices, and real-world experiences in building identity resilience to...

One Identity
Keyless Technologies
iC Consult
Migros-Genossenschafts-Bund


Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch