EIC Deep Dive II track is tailored to cover specific IAM topics, such as adaptive protection, role management, UMA & GNAP, CIAM, certification fatigue, and passwordless authentication. At the end of the track, we will discuss why a strong identity community is important in a community panel.
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. By defining clear and meaningful roles within an organization or system, role management can help to ensure that individuals are pursuing certifications that are relevant to their job responsibilities and career goals.
Adaptive protection systems for identities are a set of advanced security measures and technologies to protect against identity theft and unauthorized access to sensitive information. By default, they must be designed to be flexible and adaptable, allowing them to respond to changing threats and risks in real-time. Another important aspect of adaptive protection is the use of machine learning and artificial intelligence (AI) to analyze user behavior and detect potential threats or anomalies.
Modern applications often require complex user and group-focused authorization mechanisms to manage access to resources and sensitive data. While these mechanisms can be effective, they can also introduce a number of complexities that must be carefully managed. In this track, we will also discuss alternative standards like UMA (User-Managed Access) and GNAP (Group-Based Nested Access Protocol) as potential solutions for user and group-controlled resource delegation.
CIAM is a critical component of modern digital business strategies, helping organizations deliver a secure and seamless customer experience while meeting regulatory requirements and protecting against cyber threats. In this track, an international media company will share their experience with CIAM and the lessons they have learned in 6 years.
Orchestration plays a critical role in passwordless authentication by providing a centralized mechanism for managing and coordinating the various components of the authentication process. Passwordless authentication typically involves multiple systems and technologies, including biometric sensors, mobile devices, and identity management platforms, and orchestration is needed to ensure that these components work together seamlessly and securely.
Biometrics can provide a highly secure and convenient authentication mechanism for both digital and physical access, and can help organizations to improve security, prevent unauthorized access, mitigate the risk of generative AI in modern attack methodologies, and reduce the risk of data breaches and other security incidents.
Receive Continuing Professional Education Credits
KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.
You can get 3 CPEs for this track.
After attending this track, you will know:
Field of Study: Information technology
Prerequisites: None
Advanced Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)
To register for this session, go to https://www.kuppingercole.com/book/eic2023 and book a hybrid event ticket. In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE Credits please fill and send the following form: https://www.kuppingercole.com/event_cpe/eic2023
After we have checked your attendance you will receive your CPE certificate.