Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Event Recording
Welcome to the European Identity & Cloud Conference
Dec 22, 2017

Learn all you need to know about the future of information security today!

Event Recording
Katryna Dow - How Consumer Identity is approached by Meeco
Dec 20, 2017

Kantara Workshop at the Consumer Identity World 2017 APAC

Event Recording
Eric Lee - CIAM Challenges in Driving Customer-Centric Digital Transformation
Dec 20, 2017

Kantara Workshop at the Consumer Identity World 2017 APAC

Event Recording
What is CIAM and why do we need it?
Dec 20, 2017

Kantara Workshop at the Consumer Identity World 2017 APAC

Event Recording
Colin Wallis - An Introduction to Kantara, its mission, work, structure and business model
Dec 20, 2017

Kantara Workshop at the Consumer Identity World 2017 APAC

Consumer Identity World 2017 APAC
15 videos
Videos from the Consumer Identity World 2017 in Singapore
Event Recording
Don Thibeau - Trust Frameworks: Their Critical Role in Governing Identity Systems
Dec 19, 2017

Session at the Consumer Identity World 2017 APAC in Singapore

Event Recording
Graham Williamson - Privacy in the Asia Pacific: CBPR vs. GDPR
Dec 19, 2017

Session at the Consumer Identity World 2017 APAC in Singapore

Webinar Recording
Step-by-Step Guide to GDPR Compliance
Dec 13, 2017
With less than 250 days left till the dreaded EU General Data Protection Regulation (GDPR) comes into force, organizations around the world are feeling increasingly uneasy. Any company, both large and small, that wants to continue doing business in the European Union must comply with GDPR or face harsh penalties.
Webinar Recording
Redefining Access Governance for Security and Fraud Prevention in Critical Applications
Dec 08, 2017
Continued digitalization of modern organizations, supported by the growing adoption of cloud computing, big data and other innovative information technologies, shows no signs of slowing down. Critical business data such as corporate intellectual property, financial documents or sensitive personal information, which traditionally have been kept in the most secure on-premises systems, must now be made accessible to the outside world: remote offices, mobile workforce, business partners, sometimes even the whole Internet.
Event Recording
Martin Kuppinger, John Tolbert - Balancing User Experience, Privacy and Security for the Connected Consumer
Dec 08, 2017

Keynote at the Consumer Identity World 2017 EU in Paris, France

Event Recording
Corné van Rooij - How Consent Can Build Customer Intimacy
Dec 08, 2017

Keynote at the Consumer Identity World 2017 EU in Paris, France

Event Recording
Martin Kuppinger - What Does It Take for a Complete CIAM Solution?
Dec 08, 2017

Keynote at the Consumer Identity World 2017 EU in Paris, France

Event Recording
Angelica Steinacker - How to Build a Secure and Successful Consumer Relationship
Dec 08, 2017

Keynote at the Consumer Identity World 2017 EU in Paris, France

Consumer Identity World 2017 EU
26 videos
Videos from the Consumer Identity World 2017 in Paris, France
Event Recording
Thorsten Niebuhr - Kantara Initiative's Identity Relationship Management Workgroup
Dec 07, 2017

Kantara Workshop at the Consumer Identity World 2017 EU

Event Recording
Corné van Rooij - Kantara Initiative's Consent Management Solutions Workgroup
Dec 07, 2017

Kantara Workshop at the Consumer Identity World 2017 EU

Event Recording
Mark Lizar - Kantara Initiative's Consent and Information Sharing Workgroup
Dec 07, 2017

Kantara Workshop at the Consumer Identity World 2017 EU

Event Recording
Colin Wallis - Overview of Kantara's Work
Dec 07, 2017

Kantara Workshop at the Consumer Identity World 2017 EU

Webinar Recording
Authentication & Authorization for the Microservices World
Dec 06, 2017
As businesses are expanding their presence in the cloud, they are increasingly looking into innovative approaches towards software development and operations that allow them to bring their applications to the market faster, to make them more adaptable and scalable to the ever-changing business requirements.
Webinar Recording
Identity and Access Management for Microsoft Azure and SharePoint Online
Dec 01, 2017
As Microsoft’s cloud solutions – including Microsoft Azure, Microsoft Office 365, and Microsoft SharePoint Online – are gaining more market share, integrating these platforms into existing enterprise IAM environments becomes essential. As more and more sensitive corporate data is moved to the cloud, ensuring strong information protection, secure access for employees, partners or customers, and, last but not least, compliance with the stringent regulations like GDPR, is impossible without a unified IAM across all on-premises and cloud systems.
Webinar Recording
Understanding the GDPR Impact on Corporate IT
Nov 29, 2017
The upcoming General Data Protection Regulation (GDPR) can be a major challenge for any organization established or just doing business in the European Union. Soon, failing to properly protect personal information of EU residents may lead to harsh financial penalties, so organizations are scrambling to understand the impact of GDPR on their processes, applications and systems and to adapt to the new requirements accordingly.
Webinar Recording
Revised Payment Service Directive: Understanding Its Technical Requirements for a Smooth and Secure Customer Experience
Nov 17, 2017
In less than 24 months, banks will have to comply with the Revised Payment Service Directive, commonly called "PSD2". The directive will introduce massive changes to the payments industry, removing the banks’ monopoly on their customer’s data. It will radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to achieve this, banks and TPPs must put the technical requirements in place in a secure way.
Webinar Recording
Connected Car: Putting Digital Identity Behind the Wheel
Nov 15, 2017
The Internet of Things comprises of a diverse range of devices – from industrial sensors controlling critical manufacturing processes all the way to home devices like smart TVs and fridges. The idea of connecting a car to the internet started as an upgrade to the vehicle’s onboard entertainment system. The concept quickly evolved and branched into numerous market segments including navigation systems, safety and diagnostics, toll payments, and fleet management.
Webinar Recording
Industrial Control Systems: Understanding the Access Risks and Security Challenges
Nov 10, 2017
For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks.
Webinar Recording
Improving Agility and Reducing Cyber Risks with Business-Driven Security Policy Management and Automation
Nov 03, 2017
Today’s enterprises are under continuous pressure to support new digital transformation initiatives, to adopt modern technologies like the cloud and software-defined data centers (SDDC) and, of course, to stay protected from external and internal cyberthreats. With the increasing pace of business, achieving greater agility and efficiency through automation of business processes is becoming one of the key challenges for IT. Unfortunately, the resulting dramatic increase in complexity of heterogeneous IT infrastructures combined with growing sophistication of modern cyberthreats has made security a real bottleneck to business enablement.
Webinar Recording
Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale Unternehmen
Oct 25, 2017
Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen, betrieblichen und technischen Herausforderungen vorzubereiten.
Webinar Recording
Security Management im digitalen Unternehmen: Business-orientiert, agil, effektiv
Oct 20, 2017
Wie schön waren die Zeiten, in denen man die physische wie digitale Sicherheit in seinem Unternehmen als eine Art Ritterburg mit umlaufendem Wassergraben („Perimeter“) abbilden konnte. Nur wenige, gut bewehrte und streng bewachte Zugänge („Firewalls“) sorgten dafür, dass der Austausch zwischen drinnen und draussen kontrolliert erfolgte und Raubritter wenig Möglichkeiten hatten, sich unberechtigt Zugang zu verschaffen.
Webinar Recording
GDPR: The Six Critical Steps to Compliance and Brand Differentiation
Oct 19, 2017
From May 2018 when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. Companies collecting such information from their customers will have to adapt to fundamental changes both in the very definition of personal data and in technical requirements around its secure and privacy-enhanced processing, including topics like consent management, data portability and the right to be forgotten. You will also understand why leading companies, however, will look beyond compliance to how they can enhance their customers’ experience and trust to stand out from their competitors.
Webinar Recording
Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM
Oct 18, 2017
Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations and to provide frictionless user experience. CIAM solutions allow businesses and public-sector agencies to gather more information about the consumers while maintaining compliance with the current and upcoming data protection regulations like the EU GDPR and PSD2.
Webinar Recording
The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018
Oct 13, 2017
Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services. Enterprises want to collect, store, and analyze data on consumers to create additional sales opportunities and increase brand loyalty.
Webinar Recording
Top Considerations for Selecting an Identity and Access Management as a Service Vendor
Oct 06, 2017
As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high.
Webinar Recording
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices
Sep 29, 2017
In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are increasingly looking into new approaches to make their applications more flexible, scalable and easier to maintain and modernize. In recent years, service-oriented architectures and microservices in particular have become the preferred method for many developers to create modular and adaptable enterprise applications that can easily scale and span multiple devices and platforms.
Webinar Recording
The Crucial Role of Identity in Securing Industrial IoT
Sep 27, 2017
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security.
Event Recording
Eve Maler - UMA deep dive - GDPR, PSD2 - pivot to CIAM
Sep 23, 2017

Presentation at the Kantara Workshop

Event Recording
Steve Tout - Risk Aware IAM for an Insecure World
Sep 23, 2017

In a world full of uncertainties and data breaches, Identity and Access Management (IAM) must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction. With such large-scale breaches becoming commonplace, it is more important than ever to integrate threat intelligence insights proactively into authentication workflows. Risk aware IAM requires business processes to be enhanced by deeper integration with modern security solutions and automated within an organization’s security operations center for rapid visibility, to continuously assess what is going on, and increase speed to resolution. Risk comes from many different angles; to be effective, risk insight must be more than an entry on an Excel spreadsheet. The transformation of risk insight into policy enforcement in real-time is an evolution for most companies, and it is one that must be realized for IAM programs to deliver more value to the business.

Webinar Recording
Unstructured Data – A Blind Spot for GDPR Compliance
Sep 22, 2017
While many (but not enough) organizations have finally begun preparing for GDPR compliance, there are still important steps to take. When in May 2018 the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change.
Webinar Recording
The New Role of IAM in the Age of Digital Transformation
Sep 21, 2017
Organizations are under pressure to change in the current age of Digital Transformation. One of the key differentiators of innovative digital business models and thus new revenue streams is the profoundly changed relationship to customers and consumers. Creating innovative consumer services, collecting and managing better customer information and even just optimizing the reach of everyday marketing activities – all this depends on the ability to manage consumer identities in a flexible, scalable and secure way.
Webinar Recording
Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation
Sep 20, 2017
Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as well as applications accessing the data. Needless to say, databases remain a prime target for cybercriminals, especially in case of sophisticated targeted attacks.
Event Recording
Jason Rose - Getting to Know You: Building Deep Customer Relationships Gradually through Progressive Identity
Sep 20, 2017
Event Recording
Grad Conn - Marketing to the Future: A CMO’s Roadmap for Customer Experience Management
Sep 20, 2017
Consumer Identity World 2017 USA
16 videos
Videos from the Consumer Identity World 2017 in Seattle, USA
Webinar Recording
Cognitive Technologies and the Future of Identity & Access Management
Sep 15, 2017
Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.
Webinar Recording
Consent Lifecycle Management: Consumer IAM’s Core Capability?
Sep 13, 2017
2018 is going to be a hell of a year for nearly every organization operating within the European Union. Not only the dreaded General Data Protection Regulation (GDPR) will finally take effect next May, introducing massive changes to the way companies will have to deal with personal information (not to mention hefty fines for violations), January 2018 also marks the implementation date of the revised Payment Service Directive (PSD2), which will break the banks’ monopoly on their customers’ account information.
Webinar Recording
GDPR Compliance Countdown to Adequacy – Minimum Preparation to be Compliant
Sep 08, 2017
With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds.
Webinar Recording
Security Benefits of Cloud Solutions
Sep 05, 2017
While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services can dramatically improve flexibility and scalability of critical business applications, reduce time-to-market for new products and even unlock completely new business models.
Webinar Recording
Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience
Jul 20, 2017
Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so.
Webinar Recording
Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment
Jun 29, 2017
As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers.
Webinar Recording
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
Jun 28, 2017
The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels.
Webinar Recording
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
Jun 23, 2017
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
Event Recording
Luca Martelli - The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Jun 14, 2017

Data, People and Software security: how does them relate to the GDPR security principles? In this new attack landscape, network-centric security is no longer enough because threats come from inside and outside the network. Oracle Identity SOC is an identity-centric, context-aware intelligence and automation framework for security operations centers, backed by advanced user behavior analytics and machine learning to spot compelling events that require automated remediation.

Event Recording
André Koot - From RBAC to ABAC in a Pragmatic Way
Jun 07, 2017

An Expert Stage presentation at the European Identity and Cloud Conference 2017

Webinar Recording
(Big) Data Security: Protecting Information at the Source
Jun 02, 2017
The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property.
Event Recording
Denis Joannides - Empowering the Digital Insurers
Jun 01, 2017

In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including governance and shares his lessons learned.

Webinar Recording
Identity 2.0: The Next Generation of Customer Identity
May 31, 2017
Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights. Companies and public sector organizations with deployed CIAM solutions can provide better digital experiences for and gather more information about the consumers who are using their services.
Webinar Recording
Getting Identity and Access Management Right – Even If SAP Is Involved
May 24, 2017
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application.
Webinar Recording
Architecting a Digital Strategy for PSD2 and Open Banking
May 18, 2017
PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region expose open APIs to allow other banks and third parties to access the data they hold on customers, when the customer has given their explicit consent. Designed to improve choice for customers, create more competition and stimulate innovation in the finance sector, the introduction of 'open banking' in the UK and across the EU will transform banking as we know it.
Event Recording
Impressions of the European Identity & Cloud Conference 2017
May 15, 2017
Event Recording
Martin Kuppinger's EIC 2017 Summary
May 12, 2017
Event Recording
Prof. Dr. Heiko Beier - Know your Customer: Deep Level Understanding of Customer Interaction with Smart Data Analytics
May 11, 2017
Event Recording
Joni Brennan - Accelerating Canada’s Digital ID Ecosystem Toward a More Trusted Global Digital Economy
May 10, 2017
Event Recording
European Identity & Cloud Awards Ceremony
May 10, 2017

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security.

Event Recording
Daniel Buchner - Blockchain-Anchored Identity: A Gateway to Decentralized Apps and Services
May 10, 2017

Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.

Event Recording
Balázs Némethi - Financial Inclusion & Disenfranchised Identification
May 10, 2017
European Identity & Cloud Conference 2017
35 videos
Keynotes, interviews, and selected sessions from the European Identity & Cloud Conference 2017.
Event Recording
William Mougayar - State of Business in Blockchains
May 09, 2017

Where we are, and where we are going in blockchain implementations and strategies. What are the implications for various industry sectors and stage of enterprise adoption? How to think about new blockchain-based business models?

Event Recording
Pamela Dingle - The Age of Federated Accountability
May 09, 2017

We are about to enter a decade where critical business-grade information is protected by the OAuth 2.0 framework. Congratulations are not yet in order. Our mission for the next decade is to not repeat our own identity history, and instead to build a system that is provably secure through test-driven automation and that takes a vicious approach to detecting anomalies.

Event Recording
Jackson Shaw - When will Identity and Access Management be Digitally Transformed?
May 09, 2017

Tired of paying hundreds of thousands or millions of dollars for IAM projects that don’t show benefit or eventually are considered failures? Us too! So we decided to do something about it. “Digital transformation is the profound and accelerating transformation of business activities, processes, competencies and models to fully leverage the changes and opportunities of digital technologies.” We took this to heart and radically changed our approach to our own customer IAM, how we (and our customers) connect to SaaS properties and how we leverage machine learning, advanced analytics and bots to not only serve our company but to also serve our customers. In this session I will detail how we are digitally transforming IAM within our own company and for our customers.

Event Recording
Doc Searls - When the Customer Becomes the First Party
May 09, 2017

The time is coming when customers have the upper hand, and companies agree to their terms rather than the other way around. Doc Searls, leader of the VRM (Vendor Relationship Management) movement, co-author of "The Cluetrain Manifesto", and author of "The Intention Economy: When Customers Take Charge", will explain how customer independence and empowerment will make the GDPR’s dreams come true—for both regulators and companies, as well as for customers themselves.

Event Recording
Alex Simons - Identity Imperatives in the World of Cloud and Devices
May 09, 2017

The tectonic shift of enterprise IT to a world of cloud and devices is upon us. As enterprises around the world look to embrace the incredible opportunities and address the competitive pressures this tectonic shift creates, they are discovering that digital identity is the cornerstone technology of a successful modern IT estate. This tectonic shift brings a new set of identity design and architectural imperatives that legacy systems are poorly suited to address. Alex will discuss these trends, the new set of design and architectural imperatives they create and give examples of how these new approaches are already in use today.

Event Recording
PATECCO's Thoughts on IAM in Relation to Service Based Digital Business Technologies
May 09, 2017

An interview during the European Identity & Cloud Conference 2017

Event Recording
Prof. Dr. Udo Helmbrecht - Cybersecurity Strategies in the EU
May 09, 2017

Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on Network and Information Security (NIS). The keynote will provide an outline on emerging EU policy legislative context addressing improved capabilities, cooperation, crisis management and preparedness at EU Level. The second part of the keynote will focus on initiatives and synergies to support EU policy implementation that will on the one hand stimulate the competitiveness and innovation of Europe's cybersecurity industry and on the other increase the levels of trust and security in EU products and services.

Event Recording
Richard Struse - Let Them Chase Our Robots
May 09, 2017

The economics of cybersecurity have long favored the attacker. Adversaries skillfully harness automation to increase their advantage while benefiting from their victim’s fragmented and uncoordinated defenses. Automated Cyber Threat Intelligence (CTI) ecosystems hold the promise of changing these economics in favor of the defender. This keynote will highlight the promises of CTI along with the challenges we still must overcome if we are to realize the full potential of this opportunity.

Event Recording
Patrick Parker - Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows
May 09, 2017

Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today. In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques such as Micro-Segmentation, Zone-Based Security, Defense in Depth, Least Privilege and others. We will also highlight the central role of IAM in delivering on these strategies.

Event Recording
Jason Rose - Anonymous to Known: How to Grow Your Business by Mastering Customer Identity Management
May 09, 2017

You can’t sell to strangers. Customer identity and access management (CIAM) is the emerging technology that transforms unknown online visitors into known and loyal customers. Find out how CIAM can help your organization build trusted and lasting customer relationships. By progressively identifying online users from initial website visit to the creation of a full customer profile — businesses can build consent-based relationships that respect the new rules as outlined in the forthcoming GDPR. The great power delivered by CIAM also demands great responsibility. Learn how to ensure customer data is secure from threats, including account takeover attacks, as you build rich customer profiles and collect consent from consumers for various marketing, sales and support activities.

Webinar Recording
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Apr 28, 2017
Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche Herausforderung und bedarf angemessener Prozesse und Technologien.
Webinar Recording
Making the Cloud a Secure and Easy to Use Environment
Apr 07, 2017
Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.
Webinar Recording
Digital Transformation in Government
Apr 06, 2017
Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed services. This webinar will investigate the challenges facing government and the opportunity digital transformation affords.
Webinar Recording
Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards
Apr 05, 2017
Companies that manage consumer identities and personal profiles have a bit more than one year left to comply with the new European General Data Protection Regulation (EU-GDPR).
Webinar Recording
Reducing Risk with User Behavior Analytics (UBA)
Mar 31, 2017
Business landscape is changing rapidly where most organizations, irrespective of the vertical, are transforming themselves into technology organizations. With the adoption of Internet of Things (IoT), the number of connected entities has increased significantly. Managing identities of people, things and other objects in an automated and predictive manner is becoming the new norm. Simultaneously, the burgeoning number of identities exposes a broader attack surface posing a big challenge to these organizations and their growth plans.
Webinar Recording
Creating Secure and Unified Next Generation Workspaces
Mar 30, 2017
A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management.
Webinar Recording
Personal data breach and the GDPR – Prevention, Detection and Notification
Mar 24, 2017
The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service providers) or data controllers (e.g. retailers, social media, practically any organisation dealing with personally identifiable information) which are outside the EU, especially for example those in the US.
Webinar Recording
Blockchain - How to Separate the Hype from Reality
Mar 23, 2017
Blockchain has taken the world by storm since the inception of Bitcoin. While the primary interest has been in the financial and insurance industry sector Blockchain technology has wider application. This webinar will describe the technology and separate the hype from reality, looking at some innovative Blockchain applications from identity management to the Internet of Things.
Webinar Recording
GDPR as opportunity to build trusted relationships with consumers
Mar 20, 2017
The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.
Digital Finance World 2017
4 videos
Videos from the Digital Finance World 2017
Event Recording
Dr. Khanh Dang Ngo - Regulation of Blockchain-based Platforms
Mar 08, 2017
Event Recording
Robert MacDonald - The Alternate Truths of Identity Management
Mar 08, 2017

It is an exciting – and challenging – time in the identity management space for the Financial Services industry. Digital disruptors like IoT, Digital Transformation, the Cloud, Hybrid, Blockchain, Shadow IT, DevOps and more suggest a significant change in identity management. But what does this challenge mean for Financial Institutions? Join our session as we work through the alternate truths to find a way forward.

Event Recording
Martin Kuppinger - Findings from a Recent KuppingerCole Study on PSD2 Readiness
Mar 08, 2017
Event Recording
Christian Goy - The Future of Digital Finance
Mar 08, 2017

The financial world is pressured with ever-increasing change in customers’ demographics undermining banks loyalty-base, well-funded fintech startups looking to disrupt incumbents and a new generation of customers.In his session, Christian Goy will explore what value means to customers today, how redefining a brand’s customers by how they think, instead of who they are or what they do becomes more paramount, and how banks today can use behavioral economics to help predict the customer demands of tomorrow.

Webinar Recording
Privileged User Monitoring as Key Element of Counter-Measures
Feb 22, 2017
The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services.
Webinar Recording
Improving Your SOC Efficiency with Advanced Security Analytics
Jan 25, 2017
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.