...
  •  TYPE: Track   DATES: May 11 – May 12, 2016

Conference Tracks

fotolia 100995092 m bearb

The Digital Transformation is not only about new products, services, and business models. It is neither a singular event or a one-time transformation. Digital Transformation means transforming into agile enterprises where business processes, partnerships, customer relations, services, and products are ever-changing and innovation happens at high speed. This imposes new security challenges, by smart manufacturing (Industry 4.0), connected things and myriads of data, and more identities to deal with than ever before. It is about a new way of managing identities and their access in complex relationships. Doing security and privacy right builds the foundation for agility – without it, business will fail. Connecting means convergence of business IT, operational technology, connected things. IAM is the central element for security of these connected environments, in which attack surfaces multiply.

Topics in this track:

  • New Security challenges in OT, Industry 4.0 and IoT
  • Connecting means transforming: One Security for all – business, manufacturing, connected things
  • Why Privacy and Security by Design make you agile in the Digital Transformation
  • Beyond physical/logical convergence – not only authentication, but integrated processes

Tracks:

Blockchain Identity & Security

Sessions:

Blockchain, Identity, Cybersecurity: Revisiting Risk Management in a Post-Privacy Age of Trustless Distributed Systems

Date: Wednesday, May 11, 2016 Time: 11:00-12:00

Blockchain, Identity, Cybersecurity: Revisiting Risk Management in a Post-Privacy Age of Trustless Distributed Systems
Unlike other technological revolutions, this horizontal, peer-to-peer nature of the blockchain will have a direct impact on non-technological governance and societal factors. How is trust established without trusted third parties? Although it is not possible to offer a prediction of how distributed ledger technology with change society, the assertion that new and publically-accessible technology such as the internet, file sharing and social networks would empower individuals and lead to a…

Blockchain – a New Compliance Paradigm?
One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Permissioned vs. Permissionless, Private vs. Public, decentralized vs. Distributed – Comparing Blockchain Concepts

Date: Wednesday, May 11, 2016 Time: 12:00-13:00

Permissioned vs. Permissionless, Private vs. Public, decentralized vs. Distributed – Comparing Blockchain Concepts

Blockchain Identity
In this session you will learn how blockchain is relevant for internal and external users, how it can interface with existing systems, and how it allows users to truly own their identities (and the implications).

Blockchain Use Cases

Sessions:

How to Make the Blockchain a Reality

Date: Wednesday, May 11, 2016 Time: 14:30-15:30

How to Make the Blockchain a Reality
Join this exciting panel on blockchain to learn how technology can disrupt the financial industry as well as any supply-chain and other transaction oriented busienss models, creating new growth potentials through competitive advantages, reduced cost and improved service quality. Blockchain is not yet ready to support industrial use cases. In this panel session we will discuss the requirements across industries and how to improve and accelerate the maturity of this shared ledger technology…

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World

Date: Wednesday, May 11, 2016 Time: 15:30-16:30

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World
Recent research estimates that there are 1.5 billion individuals who do not have any means to prove their legal identity. Failing states lacking to perform even the most basic administrative tasks, supressed ethnic groups, and of course all those who have to flee their home due to conflicts or disasters. New thinking is required to make identification available to all humans, and to help refugees and displaced people to cross borders and to apply for asylum. In this panel discussion, we…

Fintech, Insurtech, Blockchain: Creating a Reliable Financial Backbone for the Internet of Everything

Date: Wednesday, May 11, 2016 Time: 17:30-18:30

Fintech, Insurtech, Blockchain: Creating a Reliable Financial Backbone for the Internet of Everything
The transformational and disruptive potential of IoT will enable an incredibly broad range of new services and business models, if there is a flexible and reliable financial backbone available powering the transactional part of these business models.  Imagine a smart meter which is able to buy electricity from various vendors on my behalf if certain condtions like a defined price tag proof true. It escrows my money and transfers it to the vendor in agreed portions…

Consumer Identity

Sessions:

IAM + Big Data + Privacy by Design = Consumer Identity?

Date: Thursday, May 12, 2016 Time: 11:00-12:00

IAM + Big Data + Privacy by Design = Consumer Identity?
Imagine an ideal world where you own your digital identity. It exists in one place, is globally accessible, private by default and simple to maintain. You may want to show parts of it to others, but the choice is yours. Vendors dealing with you would never get into conflict with ever-tightening privacy regulations. They wouldn´t necessarily need to know  who you are, as long as there is a relationship in place which allows the vendor to know your needs. …

Customer Identity Management: What makes the Difference?
Over the last few years there has been a shift from internal employee focused (B2E) IAM installations towards partner and customer focused (B2C) external facing IAM systems. This means that the job market is shifting and many IAM practitioners are taking on roles in the B2C space. If you are an experienced B2E manager that has been given the job of running a B2C IAM program what should you think about? What are the main differences between B2E and B2C? Key Takeaways: The key…

IDaaS needs another S for Security

Date: Thursday, May 12, 2016 Time: 12:00-13:00

IDaaS needs another S for Security
The Identity-as-a-Service solutions of today are helping many businesses address the password management problem, enabling a seamless experience for end users, and delivering IT efficiencies. But as more and more enterprises put Cloud at the center of their enterprise IT, is that enough? Join this session to learn about the security challenges of a SaaS-first world, and the transformation needed in Identity-as-a-Service to address these challenges.

BYOI (Bring Your Own Identity): Me,Things and the Relationship between. The Claim for a Frictionless Security World
Frictionless IT is a simple term to understand, it’s about an IT ecosystem focused on give the end user a continuous user experience where there’s not friction, hence the term, while using different devices, application, programs, networks or at higher level any on premise/cloud environment. It’s an IT that just work anywhere, anytime with any device for any user. Embracing a journey toward a frictionless IT ecosystem need to embrace an equivalent and inclusive journey toward a…

Internet of Things & Industry 4.0

Sessions:

Date: Thursday, May 12, 2016 Time: 14:30-15:30

IPv6 – a Security Perspective

Date: Thursday, May 12, 2016 Time: 15:30-16:30

IPv6 – a Security Perspective
The Internet of Things forces the conversion to IPv6. Several carriers have run out of IPv4 addresses. IPv6 is advertised as more secure and more versatile. But there are some new security risks that did not exist in IPv4. And there are some wrong perceptions as well. After a short general introduction of IPv6 basics, the presentation will focus on new risks that did not exist in IPv4. Finally there is guidance on how to securely migrate into the IPv6 world.

Date: Thursday, May 12, 2016 Time: 17:00-18:00

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.