HEADLINERS
HEADLINERS
Hearts, Minds, and Wallets: War Over Digital Identity
50:10
In the last two years, the war for the hearts, minds, and wallets attached to a humans' digital identity has set the stage for open warfare in 2020 and beyond by organizations and industries.
Identity: The Next Ten Years
41:58
The future of the standards and services we build is unwritten. We are curious about the future because we shape it. But from the works of our hands to a world 10 years hence is an unknown path.
Has Poor IoT Security Actually Created Bigger, More Serious Systemic Flaws?
37:12
This talk will outline our research on smart car alarms, solar inverters, car chargers and watches showing critical systemic IoT flaws that allowed trivial access to hundreds of millions of devices.
Identity Standards: What's Up, What's New, What's Next
32:46
Alex will share his thoughts on the importance of Open Standards, and some areas of amazing recent progress. Additionally, he will discuss a few emerging areas and the opportunity they present for enhancing user security.
The CISO Panel
54:35
Back by popular demand, our panel of senior security leaders discusses critical topics in security and identity, and looks to what the future might hold.
The Consumer Identity Panel
54:25
Dealing with identity – authoritative, verified, or just plain account-oriented – at consumer/citizen scale is not easy. Delivering an improved user experience at scale, while still ensuring appropriate security and privacy safeguards, is a major cha
Better Identity at Two Years: Progress, Problems, and Promise
54:48
This panel will discuss where we’ve made progress in digital identity and where we still have problems – and discuss what might happen next in the year ahead.
The Lonely Path to Diversity - Taking Action to Move to Equity, Diversity & Inclusion
49:34
Women occupy less than 15% of executive roles in the technology sector according to the U.S. Bureau of Labor Statistics. This keynote will focus on how to cultivate and advance diversity by including women and people of color into upward career paths
Hearts, Minds, and Wallets: War Over Digital Identity
In the last two years, the war for the hearts, minds, and wallets attached to a humans' digital identity has set the stage for open warfare in 2020 and beyond by organizations and industries.
50:10
Identity: The Next Ten Years
The future of the standards and services we build is unwritten. We are curious about the future because we shape it. But from the works of our hands to a world 10 years hence is an unknown path.
41:58
Has Poor IoT Security Actually Created Bigger, More Serious Systemic Flaws?
This talk will outline our research on smart car alarms, solar inverters, car chargers and watches showing critical systemic IoT flaws that allowed trivial access to hundreds of millions of devices.
37:12
Identity Standards: What's Up, What's New, What's Next
Alex will share his thoughts on the importance of Open Standards, and some areas of amazing recent progress. Additionally, he will discuss a few emerging areas and the opportunity they present for enhancing user security.
32:46
The CISO Panel
Back by popular demand, our panel of senior security leaders discusses critical topics in security and identity, and looks to what the future might hold.
54:35
The Consumer Identity Panel
Dealing with identity – authoritative, verified, or just plain account-oriented – at consumer/citizen scale is not easy. Delivering an improved user experience at scale, while still ensuring appropriate security and privacy safeguards, is a major cha
54:25
Better Identity at Two Years: Progress, Problems, and Promise
This panel will discuss where we’ve made progress in digital identity and where we still have problems – and discuss what might happen next in the year ahead.
54:48
The Lonely Path to Diversity - Taking Action to Move to Equity, Diversity & Inclusion
Women occupy less than 15% of executive roles in the technology sector according to the U.S. Bureau of Labor Statistics. This keynote will focus on how to cultivate and advance diversity by including women and people of color into upward career paths
49:34
PANELS
PANELS
-
Play video Scaling Strong Authentication
Scaling Strong Authentication
Join our expert panel for an in-depth discussion of the challenges and pitfalls of handling strong authentication at large scale – and an exploration of possible solutions.
49:39
-
Play video A Balancing Act Identity, Privacy, and Security in a Data Sharing Economy
A Balancing Act Identity, Privacy, and Security in a Data Sharing Economy
As the value of enterprise data increases, so too do the risks to the enterprise, to the individual, and to the industry. Do you as an identity, privacy, or security professional know how to recognize those risks, let alone mitigate them?
50:31
-
Play video Microsoft Presents: A Zero Trust Approach for Today's World
Microsoft Presents: A Zero Trust Approach for Today's World
This session will demystify Zero Trust and dive into steps to start your zero trust journey.
22:51
-
Play video The CISO Panel
The CISO Panel
Back by popular demand, our panel of senior security leaders discusses critical topics in security and identity, and looks to what the future might hold.
54:35
-
Play video Crushing Biases: Why the Digital Industry Needs Diversity
Crushing Biases: Why the Digital Industry Needs Diversity
Tech companies and departments with gender diversity are more likely to stay on schedule, under budget, and have improved employee performance and satisfaction. Gender-diverse teams and business units have higher revenues and profits. Learn more.
51:58
-
Play video Dev, Sec, or Ops: The Future is Hybrid and Automated
Dev, Sec, or Ops: The Future is Hybrid and Automated
The panel’s viewpoints will cut across both industries (healthcare, financial services, government) and business relationships (vendor, integrator, and customer) to show different perspectives on how the problems are being solved.
53:38
-
Play video Next-Gen Authorization Throwdown: It's Not Your Grandfather's OAuth
Next-Gen Authorization Throwdown: It's Not Your Grandfather's OAuth
Join this panel of experts to hear their differing perspectives on OAuth innovation and how its next wave(s) of iteration must proceed for success.
52:11
-
Play video How Identity Startups Can Raise Capital and Work with Corporates
How Identity Startups Can Raise Capital and Work with Corporates
Developing an identity startup? Looking for your next round of funding? This session provides information for identity startup founders and teams on how they can raise capital for their business.
46:33
-
Play video The Skills and Experiences of Identity Practitioners
The Skills and Experiences of Identity Practitioners
Knowing what skills you need to become an identity practitioner isn’t obvious. Picking which technical and nontechnical skills you need to strengthen isn’t a straightforward choice. To get clarity you need to hear from other people who’ve been there.
55:46
-
Play video IDPro Public Plenary
IDPro Public Plenary
IDPro is the association for digital identity professionals. IDPro’s board, staff and individual members will provide an update on progress, insight into what’s coming next, and will outline how you can help your fellow professionals.
53:50
-
Play video Open Banking APIs Convergence - A Holy Grail or Reality
Open Banking APIs Convergence - A Holy Grail or Reality
Open Banking is becoming the front line of the data economy in our era. It is seen as a field that fosters new industry that many governments are requiring the implementation of secure but usable APIs as part of their economic growth policy packages.
54:28
-
Play video Getting Controls Right - Balancing Security, Privacy and Experience
Getting Controls Right - Balancing Security, Privacy and Experience
Transparent. Seamless. Secure. Helpful. Easy. All things organizations strive for in terms of user experience. But what about the enterprise teams that work behind the scenes to make this digital experience better?
59:24
MASTERCLASSES
MASTERCLASSES
-
Play video Hands on Identity in Kubernetes
Hands on Identity in Kubernetes
This session is a hands-on approach to identity management in Kubernetes. This session will walk users through integrating Active Directory via OpenID Connect, enabling the audit log, debugging RBAC policies and finally enabling and configuring pod s
47:31
-
Play video Mobile Driver's License Built with Privacy by Design and Default - a Discussion
Mobile Driver's License Built with Privacy by Design and Default - a Discussion
For this session, you will hear the UX Design Lead, Lead Business Analyst and Identity Architect from a product team of a global identity and security company discuss the complex dance of how to design and build a product with designed-in privacy.
47:36
-
Play video The Burden of Proof
The Burden of Proof
Explore proof-of-possession in OAuth and endeavor to equip you with the knowledge to discern fact from fiction when it comes to cryptographic defenses against the use of stolen OAuth tokens.
49:12
-
Play video A Secure OAuth 2.0/OpenID Connect Backend for SPAs
A Secure OAuth 2.0/OpenID Connect Backend for SPAs
This session will present an implementation strategy for deploying OAuth 2.0 and OpenID Connect for Single Page Applications (SPAs) by leveraging a secure server backend.
43:31
-
Play video Troubleshooting Federation Issues on the Wire - Supporting Technologies Through Protocol Analysis
Troubleshooting Federation Issues on the Wire - Supporting Technologies Through Protocol Analysis
Learn how to reproduce an issue with some readily available tools and investigate key elements of federation protocol messages. SAML, OAuth, and OpenID Connect scenarios will be covered. Issues to troubleshoot will include time synchronization issues
55:20