-
Play video Hearts, Minds, and Wallets: War Over Digital Identity
Hearts, Minds, and Wallets: War Over Digital Identity
In the last two years, the war for the hearts, minds, and wallets attached to a humans' digital identity has set the stage for open warfare in 2020 and beyond by organizations and industries.
50:10
-
Play video Is Homomorphic Encryption a Reality?
Is Homomorphic Encryption a Reality?
The ability to keep data encrypted while in use for computations in the cloud could protect data from attackers and malicious insiders alike. This session introduces homomorphic encryption: the concept, the advantages, the challenges, the ground real
24:10
-
Play video Making PAM Effective
Making PAM Effective
In this informative session, learn how you can secure your vault and make your PAM system an effective pillar of your security infrastructure.
23:45
-
Play video Kicking and Screaming: Migrating your legacy appts to modern security
Kicking and Screaming: Migrating your legacy appts to modern security
Do you have a plan to drag your legacy apps into the 21st century? How will you modernize them so they’re protected with identity-based security rather than relying on legacy security protocols?
24:58
-
Play video Mission Impossible: Identity Mythos
Mission Impossible: Identity Mythos
Your mission, should you choose to accept it, is to see how the M:I series has some pretty interesting lessons on how to do identity-based security right (or wrong).
23:38
-
Play video Next-Gen Authorization Throwdown: It's Not Your Grandfather's OAuth
Next-Gen Authorization Throwdown: It's Not Your Grandfather's OAuth
Join this panel of experts to hear their differing perspectives on OAuth innovation and how its next wave(s) of iteration must proceed for success.
52:11
-
Play video The Science Behind Detecting Compromised Identities
The Science Behind Detecting Compromised Identities
Get a peek under the hood of the data science and how behavioral analytics, machine learning and other risk signals can be used to design high-quality identity compromise detection algorithms working in real-time.
22:57
-
Play video The Password Mess - Your Security Policies Are Destroying Your Users
The Password Mess - Your Security Policies Are Destroying Your Users
In this fast-paced talk, NIST Digital Identity Guidelines co-author Justin Richer will walk through how we got into this password mess and what we can do it about it.
20:09
-
Play video Persistence of the Undead - If Digital Identity is Transforming, Why am I Still Using Passwords
Persistence of the Undead - If Digital Identity is Transforming, Why am I Still Using Passwords
Consensus is coalescing around what the general user experience of a true identity-centric technological ecosystem ought to be – intuitive and friendly, task appropriate levels of friction, user control and ownership of PII.
25:08
-
Play video Identity Kill Chain: A Hacker's Eye View of How Your Systems Get Pwned
Identity Kill Chain: A Hacker's Eye View of How Your Systems Get Pwned
In this nerve-wracking session, through live demos of current attack methods you’ll gain a deeper understanding of the criminals’ “tools of the trade,” where the weakest links in identity systems are & how best to break the kill-chain for each step.
25:28
-
Play video Zero Trust - Hype or Game Changer
Zero Trust - Hype or Game Changer
his presentation will explore what’s new in zero trust and what is just a repackaging of existing tools and processes to help organizations develop an appropriate strategy for enhancing their cyber security.
18:50
-
Play video Using Threat Modeling to Harden Your Identity Infrastructure
Using Threat Modeling to Harden Your Identity Infrastructure
In this talk, we’ll discuss a practical approach to threat modeling with a focus on your identity infrastructure.
28:47
- Load More