No sessions found. Try making a different selection.
- Sunday 5, April
- 11:00 am5:45 pmRegistrationMGM Grand
- 12:00 pm1:00 pm
- 1:00 pm2:00 pmAuthentication should be smarter and more adaptive. You want to trust your users, and you want them to trust you. Whether they are updating account information, being onboarded as a new customer or employee, or requesting privileged access, it’s a delicate balance. Learn how to combine advanced risk detection with identity and access to assess the full context of a digital user’s identity. By implementing an AI-powered adaptive access strategy, you will be able to deliver a frustration-free digital experience without increasing risk.
Master Class Takeaways:
- How to combine AI with threat intelligence to produce more accurate fraud analysis
- How seamless authentication can contribute to overall Digital Transformation business goals
- How to effectively balance usability and security requirements for end-users
- 1:00 pm2:00 pmCCPA is here, do you have a plan? This workshop will explore the impact of California's data privacy regulation. The shifting data privacy landscape is set to fundamentally shift how companies work with personal data and is expected to have an outsized impact on the field of identity graphing and identity resolution. Whether located in California or merely maintaining a website accessible to California consumers, you'll come away with a tactical action plan. Non-compliance isn't an option. Leave this workshop with practical next steps for your organization on how to move your organization into compliance, also discover how to respond to consumer rights requests under the law.
- The scope of the CCPA. What is considered personal information? How this law affects your organization.
- What you can do now to get your organization in compliance
- Your organization’s obligations to respond to consumer rights requests
- A roadmap for your organization to move to compliance quickly
- 1:00 pm2:00 pmDigital technologies are revolutionizing customer interactions, with new rules and possibilities that were unimaginable only a few years back. Customer Identity and Access Management (CIAM) is an emerging area in IAM, and a foundational layer in crafting quality digital customer experiences.
Today’s increasingly sophisticated consumers now view digital channels as the primary mechanism for interacting with brands and, consequently, expect deeper online relationships delivered simply and unobtrusively. CIAM turns customer data into gold!
101 Workshop Takeaways:
- CIAM is not a single product; it is a solution that integrates multiple components into a larger ecosystem to build a smooth digital experience for customers
- The 5 Pillars of CIAM that act as foundational layers to crafting digital customer experiences
- The maturity model of the CIAM journey and how organizations can assess the degree of maturity of their implementation
- 1:00 pm2:00 pmThis FIDO 101 workshop will give attendees a foundational understanding of the FIDO Alliance, FIDO standards and the FIDO certification program, and is designed for organizations interested in deploying FIDO standards. This session will help those organizations prepare for deployment and help them think through any business considerations that may impact their decisions.
The FIDO Alliance is a cross-industry, not-for-profit consortia that provides a set of specifications and certifications for an interoperable ecosystem of hardware, mobile, and biometrics-based devices. This ecosystem enables web service providers to: deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience, eliminate the need for consumers to have multiple authenticators, and allow each service provider to create its own trust relationships with individual customers and their devices. Perhaps best of all, FIDO standards protect service providers from data breach risk stemming from phishing and man-in-the-middle attacks.
- 2:00 pm2:15 pm
- 2:15 pm3:15 pmHow many times have you heard “Identity is key to securing your networks?” Unless you have some assurances that the digital identities on your networks are being used by the individual identified by them, the security of your networks and the information they contain are in question. The first part of implementing your Digital Identity Perimeter is establishing trust in who belongs to every digital identity operating on your network and accessing your services. Building trust in a digital identity starts with sound identity proofing. This workshop explores how government and private industry are taking a serious look at improving their identity proofing processes and the newly released OMB M-19-17 following NIST SP 800-63-3 digital identity guidelines.
- The processes necessary for agencies to meet the remote identity proofing requirements for Identity Assurance Level (IAL) 2 and IAL3 following NIST SP 800-63-3 guidelines
- Challenges most organizations encounter when performing remote identity proofing
- Identity proofing templates agencies can use to document their identity proofing processes
- 2:15 pm3:15 pmAdrift in an ever-morphing sea of technologies that 'relate' to identity and access management (IAM)? Join JumpCloud Chief Strategy Officer Greg Keller as he leads a journey tracing the evolution of the foundational directories that remain fundamental to resource access governance. From the impact of cloud on IT and security personnel; the advent of cloud-forward and/or ‘born in the cloud’ companies that have zero intention of managing on-premise infrastructure, or companies that are trying to be like these progressive startups and ‘lifting/shifting’ their way to the cloud; we'll explore the technology ‘stack’ that currently composes the IAM spectrum.
Master Cass Takeaways:
- An overview of the evolution of directory services
- The impact of cloud on IT and security personnel
- The ability to contrast/evaluate the technology ‘stack’ that currently composes the IAM spectrum
- 2:15 pm3:15 pmThe Digital Credentials Consortium, founded by MIT and 11 other major universities, is a university-led effort developing a verifiable digital credentialing ecosystem. Join lead architect Kim Duffy as she describes how this effort employs decentralized identity standards such as Verifiable Credentials and Decentralized Identifiers, how the DCC plans to adapt to varying requirements among its members, and the challenges in providing usable and user-friendly credentials to learners.
Master Class Takeaways:
- The goals and architecture of the Digital Credentials Consortium (DCC)
- How DCC relates to other efforts and which standards are used
- The technical and user-facing challenges of building usable decentralized identity systems
- 3:15 pm3:30 pm
- 3:30 pm5:30 pmOpen source AI tools are now available that can help malicious actors manipulate face and voice data to create deepfakes. While celebrity deepfakes have garnered mass media attention (we've all seen that Obama video), the bigger concern is when we're exposed to content that's not overtly obvious to be fake. These fakes can be weaponized by rogue nation-states for disinformation campaigns - to destabilize financial markets or manipulate elections. Or what happens if your voice and face are unintentionally being used to authorize someone else to access your account?
This workshop takes a data-centric perspective on these topics, reviewing the state of the art in face recognition technology and discuss where biometrics is headed. Workshop leaders will explore novel ways to secure biometric data, such as homomorphic encryption and leveraging the blockchain. The workshop will conclude with the role that deep learning is playing in both improving identification accuracy as well in fake news and cybersecurity.
- Overview of the rising problem of deep fakes
- State of the art technology in face recognition
- Use of new techniques like homomorphic encryption/blockchain to protect biometric databases
- 3:30 pm4:30 pmToday’s headlines are ripe with data breaches and fraud attempts, but fraud goes far beyond stealing identities and payment information. Sift Trust & Safety Architect Kevin Lee reveals why spammy content is the fastest-growing type of fraud, with 50% of businesses expecting content abuse to increase over the next 12 months, taking a massive toll on customer loyalty and affecting both revenues and growth.
Over recent years, the growing threat of fake reviews forced the FTC to launch its first-ever case challenging paid fake reviews on websites. Consumer perceptions and feelings towards fake reviews highlight risks of brand abandonment and the potential to suffer long term revenue loss.
Despite growing concerns over fake reviews, many businesses still heavily rely on reviews as a key search differentiator. Businesses need to smarten up and evolve and adopt new strategies that protect their users, actively identify fake content and take a proactive defensive approach.
Case Study Takeaways:
- Deep dive into what fake reviews are and how they can lead to fraudulent activity as well as brand abandonment
- Critical strategies on how to recognize a fake review or fake user
- Real-world examples of content fraud and how businesses can use trust & safety practices and machine learning applications to mitigate fake reviews and reduce the associated risks
- 3:30 pm4:30 pmMost real-life security projects are messy business. Where modern protocols need to integrate with legacy solutions, security best practices must coexist with the unique requirements of existing business practices, and common sense expectations are blatantly subverted. While we all wish we could find a clear path to the Emerald City, down the Yellow Brick Road to an identity utopia where questions are easily answered, there really is no “one size fits all solution.”
Join Vittorio Bertocci, Auth0 Principal Architect, in a technical session where he explores specific identity use cases that are the most in need of customization. He'll discuss strategies for providing last-mile affordances and customizations, and how customization will ensure you keep pace with today's staggering pace of identity development.
Master Class Takeaways:
- A “one size fits all” solution will not protect the identities of your customers and their customers. Learn how to take a surgical approach, not a general one
- Security solutions that require customization to deal with any obstacle, even the most complex
- Specific identity use cases are the most in need of customization
- 3:30 pm4:30 pmIn this one-hour education session, Dave Birch will be exploring the global identity landscape and taking a look at the different models being adopted. With Open Banking taking great strides forward, can this be the catalyst for digital identity? Or are there other use cases that will drive a tipping point of adoption? You will hear from experts in different markets supporting the theory that one size certainly doesn’t fit all!
Dave Birch and his colleagues from Consult Hyperion have worked with clients globally on both Digital Identity and Open Banking initiatives and will bring impartial knowledge and experience, to share with you.
- Detailed analysis of implementation models
- Lessons learned from initial implementations
- The link between Open Banking PSD2/SCApresented by
- 4:30 pm4:45 pm
- 4:45 pm5:45 pmEach day, detecting fraud, increasing security, and ensuring customer satisfaction becomes a tougher act to juggle as cybercriminals work diligently to concoct new scams. Solving for newer fraud challenges – as well as traditional ones – will require using more innovative tools and data with less friction for the consumer.
When organizations harness relevant data and turn it into intelligence that evaluates each individual, revealing their potential – or their hidden risks – they find the Maximum Viable Person. By using a combination of cutting-edge technologies that include machine learning, AI-powered analytics, and comprehensive data resources, organizations can gain meaningful insights into customers and applications to help identify risks early in the transaction process, while accurately identifying top potential customers.
This workshop covers recommended best practices to make critical decisions in real-time without increasing the level of manual reviews or sacrificing customer satisfaction.
- How fraud detection tools, like alerts and scores, can work silently in the background, reducing friction between you and your prospective customer
- How to prevent account takeover (ATO) with risk-based authentication
- How to layer security into mobile and digital channels to create a robust identity intelligence systempresented by
- 4:45 pm5:45 pmBug bounty programs are becoming increasingly common across industries. Today, more organizations embrace collaborating with ethical hackers to find vulnerabilities before cybercriminals have a chance to exploit the same bugs for nefarious purposes. HackerOne Security Engineer Reed Loden outlines the steps to develop a vulnerability disclosure program and what to include in the policy itself.
Attendees will be grouped into teams to create a mock VDP, playing the roles of product lead, legal, security, communications, vendors, and suppliers. This engaging content will give you the practical knowledge you need to establish a Vulnerability Disclosure Program within your organization.
- The steps needed to develop a Vulnerability Disclosure Program, regardless of your industry or company size
- Why having a Vulnerability Disclosure Program can offer a way to receive security reports from external security researchers or members of the public
- How to leverage an ISO-compliant workflow to complement security efforts without changing the way you work
- 6:00 pm9:00 pmIf you like Piña Coladas and getting caught at an awesome networking night, AU10TIX welcomes you to the KNOW Identity 2020 Pool Party. Join us at the Live Lucky Pool at the MGM Grand for an evening of libations and lite bites. Get the beach ball rolling on your 2020 networking!presented by
- Monday 6, April
- 7:30 am8:30 am
- 7:30 am5:45 pmRegistrationMGM Grand
- 8:30 am10:15 amGlenn Greenwald is a former constitutional lawyer and Pulitzer-Prize winning writer, regarded as one of the most influential journalists of our time for his work exposing the US’ global surveillance programs, including Edward Snowden’s classified documents as well as other groundbreaking exposés. His finger is on the pulse of national security and surveillance, and now, he’ll bring insider insights to the KNOW stage.
- 10:15 am12:30 pm
- 10:15 am10:45 am
- 10:45 am11:30 amForeign governments are targeting more industries than one would expect. And they may not be targeting who you might think; hackers are increasingly making private citizens - from a middle manager working at a tech company to a Hollywood assistant - the subject of their attacks. With the global internet rapidly becoming a battlefield for national intelligence agencies, and private institutions no longer off-limits as targets, cybersecurity defenses must evolve to protect against increasingly skilled and well-funded opponents. Is your organization prepared to face these escalating threats? Who's really at risk? This session explores deep fakes, disinformation, cybersecurity, and campaigns designed to threaten elections and beyond.
- Overview of critical infrastructure protection and resilience
- Computer vision techniques and deep learning algorithms to exploit hidden patterns and detect manipulated parts of fake content
- What can we do to increase the resilience in our election systems
- 10:45 am11:30 amWith digital identity poised to enter the mainstream in 2020, both incumbents and startups alike are vying for leadership positions. The frontiers of digital identity ― verifying claims and credentials, proving possession, granting consent ― boil down to the quality characteristics of data. When we deal with people, entities, and things online, data is all we got. Explore the role "big tech" can, should, and should not play in how digital identity data is created, stored, and used across the economy.
- The internet's current identity problem -- truth and data quality in the digital economy
- Real-world examples of some of the most promising pilots, projects, and proofs-of-concept from around the globe
- How product managers, software engineers, and architects can test, build, and scale solutions that address the unintended consequences of technology
- 10:45 am11:30 amCould ""Bring Your Own Identity"" be a core trend in IT?
Organizations strive for digital accessibility to deliver services efficiently, answering user demands for seamlessness. Unfortunately, the most portable logins, Facebook and Google, aren’t wholly trusted; and, the most trusted logins, from banks and employers, aren’t portable to other websites. This state of affairs means that organizations, not individuals, control the login and the data – requiring individuals to repeat workflows to establish a new login at each site.
With Federated Identity, individuals control the login and associated verified credentials, so registration at a new application is streamlined process. However, issues like branding, trusting a third-party's authentication process, and linking a login option lacking massive scale are all significant barriers to adoption for high-assurance applications like government, financial services, healthcare, and hospitality. This session explores case studies of solutions being implemented at Allscripts, ADP, and MGM and the considerations of these brands as they tackled the problem.
- The overall promise of federated identity. We see it with driver's licenses, Facebook, and Google. Why don't we see it on high-value apps?
- The equality implications of federated identity. How can it help individuals without a credit history who can't establish their identity online through a credit reporting agency?
- Barriers to adoption that have prevented the adoption of federated identity at scale. Are these crumbling?
- 11:45 am12:30 pmThe frontiers of digital identity -- from verifying claims and credentials to granting consent ― boil down to the quality characteristics of data. Yet, driving adoption at scale is more than a matter of solving for missing identity data sets. From internationalization to offshore operations, learn the secrets to success from the teams that have successfully onboarded millions of users in challenging markets across the globe.
- How organizations are tackling unique identity, regulatory, and cultural challenges to expand into new markets
- Overview of the key challenges with identity proofing and verification globally
- Nuances of launching products globally while thinking locally and the unexpected benefits of building large-scale identity verification platforms
- 11:45 am12:30 pmThe shift to EMV, SCA, and other measures to stop fraud has left fraudsters scrambling to find new successful ways to profit. Enter synthetic identity.
Synthetic identity fraud occurs when fraudsters use a blend of real and fake information to create a “new” individual. In some cases, the information used is entirely fake. The bad actors will open up new credit cards or auto loans under the fake individual's name, to create credit records and boost the credit profile.
While synthetic ID fraud is not a new tactic, it has become a new favorite for seasoned fraudsters who know how to test your business’s controls and age accounts to bypass your security systems. This session will explain what synthetic ID fraud is and how fraudsters use it to exploit your systems as well as best practices for stopping and preventing loss due to this insidious type of fraud attack.
- What is synthetic ID and how are fraudsters profiting from it
- An understanding of why synthetic ID fraud is more difficult to detect than other types of fraud
- A checklist of best practices for detecting, stopping, and preventing synthetic ID fraudpresented by
- 11:45 am12:30 pmIs it time to throw in the towel? From billion-record data breaches to GDPR and CCPA, global consumer awareness of data privacy and data protection issues are at an all-time high. Will these new pressures force a fundamental shift in the industry, or can companies continue big data monetization in a data-preserving way? Are privacy-preserving platforms good for the bottom line or the latest PR talking point? This energetic debate features industry experts going head-to-head over the ethics and possible future of big data monetization in a post-CCPA world.
- 11:45 am12:30 pmTrust is the essential foundation to feel safe in any relationship, whether personal, professional or even financial. Without Trust & Safety, it all falls apart. For digital platforms, in particular, ensuring user trust in the accuracy and integrity of their platform remains a fundamental challenge.
This panel is all about building trust into the user experience. Industry experts will come together to discuss tales of past launch failures, what decisions went well, and future predictions. The conversation will also explore how are unicorn marketplaces managing expectations while maintaining platform integrity. Understand how managing this balance is more possible than ever, with perspectives from trust & safety innovators.
- An overview of digital trust for consumers and businesses including what trust even looks like and more importantly, how businesses can design for it
- Changing consumer expectations and the shifting regulatory landscape relating to data privacy
- How to balance upfront user friction with fraud detection measures including biometric-based identity proofing and privacy-first identity resolution
- 11:45 am12:30 pmDemo Stage SessionsMGM Grand·Demo Dome
- 12:30 pm1:30 pm
- 12:30 pm1:30 pmKNOW Identity creates a space to celebrate and support the growing community of women in the identity industry. Alongside Experian and Women in Identity, we’ll host our annual Women in Identity Luncheon on Monday, April 6. Join us in bringing the industry together to enable growth for women in the space, and meet your next mentor!presented by
- 1:45 pm4:30 pm
- 1:45 pm2:30 pmMachine learning and artificial intelligence (ML/AI) have been responsible for stunning breakthroughs in speech (Siri, Alexa), pattern recognition (self-driving cars), and natural language processing (sentiment analysis). But advances in security and identity have come much slower. Additionally, the pace of technological innovation powered by deep learning and artificial intelligence is eclipsing the ethical and policy frameworks governing their application. Do software developers have an ethical obligation to build in flags that help fight misinformation? How can we detect bias in the data sets used for training machine learning models? This session unpacks how algorithm-powered technologies, from AI and machine learning to facial recognition, are redefining business processes, and the critical identity questions that we need to solve for in this tech-enabled era.
- Current state-of-the-art Machine Learning and Artificial Intelligence technologies
- The types of problems ML/AI can and cannot solve
- New legal and ethical issues related to ML/AI and the limits of algorithmic fairness
- Where ML/AI is headed in the next few years
- 1:45 pm2:30 pmCookies: oft-maligned, yet critical to providing the algorithmically-tailored recommendations demanded by modern consumers. Google and Apple are cracking down on third-party use of deterministic and probabilistic cookies data, posing a devastating threat to the viability of digital advertising. Will the death of cookies as we know them deal a fatal blow to user experience? Learn how enterprises across industries are preparing for this groundbreaking shift away from cookies and repositioning their business models to steward consent-based user experiences in a mobile-first world.
- How brands and publishers can prepare for a post-cookie world and the loss of advertising data
- The practical and ethical considerations data onboarding services must keep in mind when working with digital identities
- How brands can build creative experiences around data collection that invite consumers to take part in the process
- 1:45 pm2:30 pmAs technology is continuing to advance at an accelerated rate and people are uploading more and more of their lives online, many common methods of identity authentication are not keeping up with the pace.
Fortunately, the world is beginning to see action taken to address the digital identity problem head-on. Earlier this year, Canada launched a first-of-its-kind, blockchain-based digital identity network. This enables consumers with the power to verify their identities quickly and securely, granting them access to products and services.
The formation of this network is a result of leading organizations recognizing that the digital identity problem is too complex to take on alone and requires close collaboration leveraging strengths across industries.
This session will explain how this network formed, its importance in how we will improve digital identity, lessons learned so far, and where to go from here.
- The shift from traditional federation toward networks for identity
- Why this shift matters both strategically and operationally
- Three specific examples of network similarities and differences to inform business, legal, and technical decision-makers
- Easy-to-apply guidance for evaluating the value and appropriate use case applications of identity networks
- 1:45 pm2:30 pmThe moment you’ve all been waiting for - distributed ledger proponents take the stage to defend their industries' most passionate voices. Many of today’s digital identity systems are designed around cryptographic keys—much like the IP addresses of the early internet. The key challenge that remains is how we can make digital identity solutions more human and implement these solutions into existing habits. This is a can't miss event for anyone who has an opinion on what digital identity architecture is best for the industry.
- What is the right protocol for decentralized identity and self-sovereign identity (SSI) platforms in the future?
- Arguments that support the next big step in the evolution of self-sovereign identity and what that means for society
- The commercial models that will drive adoption of SSI
- The role industries can play in a collaborative framework that is globally accessible
- 1:45 pm2:30 pmDemo Stage SessionsMGM Grand·Demo Dome
- 2:30 pm2:45 pm
- 2:45 pm3:30 pmIn an increasingly mobile-first world, companies must embrace a 360-degree view of their customers, understanding both their offline and online behaviors to provide the best user experience. Consumer expectations for seamless onboarding experiences across channels have never been higher, posing a critical challenge to fraud teams balancing the dueling mandates of user friction and risk mitigation. With consumers moving to a faceless channel and fraudsters having access to near-perfect information from the darkweb, learn how enterprises are tackling the next generation of threats, from synthetic identities and breached credentials to forged documents and faked biometrics.
- Identify weak spots in federated identity, sovereign identity, biometrics, identity graphing, behavioral biometrics, and device analytics
- How to stop hard-to-detect account takeover (ATO) attacks and other surreptitious threats to your enterprise
- 2:45 pm3:30 pmStartup Pitch CompetitionDemo Dome·Demo DomeThe KNOW Identity Startup Pitch Competition brings together the world’s leading early-stage startups for a live on-stage battle! Witness the industry’s brightest minds compete for a GRAND PRIZE valued at $100,000 in this fast-paced demo series.
- 3:45 pm4:30 pmOn the heels of government-mandated open banking deployments in the UK and EU, we have witnessed something nearly unprecedented: voluntary US adoption of standards implemented by force in European markets. Hear from open banking leaders on both sides of the pond, as we explore how the impact on both financial services incumbents and Fintech startups, and progress towards open banking goals, have differed based on these unique approaches.
- How open banking APIs can promote secure, global interoperability of financial services across sectors, geographic, and regulatory boundaries
- Guidelines for the financial industry on the essential elements of a secure, transparent, consumer-first approach to data sharing
- Leading practices in data specification and authentication for data sharing in the financial industry
- 3:45 pm4:30 pmAdvancements in the collection and creation of personal data continue to outstrip the policy frameworks put in place to regulate them. As IoT healthcare devices and gene sequencing begin creating entirely new classes of PII, healthcare organizations are triaging how this data should be stored, utilized, and protected. By drawing on healthcare’s experiences and lessons learned with data management, this session explores how other industries can enhance their ability to construct frameworks of clean and verified data that are interoperable (or sharable) across disparate systems and technologies.
- The current patient identity landscape and emerging privacy regulations including state, federal, or patchwork laws
- Lessons learned from the healthcare industry's experiences curating massive data frameworks as well as learnings gathered from other sectors (e.g. financial services) with similar consumer identity requirements
- How to build a Trusted Exchange Framework and ethical data processes that drive compliance, scalable innovation, and consumer trust
- How to confidently "Know Your Patient" (KYP) and support digital authentication that comports with federal identity specifications
- 3:45 pm4:30 pmThink you know your customer? Think again. National identity projects, nascent digital identity ecosystems, and regulatory shifts are redefining how KYC is performed and how the resulting data is stored. Don't miss out on the trends reshaping this critical space. This session provides an opportunity to hear from identity innovators who are building KYC applications that improve quality, speed, accuracy, and user experience for all.
- The evolving technological capabilities of electronic ID verification
- The impact that strong back-office identity verification, KYC, & customer onboarding processes can have on the end customer experience
- How new data sources and authentication tools can open up new market segments
- Mobile verification and authentication to power secure interactions between consumers and banks, payment service providers, and other organizations
- 3:45 pm4:30 pmTechnological innovation has unlocked identity applications that were unthinkable less than a decade ago, with a profound impact on the viability of digital identity business models. Unpack how advances from blockchain to biometrics are impacting investment and innovation in identity at a fundamental level.
- 3:45 pm4:30 pmDemo Stage SessionsMGM Grand·Demo Dome
- 4:45 pm5:00 pmBe there to hear Mastercard share a never-before-heard big company announcement on the KNOW stage!presented by
- 5:15 pm6:00 pmCameron Trimble is a serial entrepreneur committed to the triple bottom line - a concern for people, profit, and the planet. Cameron currently serves as the Board Chair of Stop the Traffik USA, an NGO focused on putting an end to human trafficking around the world through the use of technology-driven intelligence-led prevention. In this keynote session, she’ll share jaw-dropping anecdotes and eye-opening insights into the darker side of identity and technology’s boundless humanitarian potential.
- 8:30 pm11:30 pmNew for 2020, KNOW Identity will be hosting attendees at MGM’s Hakkasan on Monday, April 6 for an unforgettable networking experience at a one-of-kind Vegas’ nightclub. Home to Calvin Harris, Tiësto, and Steve Aoki, Hakkasan’s high-energy environment offers an eye-popping, show-stopping venue to unwind and connect with industry professionals. Pack your party shoes, and we’ll see you out on the dance floor!
- Tuesday 7, April
- 7:45 am5:45 pmRegistrationMGM Grand
- 8:00 am9:00 am
- 9:00 am9:15 ampresented by
- 9:15 am10:00 amDr. Ann Cavoukian is one of the world’s leading privacy experts. In her three terms as the Information & Privacy Commissioner of Ontario, Canada, she created Privacy by Design, a framework that proactively embeds privacy into the design specifications of information technologies, networked infrastructure, and business practices to achieve the strongest protection possible.
Her work has been recognized by the International Privacy Regulators as an international standard and translated into 40 languages.
On the KNOW Identity Keynote stage, she will discuss her groundbreaking work and share her expertise on what the future of privacy looks like, from Privacy by Design standards and beyond.
- 10:00 am12:15 pm
- 10:00 am10:30 am
- 10:30 am11:15 amThis session explores the key technical and ethical considerations required to build the next generation of biometric technologies driving inclusion efforts across the globe. How do we course correct for algorithmic biases? How do we securely store biometric templates? What are the most effective biometrics to focus on? Learn the ethical considerations of wide-scale biometric deployment and the data security and privacy challenges organizations must consider prior to expanding into new markets.
- Multi-factor biometrics (e.g. face, fingerprint, iris, palm vein) as well as other orthogonal solutions (e.g. token, text message, password) to validate identities
- The data privacy landscape for facial recognition and biometrics
- How facial recognition algorithms are designed, developed, tested, and released
- Current and suggested legislative proposals to address racial bias and overall accuracy of facial recognition technology
- 10:30 am11:15 amAs children, we were educated never to trust strangers. Today, companies across the sharing and gig economies are fundamentally revolutionizing the way we assess, measure, and mitigate risk both in the offline and online worlds. Successfully identifying both fraudsters and malicious actors from good users lies at the heart of the modern sharing economy platform. Yet, these determinations must often be made without the benefit of deterministic data or face-to-face identity proofing. Learn how data scientists from leading platforms and marketplaces are tackling these challenges head-on with a combination of innovative technologies and new data sets.
- How data science is being used to takedown highly specialized attacks targeted towards particular victims or platforms
- An overview of User Generated Content (UGC) including real-world examples of how businesses are turning the tables on content and platform abuse
- How to successfully integrate unsupervised machine learning in your fraud detection and risk management arsenal
- 10:30 am11:15 amThe first whole human genome sequencing was completed in 2003 and cost roughly $2.7 billion. Today, those costs have dropped as low as $699. The commoditization of human genome sequencing is poised to alter every aspect of how we diagnose and treat illness. However, there remain persistent questions that have been left unanswered. Our genome is the fundamental building block of our identities. How is sensitive health information captured, stored, and monetized? If this information is stolen, how do we, as an industry, respond?
- 10:30 am11:15 amInvestment in digital identity continues to grow at a rapid pace. It's big money...really big money. Hear directly from a panel of seasoned investors focused on digital identity as they share what they look for in their investments, the keys to a successful fundraising round, and what to expect as further capital continues to pour into this growing sector.
- What venture capital and private equity investors are seeing lately for startup investments in the digital identity space
- The latest trends in build vs. buy decisions and what organizations are looking for when acquiring identity startups
- Areas across digital identity where investors see the most investment opportunity
- 11:30 am12:15 pmYou've met GDPR, now meet its newest, little sibling CCPA! This session explores the current and future impact of California's data privacy regulations, which are set out to cost companies $55 billion in initial compliance costs. Yikes. California's not alone on this one; nearly half of all U.S. states are developing data privacy legislation. Get a birds-eye view of the similarities (and differences) between CCPA and GDPR and learn how to store, use, and share customer data while remaining compliant with different data regulations around the globe.
- How future state and federal legislation will impact the data governance landscape
- Leading practices for protecting and securing customer profile data as required by GDPR, CCPA, and global data regulations
- Strategies for building privacy-centric CIAM, enabling ethical use of customer data, and optimizing the customer experience
- 11:30 am12:15 pmBuilding a product in 2019 without identity at the core? You’re doing it wrong. Despite every organization’s best efforts to instill strong identity and access management, organizations find themselves between a rock and a hard place when securing their digital transformation strategies. We’ve collectively agreed to retire perimeter security as a sound framework, but how do we evolve from here? How do organizations continue to protect themselves from impending threats -- both human and non-human? This session explores zero-trust frameworks, anomalies that can go undetected, and how to patch weaknesses in your current IAM governance and controls.
- Why identity is a core tenant of a Zero Trust architecture
- The enterprise and consumer benefits of taking an identity-first approach to product development
- How WebAuthn and related standards are propelling a user-centric approach to digital identity product design
- 11:30 am12:15 pmAs contrasted with risk & compliance, the rapid growth of trust & safety teams across Silicon Valley has largely been driven by market forces as opposed to regulatory considerations. Prominent public-private partnerships have yet to deliver on the promise of a sustainable free market of identities. With online-to-offline platforms taking an ever-increasing role in the economy, is regulation overdue, or a hindrance to innovation?
- In the absence of a governing regulatory body for the internet, how organizations are building products, teams, and governance frameworks to help ensure trust and safety on their platforms
- Overview of different account recovery methods (e.g. remote identity verification, context-based account recovery processes), their appropriate uses, and how regulation is impacting IDV globally
- A deconstruction of common types of account takeover (ATO) fraud, and the relevant regulation both helping and hindering, organizations defenses against them
- 11:30 am12:15 pm20% of the U.S. adult population face obstacles to obtaining credit. The explosive use of social media and smart devices, however, have ushered in a new wave of alternative data sets for "credit invisible" consumers. Millennials and Gen Z have new financial habits, ushering in a market opportunity for redefining "creditworthiness." Many platforms seeking to offer credit access to thin-file credit applicants are prime targets for synthetic identity fraud. This session takes a deep-dive into the modeling techniques that play a role in expanding access to traditional credit at scale, and the leading platforms rooting out fraud while still enabling financial inclusion.
- The degree to which persistent invisible populations contain safe growth opportunities for lenders
- Predictive models that incorporate alternative data to create financial inclusion opportunities
- Trends in synthetic identity fraud, ahead of the Social Security Administration's rollout of electronic Consent-Based Social Security Number Verification (eCBSV) in June 2020
- 11:30 am12:15 pmDemo Stage SessionsMGM Grand·Demo Dome
- 12:30 pm1:30 pmEach year, KNOW Identity recognizes the identity superstars that are disrupting and reimagining our industry. Join us on Tuesday, April 7, at the annual KNOW Awards ceremony to celebrate the individuals and organizations that truly made waves in the past year. More details regarding KNOW Award nominations coming soon!
- 1:45 pm2:30 pmMeaningful solutions to closing financial inclusion gaps necessitate both public policy action and the support of private sector institutions. Where the borders of policy should lie remain the subject of intense debate. Should governments take a more active role in advancing financial inclusion or lessen regulation to spur innovation? How can fintechs, mobile network operators, and other industries self-regulate in countries that lack effective data protection laws? This session explores a public-private approach to solving fundamental challenges in building financial identities across technology, communications, strategy, policy, and workforce development.
- The frameworks and regulations necessary to operationalize and scale national and international digital identity schemes
- How public-private partnerships can accelerate financial inclusion while providing users with agency and control over their data
- A critical evaluation of alternative data sources required for effective identity verification, fraud protection, and data-enabled financial services
- 1:45 pm2:30 pmKNOW Identity 2020 will mark nearly six months since the PSD2 deadline for the deployment of Strong Customer Authentication (SCA). Done correctly, implementing SCA can actually enhance both user experience and security for remote transactions, enabling merchants to decrease cart abandonment. What are the lessons learned that may prove instructive for organizations across global markets as they enter the world of open banking? Will PSD2 compliance foster collaboration or competition? This session explores the opportunities merchants, banks, and other financial services providers have by adapting PSD2 disruptions into enhancements for their customers and their overall authentication systems.
- How merchants can simplify and build strong authentication into their checkout flow
- How banks and other financial services providers can utilize the same convenient authentication process for login security and account takeover (ATO) prevention
- Action items for accelerating SCA compliance
- 1:45 pm4:30 pm
- 1:45 pm2:30 pmGenerative adversarial networks, quantum computing and deepfakes pose threats to the technologies tasked with ensuring the security and integrity of your platform. AI-powered threats can take over identities at personal, corporate and perhaps soon at even government levels. How real is the risk, and what are the available countermeasures to secure us from these next-generation technologies?
The sessions covers how the public and private sectors can work together to address the issues of AI-based fake identities and how to create new defenses, as well as a sobering look at what the future may look like if we don’t work to secure these layers.
- A better understanding of the reality of AI-driven fake identities and how to find secure layers of trust
- Resilient ways organizations can protect our identities and networks
- Various real-world examples of AI-powered security threats and defense layers
- 1:45 pm2:30 pmDemo Stage SessionsMGM Grand·Demo Dome
- 1:45 pm2:30 pmThe CIAM and IAM convergence is upon us. Enterprises are treating their consumers and employers as distinct workflows. The truth of the matter is, employees have the same desires for omnichannel experience and leveraging analytics for workflow insights as their consumers do. This session dives into the essential considerations for adopting a holistic IAM/CIAM solution and what the future digital identity landscape holds for solutions providers.
- 2:30 pm2:45 pm
- 2:45 pm3:30 pmStartup Pitch CompetitionDemo Dome·Demo DomeThe KNOW Identity Startup Pitch Competition brings together the world’s leading early-stage startups for a live on-stage battle! Witness the industry’s brightest minds compete for a GRAND PRIZE valued at $100,000 in this fast-paced demo series.
- 3:45 pm4:30 pmYou can lead the consumer towards privacy-preserving technologies, but you can't force them to adopt. Successful companies build data privacy and user security into the fabric of their digital platforms to develop sustainable customer relationships at scale.
In this discussion, we will dive into the latest approaches in user-centric design, and learn what it takes to deliver data privacy without negatively impacting the user experience. We will also look at ways companies can prioritize data privacy to create new value streams instead of sacrificing a competitive advantage.
- The identity of people, places, and things and how data impacts interoperability and quality of services
- Proven models of deployment of privacy by design requirements in products and services globally
- How to enable digital identity as a critical element of the customer journey
- The organizational benefits of user-centric design
- 3:45 pm4:30 pmMarketers rely on engaging the right customer, with the right message, at the right time, and 96% of marketers say identity resolution is their most important asset. The evolving data privacy landscape, however, is set to fundamentally shift how companies work with personal data and is expected to have an outsized impact on the field of identity graphing and identity resolution. With the use of probabilistic data sets continuing to expand from core marketing use cases to trust & safety applications, what does the future hold for successfully identifying users across devices? Learn how identity graph providers and their clients are adjusting to an uncertain landscape in the face of both regulatory and technological headwinds.
- The role of a comprehensive identity graph
- Opportunities you shouldn’t overlook to build consumer trust in the process of preventing fraud and ensuring compliance
- Identity Resolution dos and don'ts in today's evolving data economy
- Steps brands can take to reduce mobile fraud and protect their users' identities
- 3:45 pm4:30 pm10 years ago no one was interested in the notion of "digital identity". There were accounts and passwords and it was an irritating administrative function to manage all those accounts for customers, citizens, and humans. In the last two years, the war for the hearts, minds and wallets attached to a humans' digital identity have set the stage for open warfare in 2020 and beyond, as organizations and industries see the value in being the creator and manager of a digital identity standard.
What does it mean, for the US and the world, when banks, payment processors, social media, governments, and healthcare networks are all racing to create an operationally sustainable unique digital identity? Will there be tensions and challenges between these different actors when it comes time to recognize the credibility and authenticity of each other's standards?
- An overview of digital identity standards and the distinct commercial, social, or financial interests inherent in these standards
- New challenges across the digital identity landscape that will most certainly create competing standards for future generations
- 3:45 pm4:30 pmFrom patient record maintenance, compliance requirements, to ongoing patient care, the healthcare industry has amassed a tremendous amount of sensitive data. These patient data records are worth between 20 and 50 times more to bad actors than other types of personal information, like financial transaction data.
Additionally, the advancements in analytics and machine learning, have unlocked new, informative insights into the human genome, preventative medicine, and patient profiles. This panel will address methods, such as homomorphic encryption, which allow organizations to harness the power of aggregate healthcare information while keeping sensitive data safe and secure.
- 3:45 pm4:30 pmDemo Stage SessionsMGM Grand·Demo Dome
- 4:45 pm5:00 pmIn our most exciting Startup Pitch ever, see who will be crowned winner and walk away with the $100,000 GRAND PRIZE! Further details on participants and judges coming soon.
- 5:00 pm5:45 pmWelcoming Brittany Kaiser to the KNOW Identity Keynote stage! You may recognize Brittany from the acclaimed Netflix documentary, the Great Hack. As a former Cambridge Analytica employee, she offers a unique perspective on data privacy issues that will drive honest, open conversations about the data privacy challenges that every industry - from healthcare to marketing - is facing.
- 5:45 pm6:45 pm
- Wednesday 8, April
- 7:45 am10:45 amRegistrationMGM Grand
- 8:00 am9:00 am
- 9:00 am9:45 amUser-Generated Content (UGC) lends authenticity to online marketplaces; however, when a company's brand is left in the hands of its users, the risks can be devastating. Content abuse, from fake listings to hate speech, is a growing concern for companies protecting their customers' interests and their bottom line. What are the entry points that introduce malicious UGC into online ecosystems? What are organizations doing to rid toxicity from their platforms? This session explores the highly specialized attacks propelling misinformation and the ways organizations can successfully prevent trolls from damaging brand reputation and profitability.
- 9:00 am9:45 amThe rise of open banking has fundamentally shifted the cybersecurity landscape, with securing platforms across online and mobile channels top of mind for financial institutions and fintechs alike. Emerging technologies have the power to enable a new era of interconnected platforms and to put end-users in control of their data. This session explores the latest strategies for securing the perimeter without impacting the growth of your platform.
- The key questions every enterprise should ask themselves when it comes to platform security
- The role of API gateways in authenticating and analyzing how your APIs are used
- The current and future application of open standards in platform
- 9:00 am9:45 amThe advent of new technologies has fueled a new generation of digital identity startups. These companies are helping refugees secure portable identities, defend sensitive data against bad actors, and helping consumers trust institutions in the digital age. This session details lessons startups have learned over the past few years of disrupting identity, common pitfalls to look out for, and the bounty of success stories from along the way.
- Startups, entrepreneurs, and innovators will gain tactical approaches to common problems faced by early-stage companies building identity solutions
- Candid missteps and advice for raising capital, establishing your founding team, and hiring your first employees
- Different go-to-market strategies and approaches to attracting your first set of customers
- How stakeholders across the identity ecosystem can work together to create a stronger, more efficient platform
- 9:45 am10:15 am
- 10:15 am12:15 pm
- 10:15 am11:00 amFinancial inclusion is the key to unlocking economic growth in markets from New York City to Delhi. Its impact can be measured in the trillions of dollars, with the potential to surpass the value of all the gold in the world. Extrapolating from real-world case studies, from M-Pesa to Libra Association, this session evaluates the economic viability of global identity initiatives aimed at expanding financial services to the unbanked. Explore inclusion-focused business models making both financial and societal impact without risk and compliance tradeoffs.
- How to build inclusive, digital identity technology systems that are anchored in 'good ID' principles
- Current case studies for blockchain-powered banking services and cryptocurrencies in the developing world
- Strategies for promoting inclusion while reducing fraud and meeting Know Your Customer (KYC) and anti-money laundering (AML) standards
- 10:15 am11:00 amThe year is 2020. Mobile Drivers' Licenses are here and their adoption is inevitable. State DMVs, fintech, and commercial entities have already begun to implement solutions centered on digital driver’s licenses. The mobile-everything revolution is transforming the boring world of long lines and plastic cards into an exciting, tech-driven circuit where issuers, relying parties, and citizens can security transact at the speed of now. There is an enormous level of excitement building up, and for good reason. Mobile Driver’s License holders possess an authentication credential that is privacy-preserving, secure, easy to use, and legally recognized.
- What mobile driver’s licenses (mDLs) are and why they’re being implemented across the U.S.
- How mDLs can be used as a secure identity credential, particularly in retail and banking scenarios, to verify age eligibility, residency, and other personal attributes
- How nationally and globally accepted standards such as OpenID Connect, NIST 800-63-3, and ISO 18013-5 can facilitate global interoperability and implementation opportunities for broader adoption
- 11:15 am12:00 pmThe healthcare conversation is more personal than many other topics on the program. We all care about our personal health and the well-being of our loved ones, yet medical errors are the third leading cause of death in the U.S.
Digital identity in healthcare remains a fundamental roadblock to innovation. Securely sharing patient data and accurately verifying a patient's identity, however, can be improved with existing digital identity processes and technologies. This workshop presents viable solutions for identity proofing and patient record matching as well as the most compelling paths forward for truly interoperable healthcare data exchanges.
- 11:15 am12:00 pmIdentity schemes are only as good as the utility they provide. Implementing successful identity schemes require interoperability across consumer use cases -- such as proving your age when buying age-restricted goods or accessing your health data and bank account information. Interoperability requires alignment of policy, services, and business requirements, not just the underpinning technologies. As ecosystems begin to take shape across industries, what are the keys for success, and what false steps can be avoided? This session explores concrete case studies of solutions being implemented across the globe, and how they deliver critical functionality without driving user confusion.
- Candid conversation around the challenges of identity services infrastructure and how to overcome then
- How to create applications that cater to the needs of individuals, scale to any sized community, and ensure reliability and security
- Blueprints of international identity schemes including BankID in the Nordicspresented by
- 12:15 pm12:45 pmWe will all gather in the exhibit hall to say "Cheers!" to a successful KNOW Identity 2020!