No sessions found. Try making a different selection.
- Sunday 5, April
- 13:00Adrift in an ever-morphing sea of technologies that 'relate' to identity and access management (IAM)? Join JumpCloud Chief Strategy Officer Greg Keller as he leads a journey tracing the evolution of the foundational directories that remain fundamental to resource access governance. From the impact of cloud on IT and security personnel; the advent of cloud-forward and/or ‘born in the cloud’ companies that have zero intention of managing on-premise infrastructure, or companies that are trying to be like these progressive startups and ‘lifting/shifting’ their way to the cloud; we'll explore the technology ‘stack’ that currently composes the IAM spectrum.
- 13:00The Digital Credentials Consortium, founded by MIT and 11 other major universities, is a university-led effort developing a verifiable digital credentialing ecosystem. Join lead architect Kim Duffy as she describes how this effort employs decentralized identity standards such as Verifiable Credentials and Decentralized Identifiers, how the DCC plans to adapt to varying requirements among its members, and the challenges in providing usable and user-friendly credentials to learners.
- 13:00Bug bounty programs are becoming increasingly common across industries as more organizations embrace collaborating with ethical hackers to find vulnerabilities before cyber criminals have a chance to exploit the same bugs for nefarious purposes. HackerOne Security Engineer Reed Loden outlines the steps to develop a vulnerability disclosure program, including what to include in the policy itself.
Attendees will be grouped into teams to create a mock VDP, playing the roles of product lead, legal, security, communications, vendors and suppliers. This engaging content will give you the practical knowledge you need to establish a Vulnerability Disclosure Program within your organization.
- 13:00Authentication should be smarter and more adaptive. You want to trust your users, and you want them to trust you. Whether they are updating account information, being onboarded as a new customer or employee, or requesting privileged access, it’s a delicate balance. Learn how to combine advanced risk detection with identity and access to assess the full context of a digital user’s identity. By implementing an AI-powered adaptive access strategy, you will be able to deliver a frustration-free digital experience without increasing risk.
- 13:00This FIDO 101 workshop will give attendees a foundational understanding of the FIDO Alliance, FIDO standards and the FIDO certification program, and is designed for organizations interested in deploying FIDO standards. This session will help those organizations prepare for deployment and help them think through any business considerations that may impact their decisions.
The FIDO Alliance is a cross-industry, not-for-profit consortia that provides a set of specifications and certifications for an interoperable ecosystem of hardware, mobile, and biometrics-based devices. This ecosystem enables web service providers to: deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience, eliminate the need for consumers to have multiple authenticators, and allow each service provider to create its own trust relationships with individual customers and their devices. Perhaps best of all, FIDO standards protect service providers from data breach risk stemming from phishing and man-in-the-middle attacks.
- 13:00Digital technologies are revolutionizing customer interactions, with new rules and possibilities that were unimaginable only a few years back. Customer Identity and Access Management (CIAM) is an emerging area in IAM, and a foundational layer in crafting quality digital customer experiences.
Today’s increasingly sophisticated consumers now view digital channels as the primary mechanism for interacting with brands and, consequently, expect deeper online relationships delivered simply and unobtrusively. CIAM turns customer data into gold!
- Dates Coming Soon
- Most real-life security projects are messy business. Where modern protocols need to integrate with legacy solutions, security best practices must coexist with the unique requirements of existing business practices, and common sense expectations are blatantly subverted. While we all wish we could find a clear path to the Emerald City, down the Yellow Brick Road to an identity utopia where questions are easily answered, there really is no “one size fits all solution.”
Join Vittorio Bertocci, Auth0 Principal Architect, in a technical session where he explores specific identity use cases that are the most in need of customization. He'll discuss strategies for providing last-mile affordances and customizations, and how customization will ensure you keep pace with today's staggering pace of identity development.
- Today’s headlines are ripe with data breaches and fraud attempts, but fraud goes far beyond stealing identities and payment information. Sift Trust & Safety Architect Kevin Lee reveals why spammy content is the fastest-growing type of fraud, with 50% of businesses expecting content abuse to increase over the next 12 months, taking a massive toll on customer loyalty and affecting both revenues and growth.
Over recent years, the growing threat of fake reviews forced the FTC to launch its first-ever case challenging paid fake reviews on websites. Consumer perceptions and feelings towards fake reviews highlight risks of brand abandonment and the potential to suffer long term revenue loss.
Despite growing concerns over fake reviews, many businesses still heavily rely on reviews as a key search differentiator. Business need to smarten up. They need to evolve and adopt new strategies that protect their users, how to identify fake content and take a proactive defensive approach.
- Cookies: oft-maligned, yet critical to providing the algorithmically-tailored recommendations demanded by modern consumers. Google and Apple are cranking down on third-party use of deterministic and probabilistic cookies data, posing a devastating threat to the viability of digital advertising. Will the death of cookies as we know them deal a fatal blow to user experience? Learn how enterprises across industries are preparing for this groundbreaking shift away from cookies and repositioning their business models to steward consent-based user experiences in a mobile-first world.
- Financial inclusion is the key to unlocking economic growth in markets from New York City to Delhi. Its impact can be measured in the trillions of dollars, with the potential to surpass the value of all the gold in the world. Extrapolating from real-world case studies, from M-Pesa to Libra Association, this session evaluates the economic viability of global identity initiatives aimed at expanding financial services to the unbanked. Explore inclusion-focused business models making both financial and societal impact without risk and compliance tradeoffs.
- More industries than one would expect are being targeted by foreign governments. And they may not be targeting who you might think; hackers are increasingly making private citizens -- from a middle manager working at a tech company to a Hollywood assistant -- the subject of their attacks. With the global internet rapidly becoming a battlefield for national intelligence agencies, and private institutions no longer off-limits as targets, cybersecurity defenses must evolve to protect against increasingly skilled and well-funded opponents. Is your organization prepared to face these escalating threats? Who's really at risk? This session explores deep fakes, disinformation, cybersecurity, and campaigns designed to threaten elections and beyond.
- Increase ease of your access without compromising your identities' security. Organizations strive for digital accessibility because delivering services online is the most efficient channel for customers and for operations. Unfortunately, the most portable logins, Facebook and Google, aren’t trusted; and, the most trusted logins, bank and employer, aren’t portable. This state of affairs means that organizations, not individuals, control the login and the data -- a state of affairs that makes individuals repeat the same workflows to establish a new login at each site.
With federated identity, the individual controls the login and the associated verified credentials, so registration at a new application is a simple and streamlined process.
Given the rise of portable and trusted identity providers, the barriers that have stood in the way of adoption may finally be a thing of the past. This session explores concrete case studies of solutions being implemented and how they deliver critical functionality without driving user confusion.
- You've met GDPR, now meet its newest, little sibling CCPA! This session explores the current and future impact of California's data privacy regulations, which are set out to cost companies $55 billion in initial compliance costs. Yikes. California's not alone on this one; nearly half of all U.S. states are developing data privacy legislation. Get a birds-eye view of the similarities (and differences) between CCPA and GDPR and learn how to store, use, and share customer data while remaining compliant with different data regulations around the globe.
- The rapid pace of technological innovation powered by deep learning and artificial intelligence is eclipsing the ethical and policy frameworks governing their application. Do software developers have an ethical obligation to build in flags that help fight misinformation? How can we detect bias in the data sets used for training machine learning models? This session unpacks how algorithm-powered technologies, from AI and machine learning to facial recognition, are redefining business processes, and the critical identity questions that we need to solve for in this tech-enabled era.
- Marketers rely on engaging the right customer, with the right message, at the right time, and 96% of marketers say identity resolution is their most important asset. The evolving data privacy landscape, however, is set to fundamentally shift how companies work with personal data and is expected to have an outsized impact on the field of identity graphing and identity resolution. With the use of probabilistic data sets continuing to expand from core marketing use cases to trust & safety applications, what does the future hold for successfully identifying users across devices? Learn how identity graph providers and their clients are adjusting to an uncertain landscape in the face of both regulatory and technological headwinds.
- 10 years ago no one was interested in the notion of "digital identity". There were accounts and passwords and it was an irritating administrative function to manage all those accounts for customers, citizens, and humans. In the last two years, the war for the hearts, minds and wallets attached to a humans' digital identity have set the stage for open warfare in 2020 and beyond, as organizations and industries see the value in being the creator and manager of a digital identity standard.
What does it mean, for the US and the world, when banks, payment processors, social media, governments, and healthcare networks are all racing to create an operationally sustainable unique digital identity? Will there be tensions and challenges between these different actors when it comes time to recognize the credibility and authenticity of each other's standards?
This session weaves through these new challenges that will most certainly create competing standards for future generations.
- 20% of the U.S. adult population face obstacles to obtaining credit. The explosive use of social media and smart devices, however, have ushered in a new wave of alternative data sets for "credit invisible" consumers. This session takes a deep-dive into the market opportunity for redefining "creditworthiness," the modeling techniques that play a role in expanding access to traditional credit at scale, and the leading platforms rooting out fraud while still enabling financial inclusion.
- Generative adversarial networks, quantum computing and deepfakes pose threats to the technologies tasked with ensuring the security and integrity of your platform. AI-powered threats can take over identities at personal, corporate and perhaps soon at even government levels. How real is the risk, and what are the available countermeasures to secure us from these next generation technologies?
The sessions covers how the public and private sectors can work together to address the issues of AI-based fake identities and how to create new defenses, as well as a sobering look at what the future may look like if we don’t work to secure these layers.
- As children, we were educated never to trust strangers. Today, companies across the sharing and gig economies are fundamentally revolutionizing the way we assess, measure, and mitigate risk both in the offline and online worlds. Successfully identifying both fraudsters and malicious actors from good users lies at the heart of the modern sharing economy platform. Yet, these determinations must often be made without the benefit of deterministic data or face-to-face identity proofing. Learn how data scientists from leading platforms and marketplaces are tackling these challenges head-on with a combination of innovative technologies and new data sets.
- Synthetic identity fraud is one of many ways accomplished fraudsters like to test an organization's business controls and risk mitigation savviness. Additionally, many platforms seeking to offer credit access for “thin-file “credit applicants are prime targets for synthetic identity fraud. With many characteristics shared between true "thin-file" applicants and synthetic identities, how are leading platforms rooting out fraudulent applicants while still enabling inclusion and an optimized user experience?
- While celebrity deepfakes have garnered mass media attention (we've all seen that Obama video), the bigger concern is when we're exposed to content that's not overtly obvious to be fake. The decreasing amount of source material required to generate sophisticated deepfake videos and imagery has unlocked a terrifying new range of malicious use cases for this new technology. As an example, what happens if your voice and face are unintentionally being used to authorize someone else to access your account? Explore the leading tools being used to detect and defeat deepfakes for both cybersecurity and trust & safety applications.
- Each day, detecting fraud, increasing security and ensuring customer satisfaction becomes a tougher act to juggle as cybercriminals work diligently to concoct new scams. Solving for newer fraud challenges – as well as traditional ones – will require using more innovative tools and data with less friction for the consumer.
When organizations harness relevant data and turn it into intelligence that evaluates each individual, revealing their potential – or their hidden risks – they find the Maximum Viable Person. By using a combination of cutting-edge technologies that include machine learning, AI-powered analytics, and comprehensive data resources, organizations can gain meaningful insights into customers and applications to help identify risks early in the transaction process, while accurately identifying top potential customers.
This workshop covers recommended best practices to make critical decisions in real-time without increasing the level of manual reviews or sacrificing customer satisfaction.presented by
- User-Generated Content (UGC) lends authenticity to online marketplaces; however, when a company's brand is left in the hands of its users, the risks can be devastating. Content abuse, from fake listings to hate speech, is a growing concern for companies protecting their customers' interests and their bottom line. What are the entry points that introduce malicious UGC into online ecosystems? What are organizations doing to rid toxicity from their platforms? This session explores the highly specialized attacks propelling misinformation and the ways organizations can successfully prevent trolls from damaging brand reputation and profitability.
- Is it time to throw in the towel? From billion-record data breaches to GDPR and CCPA, global consumer awareness of data privacy and data protection issues are at an all-time high. Will these new pressures force a fundamental shift in the industry, or can companies continue big data monetization in a data-preserving way? Are privacy-preserving platforms good for the bottom line or the latest PR talking point? This energetic debate features industry experts going head-to-head over the ethics and possible future of big data monetization in a post-CCPA world.
- The CIAM and IAM convergence is upon us. Enterprises are treating their consumers and employers as distinct workflows. The truth of the matter is, employees have the same desires for omnichannel experience and leveraging analytics for workflow insights as their consumers do. This session dives into the essential considerations for adopting a holistic IAM/CIAM solution and what the future digital identity landscape holds for solutions providers.
- The first whole human genome sequencing was completed in 2003 and cost roughly $2.7 billion. Today, those costs have dropped as low as $699. The commoditization of human genome sequencing is poised to alter every aspect of how we diagnose and treat illness. However, there remain persistent questions that have been left unanswered. Our genome is the fundamental building block of our identities. How is sensitive health information captured, stored, and monetized? If this information is stolen, how do we, as an industry, respond?
- On the heels of government-mandated open banking deployments in the UK and EU, we have witnessed something nearly unprecedented: voluntary US adoption of standards implemented by force in European markets. Hear from open banking leaders on both sides of the pond, as we explore how the impact on both financial services incumbents and Fintech startups, and progress towards open banking goals, have differed based on these unique approaches.
- Startup funding in sectors identified as competing directly with Amazon, Facebook, Google and Apple has hit historic lows in 2019. With "big tech" now setting its sights on digital identity, what does this portend for the identity industry at large? Can your business compete for consumers and funding in this new landscape? Explore the ramifications of a FAANG-led digital identity revolution with perspectives from across industries.
- Trust is the essential foundation to feel safe in any relationship, whether personal, professional or even financial. Without Trust & Safety, it all falls apart. For digital platforms, in particular, ensuring user trust in the accuracy and integrity of their platform remains a fundamental challenge.
This panel is all about building trust into the user experience. Industry experts will come together to discuss tales of past launch failures, what decisions went well, and future predictions. The conversation will also explore how are unicorn marketplaces managing expectations while maintaining platform integrity. Understand how managing this balance is more possible than ever, with perspectives from trust & safety innovators.
- The moment you’ve all been waiting for - distributed ledger proponents take the stage to defend their industries' most passionate voices. Many of today’s digital identity systems are designed around cryptographic keys—much like the IP addresses of the early internet. The key challenge that remains is how we can make digital identity solutions more human and implement these solutions into existing habits. This is a can't miss event for anyone who has an opinion on what digital identity architecture is best for the industry.
- Think you know your customer? Think again. National identity projects, nascent digital identity ecosystems, and regulatory shifts are redefining how KYC is performed, and the resulting data stored. Don't miss out on the trends reshaping this critical space. This session provides an opportunity to hear from identity innovators who are building KYC applications that improve quality, speed, accuracy, and user experience for all.
- Meaningful solutions to closing financial inclusion gaps necessitate both public policy action and the support of private sector institutions. Where the borders of policy should lie remain the subject of intense debate. Should governments take a more active role in advancing financial inclusion or lessen regulation to spur innovation? This session explores a public-private approach to solving fundamental challenges in identity technology, communications, strategy, policy, and workforce development.
- The advent of new technologies has fueled a new generation of digital identity startups. These companies are helping refugees secure portable identities, defend sensitive data against bad actors, and helping consumers trust institutions in the digital age.
This session details lessons startups have learned over the past few years of disrupting identity, common pitfalls to look out for, and the bounty of success stories from along the way.
- From patient record maintenance, compliance requirements, to ongoing patient care, the healthcare industry has amassed a tremendous amount of sensitive data. These patient data records are worth between 20 and 50 times more to bad actors than other types of personal information, like financial transaction data.
Additionally, the advancements in analytics and machine learning, have unlocked new, informative insights into the human genome, preventative medicine, and patient profiles. This panel will address methods, such as homomorphic encryption, which allow organizations to harness the power of aggregate healthcare information while keeping sensitive data safe and secure.
- The healthcare conversation is more personal than many other topics on the program. We all care about our personal health and the well-being of our loved ones, yet medical errors are the third leading cause of death in the U.S.
Digital identity in healthcare remains a fundamental roadblock to innovation. Securely sharing patient data and accurately verifying a patient's identity, however, can be improved with existing digital identity processes and technologies. This workshop presents viable solutions for identity proofing and patient record matching as well as the most compelling paths forward for truly interoperable healthcare data exchanges.
- You can lead the consumer towards privacy-preserving technologies, but you can't force them to adopt. Successful companies build data privacy and user security into the fabric of their digital platforms to develop sustainable customer relationships at scale.
In this discussion, we will dive into the latest approaches in user-centric design, and learn what it takes to deliver data privacy without negatively impacting the user experience. We will also look at ways companies can prioritize data privacy to create new value streams instead of sacrificing a competitive advantage.
- CCPA is here, do you have a plan? This workshop will explore the impact of California's data privacy regulation. The shifting data privacy landscape is set to fundamentally shift how companies work with personal data and is expected to have an outsized impact on the field of identity graphing and identity resolution. Whether located in California or merely maintaining a website accessible to California consumers, you'll come away with a tactical action plan. Non-compliance isn't an option.
- KNOW Identity 2020 will mark nearly six months since the PSD2 deadline for the deployment of strong customer authentication. What are the lessons learned that may prove instructive for organizations across global markets as they enter the world of open banking? This session explores the opportunities merchants, banks, and other financial services providers have by adapting PSD2 disruptions into enhancements for their customers and their overall authentication systems.
- Investment in digital identity continues to grow at a rapid pace. It's big money... really big money. Hear directly from a panel of seasoned investors focused on digital identity as they share what they look for in their investments, the keys to a successful fundraising round, and what to expect as further capital continues to pour into this growing sector.
- As technology has continued to advance at an accelerated rate and people are uploading more and more of their lives online, many common methods of identity authentication still haven’t kept up with the pace.
Fortunately, the world is starting to see actual action being taken to address the digital identity problem head-on. Earlier this year, Canada saw the launch of a first-of-its-kind, blockchain-based digital identity network that enables consumers to help verify their identities quickly and securely to access services and products. The formation of the network is a result of leading organizations recognizing that the digital identity problem is too complex to take on alone and that close collaboration that leverages strengths across industries is necessary.
This session will explain how this network formed, how its launch marks a step forward in how we will improve digital identity, as well as lessons learned so far and where to go from here.
- The frontiers of digital identity -- from verifying claims and credentials to granting consent ― boil down to the quality characteristics of data. Yet, driving adoption at scale is more than a matter of solving for missing identity data sets. From internationalization to offshore operations, learn the secrets to success from the teams that have successfully onboarded millions of users in challenging markets across the globe.
- Advancements in the collection and creation of personal data continue to outstrip the policy frameworks put in place to regulate them. As IoT healthcare devices and gene sequencing begin creating entirely new classes of PII, healthcare organizations are triaging how this data should be stored, utilized, and protected. By drawing on healthcare’s experiences and lessons learned with data management, this session explores how other industries can enhance their ability to construct frameworks of clean and verified data that are interoperable (or sharable) across disparate systems and technologies.
- As contrasted with risk & compliance, the rapid growth of trust & safety teams across Silicon Valley has largely been driven by market forces as opposed to regulatory considerations. Prominent public-private partnerships have yet to deliver on the promise of a sustainable free market of identities. With online-to-offline platforms taking an ever-increasing role in the economy, is regulation overdue, or a hindrance to innovation?
- It's been over a decade since the API revolution and yet cybersecurity issues remain a pressing challenge. The rise of open banking has fundamentally shifted the cybersecurity landscape, with securing APIs top of mind for financial institutions and fintechs alike. Standards-based APIs have the power to enable access to financial data and to put end-users in control of their data and their financial lives. This session explores the latest strategies for securing the perimeter without impacting the growth of your platform.
- Technological innovation has unlocked identity applications that were unthinkable less than a decade ago, with a profound impact on the viability of digital identity business models. Unpack how advances from blockchain to biometrics are impacting investment and innovation in identity at a fundamental level.
- This session explores the key technical and ethical considerations required to build the next generation of biometric technologies driving inclusion efforts across the globe. How do we course correct for algorithmic biases? How do we securely store biometric templates? What are the most effective biometrics to focus on? Learn the ethical considerations of wide-scale biometric deployment and the data security and privacy challenges organizations must consider prior to expanding into new markets.
- Building a product in 2019 without identity at the core? You’re doing it wrong. Despite every organization’s best efforts to instill strong identity and access management, organizations find themselves between a rock and a hard place when securing their digital transformation strategies. We’ve collectively agreed to retire perimeter security as a sound framework, but how do we evolve from here? How do organizations continue to protect themselves from impending threats -- both human and non-human? This session explores zero trust frameworks, anomalies that can go undetected, and how to patch weaknesses in your current IAM governance and controls.
- The year is 2020. Mobile Drivers' Licenses are here and their adoption is inevitable. State DMVs, fintech, and commercial entities have already begun to implement solutions centered on digital driver’s licenses. The mobile-everything revolution is transforming the boring world of long lines and plastic cards into an exciting, tech-driven circuit where issuers, relying parties, and citizens can security transact at the speed of now. There is an enormous level of excitement building up, and for good reason. Mobile Driver’s License holders possess an authentication credential that is privacy-preserving, secure, easy to use, and legally recognized.