Early-bird Discount
expires in
Register Now

Agenda

Integrating Identity into Security Solutions

Integrating Identity into Security Solutions

Session
Wednesday, December 04, 2024 12:15—13:15
Location: Sirius

Threat of AI in relation to the use of the EU Digital Identity Wallet
12:15—12:35
 

With the arrival of the EU Digital Identity Wallet, the users will be able to store and manage a lot of information and many relationships. This is of course very convenient for the users, but will also make this an attractive target for criminals. In the Nordics, we are already seeing a lot of attacks on users, tricking them into using their BankID, where the criminals will be able to transfer money. With AI, the attacks will be more sophisticated, and the use of deep-fakes to steal large amounts of money has already happened.

The presentation will show the danger of the AI attacks used to hack people, and how the existing technical protections (such as MFA) will not prevent these, as it is the users themselves doing the transactions. In addition, it will look at how we are currently doing fraud prevention in the financial industry, and why these mechanisms may be challenging with the wallet, due to restrictions in the eIDAS2 regulation.

John Erik Setsaas
Director of Innovation
Tietoevry Banking
With over 25 years’ experience in digital identity, John Erik Setsaas is a pioneer in this space. He is a prolific speaker at fintech industry events around the world including Money20/20...
Unlocking Next-Gen Identity Security: Innovative Strategies
12:35—12:55
 

Explore revolutionary strategies in identity security. Learn how to outsmart emerging threats and fortify digital identities with cutting-edge solutions, ensuring unparalleled protection in the dynamic cyber world.

Bjarke Alling
Principal
Epical Group
Principal Advisor with the Nordic Digital Trust consulting company Epical. Prior chair and member of the National Danish Cybersecurity Council and prior chair of the IT Security Committee at The...
Looking behind the curtain: Does your systems authenticate and authorize as you’d expect?
12:55—13:15
 

The increasing popularity of the term “Identity Security”, coupled with the explosive growth in the number of  identity security vendors, bears testament to the fact that security starts and often ends with identity. But with so many tools, so many processes moving part making up the modern identity fabric, do you really know what is really happening behind the curtain and inside all that IAM infrastructure?  Accounts are created, entitlements are assigned, users authenticate, access is authorized and data is accessed.  This process not only happens for the standard users coming in through a nicely federated, passwordless authentication solution, but also for your admins, your agents and the service accounts they leverage. The very process of IAM is happening across all of your infrastructure, from legacy applications to cloud services and beyond into IaaS and the SaaS services you subscribe to. But when something changes in that flow, the configuration for an IdP or a relying system changes, or an update is made to profile configuration, orchestration flow or group assignment - will you identify the change, understand its meaning and forecast its overall risk to your identity security posture?  Are you instrumented for the future state of IAM?

In his talk, KuppingerCole Fellow Analyst Darran Rolls, former CISO and CTO at SailPoint, will outline how Identity instrumentation and orchestration technology can help reverse-engineer the authentication and authorization flow of applications and provide key insights into configuration and usage.  He will explain how the future state of IGA, ITDR, and overall Identity Security must deliver instrumentation to allow visibility, configuration and usage information for all applications and will highlight how emerging technologies can help fill this gap.

Darran Rolls
Research and Advisory Fellow
KuppingerCole / Cloud 10
Mr. Darran Rolls is a research and advisory Fellow at KuppingerCole and an independent consulting advisor. He has a long history in Identity Management and Security at companies...
Almost Ready to Join the cyberevolution 2024?
Reach out to our team with any remaining questions
Get in touch