a good thing!
Experience a Better Experience
Come visit all of our experiences during Identiverse in Las Vegas. We’ll be hosting exciting keynotes, sessions, private meetings with our executives, and after-hours fun you won't want to miss! Explore this page to start planning your time with Ping Identity at Identiverse 2023!
Members of our executive team, product officers, and solutions architecture team will be on hand during the event for one-on-one meetings to help you find individual answers to your unique IAM strategy needs. Request a meeting to tell us about the problem you’re trying to solve and we’ll match you with an expert who can help. We look forward to meeting you there!
Summer may have just started but local charities are gearing up to support families in need by providing them with classroom materials. Ping Identity is partnering with A Precious Child to provide 3rd-5th grade students school supplies and you can help! Please stop by the Ping Identity Booth (Booth 1303) to build a bag for kids in need. You won't want to miss the opportunity to give back this conference!
Tuesday, May 30 | 4:00 pm PDT
Andre Durand, Founder & CEO, Ping Identity
Congratulations, we’ve arrived. Identity is not simply the center of security, it is now the frontline of cyber warfare. Now what?
May 30, 4:00 - 4:30 pm
Speaker: Andre Durand | CEO & Founder, Ping Identity
Congratulations, we’ve arrived. Identity is not simply the center of security, it is now the frontline of cyber warfare. Now what?
May 31, 10:30 - 11:00 am
Speakers:
Patrick Abreo | PayPal, Inc.
Ayelet Avni | Ping Identity
Preventing MFA fatigue while protecting against Account Takeover and New Account fraud is a delicate balance that requires real-time monitoring and risk assessment before, during, and after login. Take action to dismantle MFA prompt bombing. Learn how PayPal drastically reduced their MFA prompts while simultaneously reducing their exposure to identity fraud.
May 31, 12:15 - 12:40 pm
Speaker: Brian Campbell | Ping Identity
The true story of the prospective IETF RFC "Selective Disclosure for JWTs (SD-JWT)" will be presented by the late-breaking co-author of the draft. We'll discuss what SD-JWT is and the technical details of how it works. We'll look at the origin story of the work and contemplate the broader implications it might have going forward.
May 31, 2:00 - 2:50 pm
Speakers:
Yariv Levavi | Ping Identity
Oren Sternheim | Ping Identity
In this session, we will explore the benefits and challenges of Passwordless authentication and discuss how it can enhance security and user experience. We will examine different approaches to Passwordless authentication, using PingOne DaVinci and PingOne MFA/PingID, and discuss how they can be implemented in different contexts. Through case studies and best practices, we will share insights on how organizations can successfully implement Passwordless authentication to improve security and streamline access for their users.
May 31, 3:00 - 3:50 pm
Speakers:
Nathan Langton | Ping Identity
John DaSilva | Ping Identity
Orchestration allows you to stitch together various services to provide a seamless user experience. These experiences require a consistent look and feel, with interfaces that use localized language and your company’s branding. In this session, we’ll demonstrate how you can use our drag-and-drop form builder and flow designer to build the perfect experience for your unique customers without writing any HTML code.
May 31, 6:45 - 7:00 pm
Speakers:
Sean O'Dell | Disney
Alex Wong | Ping Identity
Most organizations today utilize single sign-on for good reason: it consolidates authentication policies to reduce an attack surface. But user journeys don’t end at the front door: to gain the level of control modern organizations need, you need authorization to manage risk throughout a user session. A centralized policy engine utilizes existing identity attributes and threat telemetry to give your security teams the level of fine-grained control of organizational data to meet today’s threat landscape. Through practical examples, we’ll show why centralizing authorization policy augments your existing identity architecture to prevent lateral attacks and best protect organizational resources.
June 1, 10:30 - 11:20 am
Speakers:
Diana Jouard | Ping Identity
Gaurav Khot | Ping Identity
Learn how Decentralized Identity and Verifiable Credentials empower users with the sovereignty of their personal data. This session will cover the W3C Verifiable Credentials (VC) data model, Decentralized Identifiers (DID documents), and interoperability of credentials using industry-standard protocols like OpenID4VP and SIOPv2.
June 1, 3:00-3:25 pm
Speaker: Diana Jouard | Ping Identity
Today’s identity systems are a centralized collection of user data that require businesses to integrate, secure and maintain them. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials. In no small part due to the pandemic, we’ve seen an explosion in the number of applications that have led to many siloed identity systems, creating disjointed experiences for users.
Decentralized identity represents a massive paradigm shift that will reduce the need for organizations to collect personally identifiable information, protect the privacy of users’ data, and let them control how their identity-related information is collected and stored. We’ll deep dive into three use cases and provide a roadmap on how you can take this concept and make it a reality.
June 1, 4:30 - 5:00 pm
Speakers:
Jay Romero | Erickson Senior Living
Sam Brown | Ping Identity
On the passwordless journey, you must navigate many roadblocks. You need a solution to migrate users into new journey flows without disruption and to innovate within existing user journeys. Learn how Erickson Senior Living implemented a new self-service sign-up model for their residents via the MyErickson app and how their passwordless login experience is taking shape.
June 2, 9:40-10:05 am
Speakers:
Vikas Mundada | Ping Identity
Lynette Hushen | Ping Identity
Identity and Access Management (IAM) is a critical aspect of any organization’s security posture, and it can contribute significant value to an enterprise. Today’s complex environment challenges business decision-makers to effectively navigate the ‘urgency, return and priority matrix’ in order to best protect, strengthen and grow their business. This session will provide concrete strategies for maximizing the value of IAM - concentrating on how implementing effective IAM practices can help organizations increase revenue, reduce risk, realize cost savings and improve productivity; all of which can have a significantly positive impact on business outcomes. This data-driven story is based on the voice of the customer and references real-world challenges and use cases to demonstrate how Identity and Access Management can facilitate the success and return aligned with a company’s core business priorities. It examines the IAM role in the customer experience - including benefits and opportunities, as well as risks, challenges and mitigation strategies.
Try Ping for Free!
There’s no better way to start your experience with Ping Identity than getting a free trial to try our solution for yourself. Let's get you started below and come by the booth where we can continue the conversation!
*Identiverse badge needed for entry