a good thing!
Have Fun After Hours
Join Identiverse founder & host Andre Durand for our opening keynote and then for a celebration of what is to come over the next couple of days!
Andre DurandCEO Ping Identity
Technical Challenges in Moving to a Cloud Solution
In this session we will cover the technical challenges in taking an on premises legacy applications and moving it to the cloud. At the same time moving to a modern access management solution that puts identity at the perimeter. The solution leverages Ping's PingOne Advanced Services platform to provide flexible and powerful solution.
Marcin ZimnyProofID, Previously Refinitiv
The Privacy Paradox: All I Have To Do Is Be You
What a wild year 2020 was! From work-from-home wifi router hacks to massive unemployment benefits fraud by organized crime to an explosion in successful ransomware attacks; 2020 will forever be the year that put all of our assumptions, planning and solutions to the real test. Richard Bird, in an Identiverse keynote in 2018 predicted the rise of privacy as a salable feature by Big Tech, and now those companies are openly opposing each other in the creation of competing security and privacy promises. There is a paradox that must be solved before meaningful change can be delivered for human beings in the digital world. The most common characteristic of data privacy laws around the world is the demand that companies protect data that belongs to a human being, but not actually protect that same human being. This is the privacy paradox; companies will continue to be fined and penalized for protecting data but compromising privacy, because all I need to do is be you and I get your stuff. Richard Bird will discuss pending changes in law, changes in human expectations and the rising commercialization of privacy for consumers and what it all means for privacy and the future.
Richard BirdChief Customer Information Officer, Ping Identity
How To Do the Impossible and Keep Your Customers Happy?
You want to move to an all Modern Identity Infrastructure? Do it in 9 months? For 15k Applications and millions of users? And keep in Business? Then come to find out how using Ping technology, Communication, Processes, a solution was implemented that has improved and simplified the Identity Environment while improving security, improved cost performance and customer stratification. All this was done on a tight budget and timeline. Our goal was to take a legacy access management solution that supported thousands of applications across multiple business units and migrate them all with no impact to the users. The schedule was tight and firm based on contract requirements, zero down time was required. In this session you will come to understand the approach of the team at General Electric and Ping took. The project was on time, on budget, and met the zero down time goal.
Randy HarrisGeneral Electric
Sulohita VaddadiGeneral Electric
Walter BillsbroughPrincipal PS Consultant, Ping Identity
Practical CIBA: Tales from the field
Client Initiated Backchannel Authentication (or CIBA) is a recently ratified extension to OpenID Connect that opens up a world of new authentication and transaction approval use cases, through the use of strong out of band authentication. One particular strength that sets CIBA apart from other standards-based flows is that there is no requirement for a browser user agent, as all interaction with the user takes place out of band, most commonly using push messaging to a mobile phone app. In this session, Rob will demonstrate a number of real world use cases where this technology can be used to improve consumer experience when interacting with the organizations that need to identify them, whether virtually or even physically. When combined with another standard flow - the OAuth Device Authorization Grant - CIBA offers a powerful and flexible solution to identifying customers and allowing them to authorize specific actions, even in a world where physical contact must be limited. Many of the customer organizations that Rob has dealt with over the last year have been hugely excited about the potential impact of these new standards and how they can work together to deliver next-generation customer experiences that move beyond browser-based interaction, to encompass a true multi-channel experience that includes call centres, chat bots, in store kiosks, smart devices, and more.
Rob OttoPrincipal Solutions Architect, Ping Identity
PAR, what is it good for?
PAR is what folks in the know call the "OAuth 2.0 Pushed Authorization Requests" draft. So, what is it good for? Actually, quite a bit. Hailing from the IETF's OAuth Working Group, PAR is an aspiring RFC written by an internationally diverse cohort of co-authors. It aims to bring a deceptively simple enhanced and interoperable security option to OAuth clients when initiating an authorization flow. If you can tolerate the bad puns, gratuitous workation photography, strained cultural allusions, and mixed metaphors of this short Identiverse session, you'll learn what PAR is in fact good for and why it's already an integral part of initiatives like the OpenID Foundation's 2.0 Financial-grade API Baseline Profile and Australia's Consumer Data Right Security Profile.
Brian CampbellDist Software Engineer, Ping Identity
Why your business needs an IAM Product Manager
As companies define and continuously refine their product organization, a need for a Product Manager for customer-facing products is obvious. When a business has a suite of products they sell, they know each of those products needs a vision, strategy, and roadmap. They need someone to help analyze the competition and market so that they can differentiate their product and excel. But when it comes to cross-functional platform services that are necessary but aren’t sold, like Identity and Access Management, Workflow Services, Notifications, Navigation, etc., it can be easy to think of them as less of a priority. Some companies lump them all together; some give Identity to the general Security team; some simply think, “all we need is a login page; how hard can it be?” Let us help you help convince your company that you NEED an Identity Product Manager.
Tori MeyerSr Product Mgr, Ping Identity
Jump Start your Passwordless Implementation
Passwordless authentication takes on many shapes and sizes. But one thing is clear: the technology is more readily available and accessible than ever before. But implementing passworldess solution at scale can be a daunting which is why many organizations haven't fully explored it.
Aubrey TurnerExecutive Advisor, Ping Identity
The Enterprise Guidebook for the Journey to Identity in the Cloud
Proven speed and efficiency benefits are driving IT leaders to cloud based identity solutions. For new apps and services, the decision is usually a no-brainer. But for enterprises with decades of legacy infrastructure and homegrown apps, the journey to identity in the cloud must be navigated as part of a more strategic digital transformation. This journey often starts with defining organization wide requirements for a cloud based authentication authority, and ends with consolidating legacy IAM systems. In this session you’ll hear from Ping executives and your peers whose organizations are at different stages of migrating their identity solutions to the cloud and the steps they’re taking to achieve their goals.
Delivering and Measuring the Value of Identity-Driven Customer Digital Experiences
Going above and beyond your customers' already high expectations with innovative digital experiences (DX) that can help your business increase revenue, reduce abandonment and build loyalty while giving you a competitive edge. DX innovation is driven by customer identity to personalize and secure how users engage with your brand.
Alex BabarSr Product Mgr, Ping Identity
Jordan GriffithSr Marketing Product Mgr, Ping Identity
Rock-Solid Identity Foundations for Zero Trust
Zero Trust has been the recommended security framework for many years now but the shift to remote work in 2020 has accelerate the urgency behind its adoption. However, it's a journey with many layers that cannot be solved with a single product or solution. Success depends on a combination of people, products, and processes.
Loren RussonVice President Product Management, Ping Identity
Zain MalikSr Product Marketing Mgr, Ping Identity