Create your personal agenda –check the favourite icon
What does it take to design a stadium not just for today, but for the next generation of fans, events, and technologies?
In this session, we’ll explore how a future-flexible foundation enabled one of the world’s most advanced stadiums to evolve into a digital-first, fan-focused venue. From investing in fibre-based infrastructure and carrier-grade systems, to pioneering mobile ticketing and frictionless biometric entry, we’ll cover the innovations that shaped the journey and the strategic decisions that made them possible.
Get a behind-the-scenes look at technology by the numbers (Wi-Fi, DAS, IPTV, POS, security), the power of integrated experiences like MBS Express, and how personalization and automation are set to transform the fan journey even further - from parking guidance to automated age verification at concessions.
With identity-related breaches a continuous threat, the business impact of handling identity correctly has never been more vital. Of organizations surveyed in 2024, 93% of identity stakeholders said that security outcomes could have lessened the business impact of incidents. With the increasing number of identities and attackers stepping up their game, enterprises must ensure that all identities (human and non-human) are protected. In this session, you will see the results of an exploration into the current state of cybersecurity. IDSA commissioned this study with Dimensional Research to discover approaches large companies take toward security and identity.
In today's digital landscape, government agencies, regulated industries, and enterprises face increasing challenges in securing user authentication, email signing, and document signing.
Join HID's expertsfor an insightful presentation on how our cutting-edge PKI-as-a-Service (PKIaaS) and Credential Management Solutions can transform your cybersecurity infrastructure, enabling seamless userauthentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements.
In this presentation, we will:
The digital world is built on trust, but that trust is fragmented. On one side, traditional Identity and Access Management (IAM) governs human authentication and authorization. On the other, Public Key Infrastructure (PKI) quietly underpins machine identities, secure communications, and cryptographic trust. These two forces have operated in silos for too long—but in an era of evolving cyber threats and the looming impact of quantum computing, they need each other more than ever.
This session brings IAM and PKI together, demonstrating how their integration is essential to fortifying security, automating risky manual processes, and ensuring long-term resilience. As non-human identities explode across IoT, AI, and software, and as quantum advancements threaten traditional cryptography, organizations must bridge the divide to build a unified, adaptable security foundation.
Join us to discover:
PKI and IAM must work together—and only by uniting them can we build the trusted digital future our world demands.
In a world where first impressions happen online, the login screen has become your brand’s front door and identity is the key. But too often, businesses treat Customer Identity and Access Management (CIAM) as just a backend function.
In this fast-paced session, we’ll explore how modern identity platforms can do more than just authenticate users—they can reduce friction, detect fraud before it happens, and unlock real-time insights that improve ROI, CX, and security outcomes.
You’ll learn:
If you think identity is just an IT problem, think again. This session will change how you see your sign-in flow—and show how CIAM can drive growth across your business.
As the demand for advanced AI models, particularly generative AI, surges, so does the need for substantial computational resources in data centers. These facilities, vital for hosting AI-powered systems, face mounting pressure to reduce energy consumption while maintaining high-performance outputs. This challenge is especially pronounced in the context of digital identity systems, which are increasingly relying on AI-driven technologies for enhanced security, personalization, and user experience. This presentation explores the dual challenge of power management in data centers and the sustainable deployment of generative AI within digital identity frameworks. It examines the impact of high energy consumption on AI adaptation, identifying the key drivers of inefficiency and the potential trade-offs in balancing performance with energy conservation. The presentation also proposes novel approaches to optimize power usage through touch free 3-d data center design using robotic maintenance, power savings in generative AI by quantization, green computing and power optimization offering a roadmap for achieving both energy efficiency and AI performance at scale. By addressing these issues, we aim to contribute to the creation of more sustainable digital identity systems while mitigating the environmental impact of AI deployments.
Learn how public and private sector entities, citizens and consumers can engage in digital sessions and transactions with secure identification and verification of public and private sector organizations leveraging the verifiable Legal Entity Identifier (vLEI). The session will cover important features of the vLEI and showcase applications across the globe that are being implemented leveraging this secure, scalable ecosystem and infrastructure.
This session will provide an overview of the current Mobile Driver License (mDL) landscape, including updates on active programs, the AAMVA Digital Trust Service, new state and jurisdiction participation, Relying Party engagement, and AAMVA’s broader role in identity management.
The rise of SaaS, Gen AI apps, and a distributed workforce has triggered an access governance crisis. Identity sprawl, shadow IT, and unmanaged permissions create critical security and compliance gaps. Traditional IGA solutions—built for static, directory-based environments—lack the real-time intelligence and contextual awareness needed to govern access in today’s cloud-first landscape.
Organizations need a Visibility-Intelligence-Action model that goes beyond discovering who has access to understanding how the access is being used.
Next-Gen IGA solution delivers,
This session explores how activity-driven intelligence transforms identity governance, enabling organizations to proactively manage access, strengthen security, and meet compliance requirements.
You’ve heard that identity is at the core of cybersecurity. That makes identity threat detection and response (ITDR) the foundation of a resilient business. But navigating decades of configuration creep and the complexities of hybrid Active Directory/Entra ID environments make for a daunting task. Here are 5 simple steps you can take now to improve your identity security and boost your business’ ability to survive and thrive despite a volatile threat landscape.
Digital identity is rapidly emerging as a cornerstone of modern digital public infrastructure, key to fast-tracking government digital transformation. Achieving this vision demands a robust technological foundation—one that is scalable, interoperable, and adaptable to diverse policy and operational environments. In this session, we’ll examine how digital identity orchestration is driving tangible outcomes for governments and their constituents through real-world implementations. We’ll cover the role of digital identity in eGovernment, key challenges in the digital ecosystem, and essential frameworks and building blocks for secure, scalable citizen-centric solutions.
Since 9/11, air travel has operated under a heightened mandate for security—often at the expense of passenger convenience and operational efficiency. But today, with the rise of facial biometrics, airports and border agencies are proving that it’s possible to achieve world-class security and a smooth, stress-free traveler experience—while also empowering frontline officers to focus on what matters most.
This session explores how modern biometric technologies, including privacy-first solutions from iProov, are transforming the airport journey. Attendees will learn:
There is consensus that in the not-too-distant future, quantum computers will break much of the cryptography that currently secures digital data and transactions. What is still under debate is exactly when that will happen. This presentation calls for a coordinated effort to accelerate the development and deployment of post-quantum cryptographic systems to ensure the continued security of sensitive information within identity management and trusted services. In this presentation, we will discuss the potential threats to identity management posed by quantum computing and how the industry can map the path ahead, particularly with regard to implementation of quantum-safe identity credentials and protocols.
CrowdStrike Falcon® Counter Adversary Operations, is at the front lines of disrupting the hands-on-keyboard attacks organizations face each day. Powered by AI-driven, intelligence-led threat hunting, Falcon Adversary OverWatch continuously uncovers sophisticated attacks across endpoints, identities, cloud environments, and third-party data sources, giving healthcare security teams the upper hand against even the most advanced adversaries.
The majority of advanced intrusions begin with adversaries logging in using compromised credentials, evading detection by point security solutions, escalating privilege and maintaining persistence, using tools already available in the environment. Learn how CrowdStrike hunts across the identity plane, combined additional insights from sensor telemetry and third party data sources to fulfill the mission to Stop Breaches and apply crowd sourced intelligence for proactive defense.
Privileged Accounts present the largest IAM risk in most organizations and are the ones targeted by bad actors most often. However, many organizations do not create, publish, and manage their privileged accounts in the enterprise. This 20-minute session will provide the attendee with a great overview of how to dramatically lower this risk for any size of business or enterprise.
Based upon the recently released book “Privileged Access Management: Strategies for Zero Trust in the Enterprise” and presented by one of the co-authors, Gregory Rasner.
This presentation will explore AI-driven deepfakes in fraudulent activities. We'll cover what deepfakes are, how they're used by malicious actors in scams like CFO fraud, and showcase a few typical attacks. We'll discuss methods for detecting these sophisticated fakes—both human observation and AI-powered "agent detection"—and provide actionable strategies to enhance employee resilience and protect your organization.
While reusable identity (RPs) is already reshaping how the private sector handles identity, financial institutions still face a chicken-and-egg challenge: how to modernize verification without falling out of step with regulators. This session explores how RPs—cryptographically derived, privacy-preserving credentials—can address that gap. By building on trusted standards like mobile driver’s licenses and enabling individuals to carry secure, pre-verified identity data, banks can enhance fraud detection, reduce redundancy, and improve financial access for marginalized groups. We’ll demystify common misconceptions, examine case studies from early adopters, and highlight how custodial approaches like Persona’s align with priorities from agencies like FinCEN, OCC, and FDIC—offering a path toward more secure, compliant, and inclusive identity infrastructure.
Join us as we dive into insider threats and the techniquesthat can be used to uncover what is really going on insider your enterprise.
Get a hacker's perspective on how to fight fraud and account takeovers (ATOs) in the Identity Context. Learn all the ways biometric authentication, CIAM, IDV, and other identity assertions in mobile applications can go wrong and how to solve thembeforeany damage is done.
With global air travel projected to reach 8 billion passengers annually by 2040, the need for faster, safer, and more seamless border experiences has never been greater. In this session, we will explore how facial recognition technology is revolutionizing the way we cross borders — enhancing security, streamlining immigration processes, and redefining the traveler experience. From biometric eGates to AI-powered identity verification, we’ll dive into real-world implementations, emerging innovations, and the ethical considerations that come with this digital shift. Join HID as we uncover how facial recognition is not only changing how we travel, but also reshaping the very concept of borders in an increasingly connected world.
As AI makes cybercriminals increasingly more powerful, it’s also helping organizations raise their defenses. But while AI is often in the spotlight, when it comes to stopping cybercrime, fighting fire with fire isn’t enough. AI can be a powerful tool in protecting against identity threats, but relying on it as a total replacement for human intelligence leaves organizations exposed. Through this presentation, NextgenID™ will share how AI and human agents combined are fueling the future of next-generation identity proofing.
There’s a vexing paradox in cybersecurity — spending on security measures is up, but so are breaches. The uncomfortable truth behind this puzzling contradiction? Though often in the spotlight, elevated security controls — MFA prompts, behavioral biometrics, zero-trust architectures — matter little without solid protections around how identity is established in the first place. Through this presentation, NextgenID™ will highlight this easily missed blind spot in cybersecurity and provide education on the foundational role high-assurance identity proofing and credentialing plays in thwarting today’s increasingly sophisticated cyberthreats.
Biometric technologies such as facial recognition offer transformative potential but when mishandled can lead to exclusion and privacy challenges. This presentation lays out a framework for ethical biometrics, prioritizing inclusive design, fairness, accessibility, privacy, governance, and trust, and concluding by offering actionable insights for designing and evaluating inclusive, trustworthy biometric systems.
Fraudsters now operate at machine speed. Adi Goel will strip away the buzzwords and map the real battlefield:
Attendees leave with a two-minute diagnostic they can run on their own orgs Monday morning and a playbook for aligning fraud, risk, and product teams around real-time signals designed to catch the most sophisticated synthetic IDs.
Financial institutions are facing increasing pressure to provide seamless digital experiences while adhering to strict regulatory compliance. This session examines how reusable business identity can support both objectives by facilitating efficient and secure interactions across markets and platforms, helping organizations streamline compliance, expedite onboarding, and reduce fraud across jurisdictions.
Step into the future of payments, where biometrics are redefining the transaction landscape. This session uncovers the pivotal role of biometric technology in enhancing payment security while delivering an unparalleled consumer experience. Discover the core of identity validation and learn how seamless authentication processes are effectively combating fraud. Engage with J.P. Morgan’s Prashant Sharma as he showcases cutting-edge innovations in identity verification, transforming checkout experiences into secure, effortless interactions. Join us to explore how identity-driven payments are setting new standards for security and convenience in the digital age.
You’ve heard of CIAM. You’ve implemented WIAM. But are you ready for the next evolution in identity? MeetAIAM—Agentic Identity and Access Management—where identities aren’t just managed, they think, act, and adapt.
As AI systems evolve from passive tools to autonomous agents, a new security paradigm is emerging. Many GenAI systems claim autonomy, but true Agentic AI exhibits goal-directed behavior, memory, planning, and the ability to act independently across systems. This session begins by clarifying what Agentic AI really is—and why that distinction matters.
We’ll then explore how IAM must evolve to support Agentic AI. Attendees will learn how emerging protocols likeOAuth 2.1,MCP (Model Context Protocol), andACP (Agent Communication Protocol)are enabling:
Create your personal agenda –check the favourite icon
National security has taken center stage across the world; now is the opportunity for biometrics to make the case for efficiency, accuracy, safety, and speed. Iris ID has 25-year history of developing and researching cutting edge technologies and solutions using iris recognition. This presentation explores how iris biometrics can deliver reliable identity verification and authentication—enhancing border control efficiency while upholding the highest security standards. I’ll delve into how this non-invasive, high-precision technology works, its advantages over other biometric methods, and showcase real-world deployment case studies.
Two-Factor Authentication (2FA) has been essential but often causes friction, impacts user experience, and is vulnerable to social engineering attacks. CAMARA Network Powered Digital Solutions, developed by GSMA and the Linux Foundation, offers a seamless alternative with Number Verification and Silent Authentication. This technology enables secure, frictionless authentication directly through mobile network operators, eliminating the need for OTPs and reducing vulnerabilities.
This session highlights how Silent Authentication is transforming digital authentication, prioritizing both security and user experience.
Learn how commercial and government entities are verifying driver's license and identification card information against department of motor vehicle data. AAMVA’s Driver License Data Verification (DLDV) service is a tool being used to combat synthetic identity fraud through real-time data verification.
Modern identity systems authenticate users with advanced identity, encryption, and communication technologies. Despite these advancements, how do digital identity solutions affect their users’ personal privacy?
Traditional IAM protects users within closed ecosystems. Federated architectures extend centralized identity to external relying parties, but often with a ‘phone home’ verification mechanism that can be used to track users. Decentralized Identity helps platform providers overcome these problems through peer-to-peer identifiers and verification methods that don’t require issuer participation whenever users present their digital identities.
This presentation will:
When we engage with customers at FusionAuth, one question we consistently are asked is: "How should we model our users in our CIAM system?"
This architectural decision shapes everything from user experience to system security.
In this talk, I’ll explore three CIAM user modeling approaches:
We'll dissect the advantages and limitations of each approach, provide a decision framework to select the right model for your requirements, and reveal practical techniques for guiding users to the correct authentication pathway before they ever log in.
At the end of this talk, you’ll know how to pick the right user modeling approach for your authentication needs.
During the 2025 legislative session, Utah passed landmark legislation—S.B. 260—establishing the State Endorsed Digital Identity (SEDI) framework. Since then, SEDI has fueled ongoing discussions about Verifiable Digital Credentials and their role in government services, with a strong emphasis on protecting individual privacy. Learn how SEDI is intended to function, and why the Utah Legislature has made it clear that, despite the presence of various digital credentials in the state, none currently meet the achieveable standards set by SEDI.
This session will begin by examining several significant cyberattacks—some of which have received media attention—highlighting the impact and damage caused when attackers successfully bypass Multi-Factor Authentication (MFA).
Next,we will review ten common methods used by threat actors to bypass or compromise MFA mechanisms, discussing common objections to implementing MFA and exploring the reasons behind such resistance and strategies for effectively addressing these concerns.
The session will then explore various bypass techniques and how understanding them can help strengthen and enhance an organization’s overall MFA posture.
Finally, the session will outline actionable next steps and recommended practices for improving MFA implementation and security moving forward.
As healthcare and financial services organizations accelerate digital transformation, the demands of faster onboarding, stronger fraud prevention, and evolving compliance have never been greater. Join Vouched for our talk, showcasing how identity verification can be a competitive advantage—not just a regulatory checkbox.
Learn how Vouched’s Three Pillars of IDV address the full spectrum of identity challenges facing banks today:
We'll demonstrate how Vouched enables financial institutions to:
Whether you're in compliance, operations, IT, or innovation, this webinar will show how modern IDV can help you scale securely, meet regulatory obligations, and deliver exceptional onboarding experiences.