Create your personal agenda –check the favourite icon
Keynote hosted by our title sponsor, NEC
Networking Break and Exhibition Viewing
In the US and around the world tens of countries have launched or will soon launch digital identity infrastructure, and it is not (yet) interoperable by default. In this session we’ll recap the approach a global community of governments, standards bodies, academics and other stakeholders are taking to identify “champion” use cases, map policy frameworks across jurisdictions, close governance gaps to solve for cross border interoperability of digital identity. We will share the latest headlines from the SIDI Hub events this year, including SIDI Hub Washington DC on September 10th. We’ll also ask the audience for your views, before we segue into an interoperability panel discussion for a deeper look at the challenges.
Edge Computing and Generative AI have a symbiotic relationship as they enable each other by providing more practical and cost-effective solutions. On the other hand, technologies enabled by Generative AI such as “Deep Fake”, Retrieval Augmented Generation (RAG), Large Language Model (LLM) create additional challenges in the edge computing domain for authentication, identification, and security of IOT devices that form the basic framework for the edge computing. In this presentation, we will provide some very practical and innovative solutions that can help build secure edge computing frameworks by authenticating and identifying IOT devices as they are plugged into the framework. We also look at future security challenges posed by the advent of quantum computing and digital twins.
Join us for a deep dive into the evolving landscape of Identity and Access Management (IAM) with leading experts from diverse industries. This panel will explore pressing challenges and emerging opportunities in IAM, focusing on aligning market solutions with organizational needs, integrating advanced technologies like SPIFFE, UEBA, ITDR, XDR, and AI, and enhancing security with passwordless authentication beyond mobile devices.
We’ll also discuss key strategies for modern lifecycle management, the role of mobile identity in boosting security and user experience, and the potential of digital identity in future technological landscapes. Panelists will share insights on bridging gaps between market offerings and enterprise demands, and envision the far-reaching future of IAM in an advanced, interconnected world.
This session promises a comprehensive look at the current state and future trajectory of IAM, offering actionable insights for professionals navigating this complex field.
11:35: Intro from judge
11:40 - Chrome Roads
11:45 - DynamicElement AG
11:50 - Indicio
11:55 - Photko
12:00 – Northstar Identity
12:05 – Andromeda Security
12:10 – Corsound AI
12:15 - Hopae
12:20 – Hacker Simulations
Cybercrime thrives on anonymity, with criminals exploiting systems that rely on IDs, passwords, PIN codes, and even biometric scans. These traditional methods verify credentials but fail to identify the individual behind them because they lack the mechanisms to identify the individual accessing the system, thus leaving transactions vulnerable to anonymous operators.
This anonymity is the root cause of the escalating online identity fraud epidemic, which has already caused losses totaling many trillions and growing. Even the most sophisticated organizations are not immune to these attacks.
To date, 100% of all cyber transactions have been conducted by anonymous operators who cannot be secured, identified, traced, or held accountable.
Identifying people, the key to stop online ID fraud and cybercrime. B-FY offers a revolutionary solution to this problem by shifting the focus from verifying credentials to identifying the actual person behind the transaction. The company's innovative biometric authentication protocol effectively stops online ID fraud by ensuring that only the true identity owner can gain access.
This is an interactive seminar session and Women in Identity and their research partner, the London School of Economics (LSE) are seeking industry engagement to help the industry.
Women in Identity recognise there is a need to better understand the business and economic costs of identity exclusion. For organisations to ensure their products and processes are inclusive they need detailed evidence about the costs they are incurring from identity exclusion. The results of the research will help organisations create a business case for ID Inclusion, which in turn will help over 1 Billion people internationally who are ID excluded.
Networking Break and Exhibition Viewing
When you receive a call from your bank, hospital, or favorite business, do you believe it’s them on the other end of the line? What measures does your brand have in place to ensure your identity is being communicated with trust and not tampered with from the time it leaves your hands?
New research supports the widespread nature of this issue, with 74% of consumers believing they have received calls from an entity fraudulently posing as someone else. With bad actors exploiting every vulnerability in our rapidly expanding communications ecosystem, innovations in identity management hold the key to creating secure end-to-end identity delivery impermeable to unauthorized users seeking to impersonate your brand and defraud your consumers.
Attend this seminar to learn how Numeracle can protect your business from impersonation scams through BCID™, the only industry-led, Branded Calling ID, standards-based Rich Call Data (RCD) ecosystem engineered to be secure-by-design to deliver trusted, branded calls nationwide for enterprise businesses
As a new Presidential election looms, what will the differing regulatory and legislative landscape look like in a Harris — or a Trump —administration? Join our panel of pros from the ranks of government relations, tech journalism and Members of the International Biometrics + Identity Association (IBIA) as they examine critical technological advancements shaping the identity sector over the next few years — and how lawmakers will impact them. This forward-looking analysis explores the evolving intersection between two different government and regulatory frameworks and how each would affect issues such as biometric innovation, data privacy, and cross-border identity frameworks. This discussion will offer keen insights into the challenges and opportunities facing stakeholders over the next few years.
Building a robust Segregation of Duties (SoD) principle reduces the risk of error and fraud. Establishing and managing SoD as a critical control strengthens the Identity, Credential and Access Management (ICAM) foundation of an organization. The ICAM and Segregation of Duties – an Interwoven Journey discusses the need, challenges, and opportunities of knitting SoD principles within the ICAM framework.
The adoption of mobile driver's licenses (mDLs) is on the cusp of a significant breakthrough, driven by a convergence of key developments in the U.S. and globally. Across the United States, an increasing number of states are implementing mDLs, providing residents with a modern, secure alternative to physical driver's licenses. This trend is further bolstered by the pending TSA rule that will permit mDLs to be used as Real ID-compliant credentials at TSA checkpoints, a move that is expected to greatly enhance public trust and accelerate mDL adoption.
Internationally, similar momentum is building. The European Union is advancing its digital ID pilots, integrating mDL standards as part of a broader strategy to streamline and secure digital identity across member states. In Australia, all states have committed to adopting the mDL standard, with some already in the implementation phase, reflecting a strong national push towards digital identity modernization.
A key component of this ecosystem is the collaboration between AAMVA and Austroads, who are implementing digital trust services to ensure mDLs are secure, trustworthy, and interoperable. Their agreement to share public keys across jurisdictions is a significant step towards global interoperability, ensuring that mDLs are recognized and trusted worldwide.
Additionally, platform providers are integrating mDLs into digital wallets, enhancing their accessibility and security. The anticipated publication of the standard for over-the-internet use of mDLs (ISO/IEC 18013-7) will further expand their usability and reliability.
Collectively, these developments indicate a new era in digital identity, with mDLs poised to become a cornerstone of secure, privacy-respecting identification.
Privileged Access Management is a critical tool in the financial services industry toolbox for controlling network access to valuable resources. Whether it is monetary assets or sensitive internal, partner, or customer information and data, financial services organizations carry an unusually heavy regulatory, ethical, and business burden to protect and secure their digital ecosystems. Join us for a discussion with three seasoned solution and technical experts who spend their days identifying, anticipating, and countering internal and external threats within their Privileged Access Management systems and their nights obsessing about what they might have missed.
This seminar will introduce the NIST Iris Camera Selection Guidance publication. Viewpoints regarding the use of Facial recognition for Law Enforcement.
Identity fraud is on the rise and technology advances such as deepfakes make it easier for fraudsters to identity proof and authenticate as someone else. Mobile platforms offer a variety of capabilities and onboard sensors that can strengthen digital authentication processes for the legitimate user. This session will focus on the various ways mobile devices can support and enable strong authentication for the end user.
Networking Break and Exhibition Viewing
The identity document verification technology landscape looks dramatically different than it did just a few years ago. One thing that hasn’t changed? Bad actors continue to exploit vulnerabilities in government IDs and lackluster biometric verification systems. And now with the advances of Generative AI, dangerous fraud tools are more accessible than ever.
Key takeaways:
● Understand how generative AI is supercharging identity fraud tactics, including deep fakes
● Learn about the latest vulnerabilities in biometric and document verification systems
● See a live demo of Socure’s DocV with deepfake detector to learn how to future-proof your identity verification processes
How Login.gov is working with agency partners to designa single-sign-on solution that spans Government boundaries
Even when experts get together to discuss digital identity, the first thing that has to happen is establishing a common vocabulary. Every significant work on digital identity has its own lexicon - and no two are exactly alike.
Digital identity was not created out of whole cloth with the invention of the Internet. It is simply a new type of 'informational identity' – a tool that has been with us as long as language.
Understanding digital identity in the broader context of informational identity will provide the conceptual framework you need to help you make sense of all facets of Consumer Identity and Access Management (CIAM) from assurance to authorization.
Navigating the Future of CIAM: Balancing Security, User Experience, and Innovation
As digital interactions become increasingly personalized and secure, Customer Identity and Access Management (CIAM) strategies are at the forefront of delivering seamless and secure user experiences. This panel will bring together industry leaders to discuss the evolving landscape of CIAM and how organizations are adapting to meet rising user expectations. The conversation will explore how privacy regulations like GDPR and CCPA are shaping CIAM implementations, emphasizing the delicate balance between security and convenience.
Panelists will delve into the integration of Zero Trust principles within CIAM, highlighting the challenges and benefits of enhancing security while maintaining a frictionless user experience. The role of AI and machine learning in detecting fraud, improving user interactions, and driving automation within CIAM frameworks will also be examined.
With the rapid expansion of digital services and global user bases, the discussion will cover strategies for ensuring that CIAM systems are scalable and flexible enough to adapt to future needs. The panel will also address the unique challenges of managing both B2B and B2C customers and how identity proofing and verification are evolving in regulated industries. Attendees will gain valuable insights into how CIAM is enabling digital transformation and the future of authentication methods.
Beyond formal meetings, connect informally overnetworkingdrinksat the end of day 1. Kick back and network with exhibitors, speakers and fellow visitors over your favourite tipple.
Create your personal agenda –check the favourite icon
Beyond Authentication: The Next Era of Digital Identity in Finance
In an increasingly digital world, organizations face evolving threats to security and fraud management. This panel gathers industry experts to discuss the latest challenges, including shifts in the technical landscape, such as cloud migration, IoT, and edge computing. Panelists will explore the delicate balance between user convenience and robust security measures, emphasizing the role of user education in preventing fraud.
The discussion will also address varying definitions of digital identity, highlighting the governance and collaboration required among stakeholders in large institutions. The panel will examine the critical importance of cross-sector collaboration in combating digital fraud, especially in light of regulations like GDPR, and how these impact U.S. strategies. Additionally, experts will delve into the role of artificial intelligence and machine learning in detecting fraud, along with potential limitations and risks.
Looking ahead, panelists will share insights into the opportunities within digital identity management over the next three years, discussing innovative solutions like behavioral biometrics and verifiable credentials. Attendees will leave with actionable advice tailored for small and medium-sized banks to enhance their digital security frameworks despite resource constraints.
Digital non-human actors represent abstract concepts, often without physical representation. This talk delves into the solution adopted at LI to secure the bottom turtle/root of trust as it pertains to non-human Identities.
A Discussion on Privacy and AI
Do you really know if you're getting the best identity verification performance for the cost? It’s standard practice to access a variety of data sources – such as voter rolls, government registries and consumer files – to verify identities online. But how do you know your verification partner is accessing the right sources for different circumstances? Do you even know what sources are in play, or is it just a black box?
Join Trulioo for a case study highlighting how data science fuels intelligent source routing during identity verification to optimize onboarding costs. We’ll share real-life success stories that demonstrate how intelligent routing has helped organizations significantly improve their verification outcomes. We’ll explore:
- Strategies for improving identity verification performance while managing costs- Real-world examples showcasing intelligent routing’s benefits and ROI- How advanced data science can redefine industry standards in identity verification
In an increasingly digital world, securing and verifying identity has never been more critical. This panel will delve into the evolving landscape of identity verification (IDV) and authentication, examining their importance in both government and industry settings. Our panelists, representing diverse sectors, will explore how these processes have become integral to ensuring security, privacy, and user trust.
The discussion will cover the latest innovations, including the rise of passkeys and the growing role of digital wallets, while addressing the challenges of consumer adoption and ecosystem maturity. With mobile driver's licenses (mDLs) and digital wallets gaining traction, the panel will debate their future impact on identity management and the hurdles that remain.
As digital identity continues to evolve, this session will provide valuable insights into the state of IDV and authentication today and what lies ahead. Attendees will leave with a deeper understanding of the technological advancements, regulatory considerations, and strategic decisions shaping the future of digital identity.
Security and financial implications of easily counterfeited credentials
Followed by a Q and A
Session Detail: Join Heidi Hunter from Aware to understand the important role that biometric verification plays in building digital identity and re-verifying digital identities. In this session, we will discuss how biometrics verify identities at the point of onboarding, prevent fraud, and streamline a continuous authentication process. Learn more about the power of using biometrics to complete the triangulation between data and device; and how digital identity without biometrics is vulnerable to SIF, ATO, First-Party Fraud, and Third-Party Fraud.
Launching identity wallets that are secure and trusted by Government, businesses and individuals brings certain challenges. This session will explore some of the challenges that have emerged to enable high security use cases and also how secure element technology has evolved to provide new options for the deployment of digital identity wallets.
Take a look back at our journey of building a successful digital ID age verification system, which has now processed nearly 3 million checks. From our modest beginnings to the lessons learned along the way, we'll share the steps we took to create an effective solution that balances child protection, privacy concerns, and legislative challenges. Join us for a live demo and gain valuable insights into the development and implementation of robust age verification methods in the digital world.
Find your place in the evolving digital identity ecosystem.
The Biometric Digital Identity Prism is a new paradigm for understanding the emerging digital identity ecosystem. This innovative market framework helps influencers and decision-makers understand, evaluate, and implement digital identity technologies and solutions. The Prism is the only market model that is truly biometric-centric based on the foundational conviction that in the age of digital transformation, the only true, reliable link between humans and their digital data is biometrics.
Join this session to explore
The Biometric Digital Identity Prism market landscape reference model.
Evolutionary trends driving the biometric digital identity market.
Strategic insight for vendors, influencers, and decision-makers seeking to capitalize on opportunities in the biometric identity arena.
Market forecasts and Vendor Use Cases to help plan a digital identity roadmap for your organization.
Vendor evaluations, profiles, and use cases.
More at The Prism Project (www.the-prism-project.com)
As AI technologies advance, they're transforming how we operate, offering new insights, streamlining workflows, and reshaping mission outcomes. This session will dive into real-world lessons learned from AI integration in the field and explore its potential to redefine the limits of what's possible across sectors. We'll discuss how these advancements are reducing cognitive load, accelerating decision-making, and enabling scalable operations through effective human/machine teaming—driving us toward the border of the future.
This panel will examine the expanding role of DNA in biometrics, focusing on key technologies like CODIS and Rapid DNA. CODIS (Combined DNA Index System) is the FBI's national DNA database, essential for linking crime scene evidence to individuals. Rapid DNA technology allows for the quick analysis of DNA samples, providing results in under two hours, revolutionizing law enforcement, disaster response, and border security.
The discussion will also cover how the federal government manages DNA information-sharing through the DNA federal enterprise, ensuring seamless collaboration between federal, state, and local authorities. This coordinated approach is vital for effective identification and tracking across jurisdictions.
As DNA technologies advance, new challenges are emerging, such as privacy concerns, the need for standardized procedures, and managing large DNA databases. The panel will explore ongoing efforts to address these challenges, including improving data security, developing uniform standards, and enhancing inter-agency communication to maintain DNA's effectiveness in biometric identification.
The Passport to Adoption: How Travel Use Cases Will Drive Adoption and Acceptance of Mobile Driver’s Licenses and Digital IDs:
15:50 – Intro
15:55 - NHIMG
16:00– Synolo Biometrics
16:05 - Anonybit
16:10- Iden2
16:15– Rainbow Secure
16:20 – HMID Tags
16:25 – Whiteswan Security
16:30– SecQR Solutions
16:35 - V5ID