Seminar Sessions

Join us at one of our, free-to-attend, on floor seminar theatres to hear the latest industry

insights and get answers to some of the biggest questions facing the identity industry right now.

 

SEMINAR THEATRE AGENDA

 

Washington DC, 10 - 11 September 2025

Schedule

Create your personal agenda –check the favourite icon

Sep 109:00
Conference pass
Sep 109:05
Conference pass

Keynote: Palm springs international airport's journey towards frictionless travel

Keynotes
Harry Barrett Jr, Executive Director, Palm Springs International Airport
Sep 109:25
Conference pass

Keynote: Identity innovations in sports entertainment

Keynotes
Sep 109:45
Conference pass

Keynote: Assessing modern cybersecurity risks concerning identity

Keynotes
Sep 1010:05
Conference pass

Keynote: Without biometric binding, we can’t know who UR

Keynotes
Sep 1010:20
Conference pass

2025 trends in identity security

Seminar Theatre A

With identity-related breaches a continuous threat, the business impact of handling identity correctly has never been more vital. Of organizations surveyed in 2024, 93% of identity stakeholders said that security outcomes could have lessened the business impact of incidents. With the increasing number of identities and attackers stepping up their game, enterprises must ensure that all identities (human and non-human) are protected. In this session, you will see the results of an exploration into the current state of cybersecurity. IDSA commissioned this study with Dimensional Research to discover approaches large companies take toward security and identity.

Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1010:40
Conference pass

Enhancing security with future-ready PKI-as-a-service and seamless credential management solutions

Seminar Theatre B

In today's digital landscape, government agencies, regulated industries, and enterprises face increasing challenges in securing user authentication, email signing, and document signing.

Join HID's expertsfor an insightful presentation on how our cutting-edge PKI-as-a-Service (PKIaaS) and Credential Management Solutions can transform your cybersecurity infrastructure, enabling seamless userauthentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements.

In this presentation, we will:

  • Explore the human aspects of managing digital identity and certificate lifecycles
  • Demonstrate how PKIaaS simplifies the implementation of trusted PKI within your organization and examine certificates for various assurance levels
  • Explain how to achieve regulatory requirements and become compliant with security mandates through Credential Management
Sep 1010:50
Conference pass

Security matchmaker: How PKI-based credentials and IAM can save the digital world

Seminar Theatre A

The digital world is built on trust, but that trust is fragmented. On one side, traditional Identity and Access Management (IAM) governs human authentication and authorization. On the other, Public Key Infrastructure (PKI) quietly underpins machine identities, secure communications, and cryptographic trust. These two forces have operated in silos for too long—but in an era of evolving cyber threats and the looming impact of quantum computing, they need each other more than ever.

This session brings IAM and PKI together, demonstrating how their integration is essential to fortifying security, automating risky manual processes, and ensuring long-term resilience. As non-human identities explode across IoT, AI, and software, and as quantum advancements threaten traditional cryptography, organizations must bridge the divide to build a unified, adaptable security foundation.

Join us to discover:

  • How the acceleration of quantum threats and shrinking certificate lifespans demand a shift toward crypto agility.
  • How PKI-based credentials serve as a critical yet underutilized component of IAM strategies, enabling identity verification, multi-factor and passwordless authentication, and even decentralized identity.
  • Why the future of digital trust is so dependent on unifying PKI and IAM, and how doing so can streamline security operations, reduce risk, and eliminate trust gaps that leave enterprises vulnerable.

PKI and IAM must work together—and only by uniting them can we build the trusted digital future our world demands.

Sep 1011:00
Conference pass

Bank of America's digital ID journey

Digital ID in Financial Services
Maharaj Mukherjee, Senior Vice President and Senior Architect Lead at Bank of America, Bank of America Securities
Sep 1011:00
Conference pass

Beyond the login: Why identity is the new front door to your business

Seminar Theatre B

In a world where first impressions happen online, the login screen has become your brand’s front door and identity is the key. But too often, businesses treat Customer Identity and Access Management (CIAM) as just a backend function.

In this fast-paced session, we’ll explore how modern identity platforms can do more than just authenticate users—they can reduce friction, detect fraud before it happens, and unlock real-time insights that improve ROI, CX, and security outcomes.

You’ll learn:

  • Why a better sign-in experience increases conversion and loyalty
  • How built-in fraud signals at registration and sign-in can protect your bottom line
  • What your login data is telling you (and how to act on it)

If you think identity is just an IT problem, think again. This session will change how you see your sign-in flow—and show how CIAM can drive growth across your business.

Sep 1011:00
Conference pass

Implications of the LEI in transaction monitoring

Access Management and Authentication
Sep 1011:00
Conference pass

The state of mobile driver licenses (mDLs) - Looking at the present and the road ahead

Digital ID in Government

This session will provide an overview of the current Mobile Driver License (mDL) landscape, including updates on active programs, the AAMVA Digital Trust Service, new state and jurisdiction participation, Relying Party engagement, and AAMVA’s broader role in identity management.

Sep 1011:10
Conference pass

Why activity-driven intelligence is the game-changer in next-gen identity governance

Seminar Theatre A

Identity and access management is central to every Identity Week attendee’s role. This session offers a practical, forward-looking approach to modernizing IGA using Activity Driven Intelligence—real-time user behavior and access activity—beyond static data. It aligns with Identity Week’s focus on automation, integration, and continuous security, sharing real customer insights over theory.

Sep 1011:20
Conference pass

How is digital ID management evolving in the financial sector

Digital ID in Financial Services
  • Explore the role of digital identity in streamlining customer onboarding and verification processes.
  • Address challenges related to fraud prevention, compliance, and regulatory frameworks in financial services.
  • Discuss innovative applications of digital ID in payments, lending, and financial inclusion.
  • Examine the future of digital identity in the financial sector, including the impact of emerging technologies like AI and blockchain.
Moderator: Brian Russell, Chief Executive Officer, DaVinci Partners Consulting
Maharaj Mukherjee, Senior Vice President and Senior Architect Lead at Bank of America, Bank of America Securities
Reuben Stewart, Director, Digital Identity, PNC Bank
Linden Dawson, Customer Digital Identity Lead, Digital Platforms, National Australia Bank
Sep 1011:20
Conference pass

Identity security: 3 steps to improve business resilience

Seminar Theatre B

You’ve heard that identity is at the core of cybersecurity. That makes identity threat detection and response (ITDR) the foundation of a resilient business. But navigating decades of configuration creep and the complexities of hybrid Active Directory/Entra ID environments make for a daunting task. Here are 5 simple steps you can take now to improve your identity security and boost your business’ ability to survive and thrive despite a volatile threat landscape.

Sep 1011:20
Conference pass

Looking to the future: How is access management evolving?

Access Management and Authentication
  • Explore modern strategies and tools for securing identity and access management across enterprise systems.
  • Address the challenges of scalability, user experience, and compliance in IAM solutions.
  • Discuss innovative approaches to managing risks associated with privileged access and insider threats.
  • Highlight case studies from financial and tech sectors on implementing IAM best practices.
  • Examine the evolving role of IAM in enabling secure digital transformation and innovation.
Ernest Eustace, Associate Director Cyber Enterprise Architecture, Greater Toronto Airports Authority
Stephen Congdon, Business Counsel, Enterprise Innovation, Capital One
Sep 1011:20
Conference pass

Reviewing the rise in biometric adoption across sectors

Biometric Innovations
  • Showcase the latest innovations in biometric technologies – real world applications of technologies.
  • Unveil breakthroughs and their potentials across various domains.
  • Highlight the rapid evolution of biometric modalities beyond traditional fingerprint and facial recognition.
  • Analyze the unique advantages of each of these types of biometric technologies e.g. Increased accuracy, fraud prevention, authentication in challenging.
Moderator: Paul Hunter, Chief Executive Officer, Craefte LLC
Michael Ricupero, Commanding Officer Real Time Crime Center, New York Police Department (NYPD)
Abbie Barbir, Senior Security Advisor, Co-Founder of ADIA, Aetna; a CVS Pharmacy Health Company
Session led by: ROC
Sep 1011:20
Conference pass

State by state: reviewing challenges and success stories of DMV adoption of mDLs

Digital ID in Government
  • Explore the benefits of mobile drivers licenses (mDLs) in enhancing convenience and security for Americans.
  • Address privacy concerns and interoperability challenges across state DMV systems in the United States.
  • Discuss the role of mDLs in U.S. digital identity ecosystems and their integration with federal and state-level credentials.
  • Highlight real-world examples of mDL adoption, such as pilot programs in Arizona, Colorado, and Maryland.
  • Examine the future of mobile drivers licenses in America, including advancements in technology, federal standards, and state-level policy frameworks.
Sep 1011:30
Conference pass

Mastering EMRTDs: Ensuring data integrity and authenticity in travel documents

Seminar Theatre A
Sep 1011:40
Conference pass

Document truth: ML-driven solutions overcome existing verification barriers

Seminar Theatre B
Sep 1011:50
Conference pass

Digital identity: Powering the next wave of government digital transformation

Seminar Theatre A

Digital identity is rapidly emerging as a cornerstone of modern digital public infrastructure, key to fast-tracking government digital transformation. Achieving this vision demands a robust technological foundation—one that is scalable, interoperable, and adaptable to diverse policy and operational environments. In this session, we’ll examine how digital identity orchestration is driving tangible outcomes for governments and their constituents through real-world implementations. We’ll cover the role of digital identity in eGovernment, key challenges in the digital ecosystem, and essential frameworks and building blocks for secure, scalable citizen-centric solutions.

Sep 1011:50
Conference pass

From friction to flow: How biometrics are reimagining airport security, passenger experience, and officer efficiency

Biometric Innovations

Since 9/11, air travel has operated under a heightened mandate for security—often at the expense of passenger convenience and operational efficiency. But today, with the rise of facial biometrics, airports and border agencies are proving that it’s possible to achieve world-class security and a smooth, stress-free traveler experience—while also empowering frontline officers to focus on what matters most.

This session explores how modern biometric technologies, including privacy-first solutions from iProov, are transforming the airport journey. Attendees will learn:

  • How facial biometrics deliver fast, secure identity verification at every checkpoint
  • The role of liveness detection in stopping fraud and deepfakes before they reach the border
  • Ways biometrics reduce manual checks, streamline workflows, and enhance officer efficiency
  • Real-world success stories from airports and border agencies
  • How to balance strong security with privacy, consent, and traveler trust
Session led by: iProov Ltd
Sep 1012:10
Conference pass

Roundtable discussions

Roundtables
Roundtable 10: The Power of Network APIs: Building the Next Generation of Fraud Protection [Vonage]
Abbie Barbir, Senior Security Advisor, Co-Founder of ADIA, Aetna; a CVS Pharmacy Health Company
Roundtable 11: What the Heck is an NHI—And How Do I Secure It? [Silverfort]
Roundtable 12: Sardine
Roundtable 2: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [Telesign]
Roundtable 3: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [HID]
Roundtable 4: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [FusionAuth]
Roundtable 5: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [ROC]
Blake Moore, Chief Operating Officer, ROC
Roundtable 6: From Sign-In to Strategy: Using Identity Metrics to Drive Business Decisions [Strivacity]
Roundtable 7: Who Gave the Bot Admin Access? Managing Identity in the Age of AI [Zluri]
Roundtable 8: Advancing Multimodal Biometrics with Integrated Presentation Attack Detection [IrisID]
Roundtable 9: The Evolution of Liveness Detection [Jumio]
Sep 1013:40
Conference pass

Seminar Presentation: HAND

Seminar Theatre B
Will Kreth, CEO, HAND (Human & Digital)
Sep 1014:00
Conference pass

Biometrics in payments: Securing transactions, elevating experiences

Digital ID in Financial Services

Step into the future of payments, where biometrics are redefining the transaction landscape. This session uncovers the pivotal role of biometric technology in enhancing payment security while delivering an unparalleled consumer experience. Discover the core of identity validation and learn how seamless authentication processes are effectively combating fraud. Engage with J.P. Morgan’s Prashant Sharma as he showcases cutting-edge innovations in identity verification, transforming checkout experiences into secure, effortless interactions. Join us to explore how identity-driven payments are setting new standards for security and convenience in the digital age.

Sep 1014:00
Conference pass

Digital wallet presentation: Kantara Initiative

Digital ID in Government
Sep 1014:00
Conference pass

Facial biometrics: progress made and use cases available from higher accuracy

Biometric Innovations
Will Graves, Deputy Assistant Director Futures Identity, OBIM
Sep 1014:20
Conference pass

A look into the future of payments

Digital ID in Financial Services
  • Explore how emerging technologies like blockchain and AI are transforming payment systems and driving future innovations.
  • Examine advancements in payment security and strategies for balancing robust protection with seamless user experiences.
  • Discuss the impact of evolving regulatory landscapes on the payments industry and how companies can ensure compliance.
  • Design payment systems that prioritize user experience while maintaining high-security standards.
  • Highlight the role of identity verification in fraud prevention and its integration into modern payment systems.
Moderator: Phil Goldfeder, CEO, American Fintech Council
Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1014:20
Conference pass

Digital wallets: Reviewing the potential of increased adoption and innovation

Digital ID in Government
  • Explore the latest advancements in digital wallet technology and their role in enhancing user experience.
  • Address privacy, fraud prevention, and cybersecurity risks in digital wallets.
  • Discuss strategies for achieving cross-platform and cross-border compatibility.
  • Highlight applications in payments, digital identity, and government services.
  • Examine the impact of AI, blockchain, and decentralized technologies on digital wallet innovation.
Moderator: Annet Steenbergen, Independent advisor Digital Identity (Wallets) and travel, independent
Ryan Galluzzo, Digital Identity Program Lead, NIST
Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1014:20
Conference pass

Facial biometrics: Exploring practical applications across industries

Biometric Innovations
  • Examine advancements, challenges, and ethical considerations in facial recognition technology.
  • Explore practical applications of facial recognition across industries from security to customer experience.
  • Promote the responsible and ethical use of facial recognition while addressing public concerns.
  • Highlight efforts to reduce bias and improve fairness in facial recognition technologies.
Moderator: John Wagner, President, John Wagner Consulting
John Splain, Sr. Biometrics SME, Biometrics Guru LLC
Joel Brogan, Research Group Lead | Multimodal Sensor Analytics, Oak Ridge National Lab
Session led by: FaceTec
Sep 1014:20
Conference pass

How are verification and authentication strategies evolving across enterprise systems in different sectors?

Access Management and Authentication
  • Explore real-world experiences with verification and authentication solutions from diverse end-users.
  • Balance customer priorities: How do we address friction versus risk in authentication processes?
  • Highlight the newest solutions and technologies shaping the future of identity verification.
  • Understand how different sectors and populations require tailored approaches to identity solutions can customers and workers be treated the same?
  • Examine the varying priorities and unique challenges faced by industries in implementing effective verification and authentication systems.
Moderator: Jeremy Grant, Managing Director, Technology & Innovation, Venable LLP
Jessica Garcia, Authentication & Access Management Director, Otis Elevator
Ken Robertson, Assistant Vice President, Principal Information Security Engineer, Fifth Third Bank
Session led by: Proximus Global
Sep 1014:20
Conference pass

Strong customer authentication (SCA): Step up your security beyond PSD2

Seminar Theatre A
Falguni Vallabhbhai Patel, Member Of Technical Staff - II, eBay
Sep 1014:20
Conference pass

Verify once, use everywhere: What government can learn from the private sector about reusable identities

Seminar Theatre B

While reusable identity (RPs) is already reshaping how the private sector handles identity, financial institutions still face a chicken-and-egg challenge: how to modernize verification without falling out of step with regulators. This session explores how RPs—cryptographically derived, privacy-preserving credentials—can address that gap. By building on trusted standards like mobile driver’s licenses and enabling individuals to carry secure, pre-verified identity data, banks can enhance fraud detection, reduce redundancy, and improve financial access for marginalized groups. We’ll demystify common misconceptions, examine case studies from early adopters, and highlight how custodial approaches like Persona’s align with priorities from agencies like FinCEN, OCC, and FDIC—offering a path toward more secure, compliant, and inclusive identity infrastructure.

Sep 1014:40
Conference pass

Insider threats: Using identity intelligence to detect enterprise anomalies

Seminar Theatre A

Join us as we dive into insider threats and the techniquesthat can be used to uncover what is really going on insider your enterprise.

Sep 1014:50
Conference pass

Redefining borders: How facial recognition is shaping the future of global travel

Biometric Innovations

With global air travel projected to reach 8 billion passengers annually by 2040, the need for faster, safer, and more seamless border experiences has never been greater. In this session, we will explore how facial recognition technology is revolutionizing the way we cross borders — enhancing security, streamlining immigration processes, and redefining the traveler experience. From biometric eGates to AI-powered identity verification, we’ll dive into real-world implementations, emerging innovations, and the ethical considerations that come with this digital shift. Join HID as we uncover how facial recognition is not only changing how we travel, but also reshaping the very concept of borders in an increasingly connected world.

Sep 1015:00
Conference pass

Seminar Presentation: iProov

Seminar Theatre A
Sep 1015:20
Conference pass

Digital travel credentials in action

Seminar Theatre B
Sep 1015:20
Conference pass

National identity initiative: Pakistan's digital ID system

Seminar Theatre A
Sep 1015:40
Conference pass

Seminar Presentation: NextgenID

Seminar Theatre A
Sep 1015:50
Conference pass

Unlocking ethical biometrics: Inclusive design, governance and trust 

Biometric Innovations

Biometric technologies such as facial recognition offer transformative potential but when mishandled can lead to exclusion and privacy challenges. This presentation lays out a framework for ethical biometrics, prioritizing inclusive design, fairness, accessibility, privacy, governance, and trust, and concluding by offering actionable insights for designing and evaluating inclusive, trustworthy biometric systems.

Sep 1016:00
Conference pass

Beauty and the beast - Unifying identity security across cloud and legacy IAM silos

Seminar Theatre B
Sep 1016:00
Conference pass

Fraud wars: AI, regulation, and real-time defense in the identity economy

Seminar Theatre A

Fraudsters now operate at machine speed. Soups Ranjan will strip away the buzzwords and map the real battlefield:

  • How generative AI is weaponized for synthetic IDs, deepfake onboarding, and bot-driven account takeovers;
  • The counter-AI stack: from human-like behavior to device signals that stop attacks without torching user experience
  • Why the patchwork of U.S. state bills (e.g., California’s SB 362, New York’s digital-ID pilot) matters
  • A data-backed look at fraud shift. Why losses are migrating from payments to account origination and what that signals for 2026.

Attendees leave with a two-minute diagnostic they can run on their own orgs Monday morning and a playbook for aligning fraud, risk, and product teams around real-time signals designed to catch the most sophisticated synthetic IDs.

Sep 1016:10
Conference pass

Fighting fraud: Assessing the state of play across the fraud landscape

Digital ID in Financial Services
  • Explore efforts to combat fraud within the identity ecosystem and the strategies making an impact.
  • Examine AI innovations that are both enabling and preventing fraud in identity systems.
  • Analyze legislative developments across the U.S. and their implications for fraud prevention.
  • Understand trends in identity theft and fraud, their impact on individuals and how to educate and protect the public effectively.
Sep 1016:10
Conference pass

How will the latest CIAM strategies build consumer trust?

Access Management and Authentication
  • Identify and addressing gaps in CIAM to enhance security and user experience.
  • Explore how CIAM priorities differ across industries and adapting solutions accordingly.
  • Leverage CIAM innovation for fraud prevention and trust-building.
  • Balance friction versus risk with technologies like passwordless authentication, MFA, and facial recognition.
  • Gain insights from end users of CIAM technology to guide best practices and improve implementation strategies.
Sep 1016:10
Conference pass

Identity initiatives: what is working and where?

Digital ID in Government
  • Explore how identity initiatives are evolving to meet the demands of an increasingly digital and interconnected world.
  • Examine the role of international collaborations and standards in shaping the future of national identity systems.
  • Balance security, privacy, and user convenience in national identity programs amid rising data protection concerns.
  • Analyze the impact of emerging technologies like AI, biometrics, and blockchain on the development of national identity systems.
Sep 1016:10
Conference pass

Reviewing the ethics of mass biometric technology adoption

Biometric Innovations
  • Investigate the controversies and legal implications of using biometrics in security, identification, and access control.
  • Address key ethical issues such as privacy, discrimination, and consent in biometric technology applications.
  • Delve into critical considerations surrounding the ethical use of biometric technologies.
  • Explore current use cases for biometric technologies and the ethical challenges they present.
  • Examine proposed solutions, including legal and regulatory frameworks, as well as monitoring and oversight efforts.
Moderator: Janice Kephart, Chief Executive Officer, Identity Strategy Partners
Christian Lau, CTO, Los Angeles Football Club
Session led by: Amivero
Sep 1016:20
Conference pass

Solving KYC fatigue: The case for reusable business credentials

Seminar Theatre A

Financial institutions are facing increasing pressure to provide seamless digital experiences while adhering to strict regulatory compliance. This session examines how reusable business identity can support both objectives by facilitating efficient and secure interactions across markets and platforms, helping organizations streamline compliance, expedite onboarding, and reduce fraud across jurisdictions.

Sep 1016:40
Conference pass

From CIAM to AIAM: Securing the identity of autonomous agents

Access Management and Authentication

You’ve heard of CIAM. You’ve implemented WIAM. But are you ready for the next evolution in identity? MeetAIAM—Agentic Identity and Access Management—where identities aren’t just managed, they think, act, and adapt.

As AI systems evolve from passive tools to autonomous agents, a new security paradigm is emerging. Many GenAI systems claim autonomy, but true Agentic AI exhibits goal-directed behavior, memory, planning, and the ability to act independently across systems. This session begins by clarifying what Agentic AI really is—and why that distinction matters.

We’ll then explore how IAM must evolve to support Agentic AI. Attendees will learn how emerging protocols likeOAuth 2.1,MCP (Model Context Protocol), andACP (Agent Communication Protocol)are enabling:

  • Secure, delegated agent authentication
  • Contextual access control across tools and APIs
  • Trust negotiation and identity propagation between agents

Sep 1016:40
Conference pass
Sep 1016:40
Conference pass

Overcoming traditional methods to serve underserved populations and protect biometric data

Biometric Innovations
Sep 1016:40
Conference pass

The new face of fraud: How deepfakes are changing the game and how to fight back

Digital ID in Financial Services

This presentation will explore AI-driven deepfakes in fraudulent activities. We'll cover what deepfakes are, how they're used by malicious actors in scams like CFO fraud, and showcase a few typical attacks. We'll discuss methods for detecting these sophisticated fakes—both human observation and AI-powered "agent detection"—and provide actionable strategies to enhance employee resilience and protect your organization.

Sep 1017:20
Conference pass

Create your personal agenda –check the favourite icon

Sep 119:05
Conference pass

Keynote: CBP innovation: Leveraging technology to enhance border security

Keynotes
Diane Sabatino, Acting Executive Assistant Commissioner, Office of Field Operations, U.S. Customs and Border Protection
Sep 119:25
Conference pass

Utah's journey towards a state sponsored digital ID

Keynotes
Christopher Bramwell, Chief Privacy Officer, State of Utah
Sep 119:45
Conference pass

Navigating the future of digital identity: Initiatives, compliance strategies, and marketplace implications

Keynotes
Sep 1110:20
Conference pass

Biometric at border: The role of iris recognition

Seminar Theatre A

National security has taken center stage across the world; now is the opportunity for biometrics to make the case for efficiency, accuracy, safety, and speed. Iris ID has 25-year history of developing and researching cutting edge technologies and solutions using iris recognition. This presentation explores how iris biometrics can deliver reliable identity verification and authentication—enhancing border control efficiency while upholding the highest security standards. I’ll delve into how this non-invasive, high-precision technology works, its advantages over other biometric methods, and showcase real-world deployment case studies.

Sep 1110:40
Conference pass

Seminar Presentation: Muehlbauer

Seminar Theatre A
Sep 1110:40
Conference pass

Silent Authentication: A new way to secure your customer journey [Vonage]

Seminar Theatre B

Two-Factor Authentication (2FA) has been essential but often causes friction, impacts user experience, and is vulnerable to social engineering attacks. CAMARA Network Powered Digital Solutions, developed by GSMA and the Linux Foundation, offers a seamless alternative with Number Verification and Silent Authentication. This technology enables secure, frictionless authentication directly through mobile network operators, eliminating the need for OTPs and reducing vulnerabilities.

This session highlights how Silent Authentication is transforming digital authentication, prioritizing both security and user experience.

Sep 1111:00
Conference pass

Combatting synthetic identity fraud

Documents and Credentials

Learn how commercial and government entities are verifying driver's license and identification card information against department of motor vehicle data. AAMVA’s Driver License Data Verification (DLDV) service is a tool being used to combat synthetic identity fraud through real-time data verification.

Sep 1111:00
Conference pass

Customs and Border Protection: Aligning strategies for the future of border security

Identity Innovations in Travel
Sep 1111:00
Conference pass

Digital identity: It may be secure, but will it protect your privacy?

Identity and Cyber

Modern identity systems authenticate users with advanced identity, encryption, and communication technologies. Despite these advancements, how do digital identity solutions affect their users’ personal privacy?

Traditional IAM protects users within closed ecosystems. Federated architectures extend centralized identity to external relying parties, but often with a ‘phone home’ verification mechanism that can be used to track users. Decentralized Identity helps platform providers overcome these problems through peer-to-peer identifiers and verification methods that don’t require issuer participation whenever users present their digital identities.

This presentation will:

  • Illustrate the privacy impacts of ‘phone home’ architectures and tools
  • Explore Decentralized Identity’s privacy improvements
  • Describe how recent legislation from the US State of Utah is creating a new model for privacy-oriented digital identity in government information systems.
Sep 1111:00
Conference pass

Passkeys in focus: OTIS elevators case study

Access Management and Authentication
Alyson Ruff, Senior Director Cybersecurity, Identity and Access Management, Otis Elevator
Sep 1111:00
Conference pass

Real or fake? Defending against deepfakes

Seminar Theatre A
Sep 1111:20
Conference pass

Assessing the challenges and rewards of passkey adoption in your organization

Access Management and Authentication
  • Explore the rise of passkeys as a secure, user-friendly alternative to traditional passwords.
  • Examine the role of passkeys in reducing phishing risks and enhancing authentication processes.
  • Discuss how passkeys align with evolving security standards and the future of passwordless authentication.
  • Highlight real-world implementations of passkeys across industries and lessons learned.
  • Address challenges in adoption, including interoperability, user education, and integration with existing systems.
Sep 1111:20
Conference pass

Beyond recognition: The future of face analytics from age estimation to deepfakes

Seminar Theatre A
Blake Moore, Chief Operating Officer, ROC
Sep 1111:20
Conference pass

How will decentralized identity serve the future of personal identity management?

Identity and Cyber
  • How decentralized identity gives people more control over their personal data and improves privacy by reducing reliance on big databases.
  • The potential of decentralized identity to enable secure and seamless identification across borders and industries.
  • How decentralized identity enhances security by using cryptography and minimizing risks like fraud and data breaches.
  • The challenges of adopting decentralized systems, including building infrastructure, creating regulations, and educating users.
  • Practical steps for businesses to start using decentralized identity while working with their current systems
Moderator: Kaliya Young, Founding Partner, Identity Woman
Dino Cataldo Dellaccio, Chief Information Officer, UN Joint Staff Pension Fund
Sep 1111:20
Conference pass

Identity at the border: How will technology enhance border protection techniques?

Identity Innovations in Travel
  • Explore how technology enhances identity verification and strengthens security at ports and border crossings.
  • Discuss the role of biometrics, digital credentials, and automation in streamlining immigration and customs processes.
  • Examine strategies to balance border security with efficiency and traveller convenience.
  • Gain insights from U.S. and international leaders on the challenges and innovations shaping border management.
Sep 1111:20
Conference pass

Modeling users: Best practices

Seminar Theatre B

When we engage with customers at FusionAuth, one question we consistently are asked is: "How should we model our users in our CIAM system?"

This architectural decision shapes everything from user experience to system security.

In this talk, I’ll explore three CIAM user modeling approaches:

  • Tenant-based modeling
  • Application-based modeling
  • Organization-based modeling

We'll dissect the advantages and limitations of each approach, provide a decision framework to select the right model for your requirements, and reveal practical techniques for guiding users to the correct authentication pathway before they ever log in.

At the end of this talk, you’ll know how to pick the right user modeling approach for your authentication needs.

Sep 1111:20
Conference pass

Reviewing modern credential security

Documents and Credentials
  • Debunk counterfeiting myths and solutions.
  • Develop cutting-edge technologies for secure credentials.
  • Expand the knowledge of security features and common fraud/deception with training programmes and biometrics.
  • How can law enforcement agencies react to agile security document fraud?
  • Identify areas for new inter-agency cooperation regarding security documents.
Sep 1111:40
Conference pass

Zero friction verification

Seminar Theatre A
Sep 1111:50
Conference pass

Digital identity at the border: What it means for you, me, and global travel

Identity Innovations in Travel
Sep 1111:50
Conference pass

State endorsed digital identity framework: What steps remain for digital credentials to meet SEDI standards?

Identity and Cyber

During the 2025 legislative session, Utah passed landmark legislation—S.B. 260—establishing the State Endorsed Digital Identity (SEDI) framework. Since then, SEDI has fueled ongoing discussions about Verifiable Digital Credentials and their role in government services, with a strong emphasis on protecting individual privacy. Learn how SEDI is intended to function, and why the Utah Legislature has made it clear that, despite the presence of various digital credentials in the state, none currently meet the achieveable standards set by SEDI.

Sep 1112:10
Conference pass

Roundtable discussions

Roundtables
Roundtable 1: Streamlining Identity Verification: Leveraging Mobile Technology in Law Enforcement [OVD Kinegram]
Roundtable 2: Red Cards vs. Red Tape: Will Border Bureaucracy Bench World Cup Fans in 2026? [Entrust]
Roundtable 3: Beyond the Checkpoint: Biometrics for Seamless Security, Passenger Convenience, and Operational Efficiency [iProov]
Roundtable 4: The rocky road to identity resilience [Semperis]
Roundtable 5: Identity Reimagined: Embracing Digital IDs [Ernst & Young]
Roundtable 9: Vouched
Sep 1114:00
Conference pass

Document anti-counterfeiting presentation

Documents and Credentials
Robert Celeste, Executive Director, Open Credentialing Initiative
Sep 1114:00
Conference pass

How will decentralized identity shape the future of identity management?

Identity and Cyber
Sep 1114:00
Conference pass

Innovations in cybersecurity: bolstering protection amidst an increase in cybercrime

Identity and Cyber
Sep 1114:00
Conference pass

MFA attacks and MFA hygiene - Becoming less of an easy target

Access Management and Authentication
Sep 1114:00
Conference pass

The journey towards frictionless: How is the aviation industry improving the onboarding experience?

Identity Innovations in Travel
  • Explore digital transformation in airports to enhance passenger experiences through seamless identity verification and biometrics.
  • Discuss innovations like touchless check-ins, automated security processes, and streamlined border controls.
  • Highlight how technology reduces wait times, improves efficiency, and balances security with convenience.
  • Examine the global impact of frictionless travel solutions on the future of the aviation industry.
Moderator: Annet Steenbergen, Independent advisor Digital Identity (Wallets) and travel, independent
Ryan Propis, Vice President, Security and Facilitation, U.S. Travel Association
Session led by: Muehlbauer Group
Sep 1114:10
Conference pass

Seminar Presentation: Vouched

Seminar Theatre B
Sep 1114:20
Conference pass

Anti-counterfeiting: What trends and methods are the biggest threat?

Documents and Credentials
  • Detect and preventing document forgery.
  • Addressing digital document fraud and new developments.
  • Briefing on new efforts to combat document fraud.
  • Examine the increasing use of biometrics (e.g., fingerprints, facial recognition) to strengthen identity verification and combat identity fraud.
  • Discuss the evolution of counterfeiting detection across a variety of governments.
  • Examine the impact of counterfeit documents on migratory populations.
Sep 1114:20
Conference pass

How will decentralized identity serve the future of personal identity management?

Identity and Cyber
  • How decentralized identity gives people more control over their personal data and improves privacy by reducing reliance on big databases.
  • The potential of decentralized identity to enable secure and seamless identification across borders and industries.
  • Will decentralized identity enhance security by using cryptography, minimizing risks like fraud and data breaches?
  • The challenges of adopting decentralized systems, including building infrastructure, creating regulations, and educating users.
  • Practical steps for businesses to start using decentralized identity while working with their current systems.
Dino Cataldo Dellaccio, Chief Information Officer, UN Joint Staff Pension Fund
Moderator: Kaliya Young, Founding Partner, Identity Woman
Sep 1114:20
Conference pass

MFA and zero trust: The future of access management?

Access Management and Authentication
  • Learn how multi-factor authentication (MFA) strengthens identity verification and serves as a cornerstone of Zero Trust strategies.
  • Identify challenges in implementing Zero Trust and MFA, including user resistance, legacy system integration, and scalability.
  • Examine next-generation MFA solutions, such as biometrics and passkeys, and their role in enhancing Zero Trust security.
  • Discuss the balance between robust security measures and maintaining a seamless user experience in Zero Trust environments.
  • Explore real-world examples and lessons learned from organizations adopting Zero Trust and MFA to protect sensitive data and systems.
Moderator: Stephen Hutchinson, Director of Security Architecture, Mitsubishi U.F.J. Financial Group
Louis Eichenbaum, Program Manager, U.S. Department of the Interior
Ken Robertson, Assistant Vice President, Principal Information Security Engineer, Fifth Third Bank
Sep 1114:20
Conference pass

Threat assessment: evaluating the latest technological innovations being used in cybercrime

Identity and Cyber
  • Explore how AI strengthens cybersecurity through threat detection, response automation, and predictive analytics.
  • Address risks of AI misuse in cyberattacks, including identity fraud and deepfakes.
  • Examine the role of AI in securing digital identity ecosystems and protecting personal data.
  • Balance innovation and ethics: preventing bias and ensuring transparency in AI-powered security tools.
  • Collaborate across sectors to harness AI's potential while mitigating emerging cybersecurity threats.
Sep 1114:30
Conference pass

Frictionless travel data reimagined: From booking to baggage

Identity Innovations in Travel

In this talk, we’ll explore how legacy travel metrics—many built for a different era—can be reexamined and reimagined to meet the needs of today’s frictionless travel expectations. By understanding the original purpose behind established data points, we can identify what still serves us, what needs to evolve, and where new insights can emerge. We'll focus on three key phases of the journey:pre-travel, examining booking data and how user intent can be better captured;at the airport, looking at virtual agents and redefining how we measure success beyond deflection rates; andpost-travel, where we’ll unpack baggage handling metrics like “time to customer” to reveal hidden friction. Through this lens, we’ll discuss how to build more adaptive, customer-centric feedback loops that allow our data to grow as fast as traveler expectations.

Scott Smith, Director, Global Airport Operations Performance & Execution, United Airlines
Sep 1115:30
Conference pass

Non-human identities: What does enterprise architecture look like in the automated age?

Access Management and Authentication
  • Assess the rise in use cases for NHIs and the new security concerns that are raised by this.
  • Review the validity of zero trust models for NHIs to prevent compromised assets becoming a threat.
  • Explore what the future looks like for NHI usage across different industries and sectors.
  • Where are the best use cases that demonstrate NHIs enhancing existing enterprise architecture systems?
  • How will sentient NHIs, such as agentic AI operators, increase security risks pertaining to user authentication and verification?
Sep 1115:30
Conference pass

Physical documents in a digital world

Documents and Credentials
  • Discuss the momentum behind the shift to digital documentation.
  • Weigh up the pros and cons of digitizing sensitive documents.
  • Are there examples of documents that must remain physical? What security concerns exist surrounding digital documentation?
  • How can we create a seamless process for digitization of physical documents such as birth certificates?
  • What are the best use cases for adopting digital frameworks and standards when transferring documents.
Sep 1115:30
Conference pass

Reviewing enhancements made in DNA testing

Identity Innovations in Travel
  • Explore DNA as a unique biometric identifier and how it differs from other biometrics in accuracy and application.
  • Examine applications of DNA in security and identification, including law enforcement, border control, and disaster victim identification.
  • Highlight technological advances such as rapid DNA sequencing and its potential for real-time verification.
  • Address ethical and privacy challenges, including consent, data ownership, and the risk of genetic profiling.
  • Discuss future integration, focusing on scalability, cost, and the role of DNA in next-generation biometric systems.
Moderator: Suzanne Smalley, Digital privacy and cybersecurity reporter, The Record from Recorded Future News
Susan Welti, DNA Technical Leader, Montgomery County, MD Crime Lab
Sep 1115:30
Conference pass

Trust and Safety panel

Identity and Cyber
  • Address online threats like fraud and identity theft in digital identity systems.
  • Balance user privacy with platform security in digital identity and fraud prevention.
  • Leverage AI and machine learning to enhance identity verification and content moderation.
  • Create transparent and accountable systems for identity verification and content moderation.
  • Collaborate with industry, law enforcement, and regulators to maintain a trusted digital identity ecosystem.
  • Discuss developments in age verification software.
Moderator: Iain Corby, Executive Director, Age Verification Providers Association
Sep 1116:00
Conference pass

Ethical AI: How should agentic AI be tailored to match a user's ethical considerations?

Access Management and Authentication
Sep 1116:00
Conference pass

Is zero trust a necessity with the rise of AI?

Identity and Cyber
last published: 11/Jul/25 11:25 GMT

Washington DC, 10 - 11 September 2025

Schedule

Create your personal agenda –check the favourite icon

Sep 109:00
Conference pass
Sep 109:05
Conference pass

Keynote: Palm springs international airport's journey towards frictionless travel

Keynotes
Harry Barrett Jr, Executive Director, Palm Springs International Airport
Sep 109:25
Conference pass

Keynote: Identity innovations in sports entertainment

Keynotes
Sep 109:45
Conference pass

Keynote: Assessing modern cybersecurity risks concerning identity

Keynotes
Sep 1010:05
Conference pass

Keynote: Without biometric binding, we can’t know who UR

Keynotes
Sep 1010:20
Conference pass

2025 trends in identity security

Seminar Theatre A

With identity-related breaches a continuous threat, the business impact of handling identity correctly has never been more vital. Of organizations surveyed in 2024, 93% of identity stakeholders said that security outcomes could have lessened the business impact of incidents. With the increasing number of identities and attackers stepping up their game, enterprises must ensure that all identities (human and non-human) are protected. In this session, you will see the results of an exploration into the current state of cybersecurity. IDSA commissioned this study with Dimensional Research to discover approaches large companies take toward security and identity.

Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1010:40
Conference pass

Enhancing security with future-ready PKI-as-a-service and seamless credential management solutions

Seminar Theatre B

In today's digital landscape, government agencies, regulated industries, and enterprises face increasing challenges in securing user authentication, email signing, and document signing.

Join HID's expertsfor an insightful presentation on how our cutting-edge PKI-as-a-Service (PKIaaS) and Credential Management Solutions can transform your cybersecurity infrastructure, enabling seamless userauthentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements.

In this presentation, we will:

  • Explore the human aspects of managing digital identity and certificate lifecycles
  • Demonstrate how PKIaaS simplifies the implementation of trusted PKI within your organization and examine certificates for various assurance levels
  • Explain how to achieve regulatory requirements and become compliant with security mandates through Credential Management
Sep 1010:50
Conference pass

Security matchmaker: How PKI-based credentials and IAM can save the digital world

Seminar Theatre A

The digital world is built on trust, but that trust is fragmented. On one side, traditional Identity and Access Management (IAM) governs human authentication and authorization. On the other, Public Key Infrastructure (PKI) quietly underpins machine identities, secure communications, and cryptographic trust. These two forces have operated in silos for too long—but in an era of evolving cyber threats and the looming impact of quantum computing, they need each other more than ever.

This session brings IAM and PKI together, demonstrating how their integration is essential to fortifying security, automating risky manual processes, and ensuring long-term resilience. As non-human identities explode across IoT, AI, and software, and as quantum advancements threaten traditional cryptography, organizations must bridge the divide to build a unified, adaptable security foundation.

Join us to discover:

  • How the acceleration of quantum threats and shrinking certificate lifespans demand a shift toward crypto agility.
  • How PKI-based credentials serve as a critical yet underutilized component of IAM strategies, enabling identity verification, multi-factor and passwordless authentication, and even decentralized identity.
  • Why the future of digital trust is so dependent on unifying PKI and IAM, and how doing so can streamline security operations, reduce risk, and eliminate trust gaps that leave enterprises vulnerable.

PKI and IAM must work together—and only by uniting them can we build the trusted digital future our world demands.

Sep 1011:00
Conference pass

Bank of America's digital ID journey

Digital ID in Financial Services
Maharaj Mukherjee, Senior Vice President and Senior Architect Lead at Bank of America, Bank of America Securities
Sep 1011:00
Conference pass

Beyond the login: Why identity is the new front door to your business

Seminar Theatre B

In a world where first impressions happen online, the login screen has become your brand’s front door and identity is the key. But too often, businesses treat Customer Identity and Access Management (CIAM) as just a backend function.

In this fast-paced session, we’ll explore how modern identity platforms can do more than just authenticate users—they can reduce friction, detect fraud before it happens, and unlock real-time insights that improve ROI, CX, and security outcomes.

You’ll learn:

  • Why a better sign-in experience increases conversion and loyalty
  • How built-in fraud signals at registration and sign-in can protect your bottom line
  • What your login data is telling you (and how to act on it)

If you think identity is just an IT problem, think again. This session will change how you see your sign-in flow—and show how CIAM can drive growth across your business.

Sep 1011:00
Conference pass

Implications of the LEI in transaction monitoring

Access Management and Authentication
Sep 1011:00
Conference pass

The state of mobile driver licenses (mDLs) - Looking at the present and the road ahead

Digital ID in Government

This session will provide an overview of the current Mobile Driver License (mDL) landscape, including updates on active programs, the AAMVA Digital Trust Service, new state and jurisdiction participation, Relying Party engagement, and AAMVA’s broader role in identity management.

Sep 1011:10
Conference pass

Why activity-driven intelligence is the game-changer in next-gen identity governance

Seminar Theatre A

Identity and access management is central to every Identity Week attendee’s role. This session offers a practical, forward-looking approach to modernizing IGA using Activity Driven Intelligence—real-time user behavior and access activity—beyond static data. It aligns with Identity Week’s focus on automation, integration, and continuous security, sharing real customer insights over theory.

Sep 1011:20
Conference pass

How is digital ID management evolving in the financial sector

Digital ID in Financial Services
  • Explore the role of digital identity in streamlining customer onboarding and verification processes.
  • Address challenges related to fraud prevention, compliance, and regulatory frameworks in financial services.
  • Discuss innovative applications of digital ID in payments, lending, and financial inclusion.
  • Examine the future of digital identity in the financial sector, including the impact of emerging technologies like AI and blockchain.
Moderator: Brian Russell, Chief Executive Officer, DaVinci Partners Consulting
Maharaj Mukherjee, Senior Vice President and Senior Architect Lead at Bank of America, Bank of America Securities
Reuben Stewart, Director, Digital Identity, PNC Bank
Linden Dawson, Customer Digital Identity Lead, Digital Platforms, National Australia Bank
Sep 1011:20
Conference pass

Identity security: 3 steps to improve business resilience

Seminar Theatre B

You’ve heard that identity is at the core of cybersecurity. That makes identity threat detection and response (ITDR) the foundation of a resilient business. But navigating decades of configuration creep and the complexities of hybrid Active Directory/Entra ID environments make for a daunting task. Here are 5 simple steps you can take now to improve your identity security and boost your business’ ability to survive and thrive despite a volatile threat landscape.

Sep 1011:20
Conference pass

Looking to the future: How is access management evolving?

Access Management and Authentication
  • Explore modern strategies and tools for securing identity and access management across enterprise systems.
  • Address the challenges of scalability, user experience, and compliance in IAM solutions.
  • Discuss innovative approaches to managing risks associated with privileged access and insider threats.
  • Highlight case studies from financial and tech sectors on implementing IAM best practices.
  • Examine the evolving role of IAM in enabling secure digital transformation and innovation.
Ernest Eustace, Associate Director Cyber Enterprise Architecture, Greater Toronto Airports Authority
Stephen Congdon, Business Counsel, Enterprise Innovation, Capital One
Sep 1011:20
Conference pass

Reviewing the rise in biometric adoption across sectors

Biometric Innovations
  • Showcase the latest innovations in biometric technologies – real world applications of technologies.
  • Unveil breakthroughs and their potentials across various domains.
  • Highlight the rapid evolution of biometric modalities beyond traditional fingerprint and facial recognition.
  • Analyze the unique advantages of each of these types of biometric technologies e.g. Increased accuracy, fraud prevention, authentication in challenging.
Moderator: Paul Hunter, Chief Executive Officer, Craefte LLC
Michael Ricupero, Commanding Officer Real Time Crime Center, New York Police Department (NYPD)
Abbie Barbir, Senior Security Advisor, Co-Founder of ADIA, Aetna; a CVS Pharmacy Health Company
Session led by: ROC
Sep 1011:20
Conference pass

State by state: reviewing challenges and success stories of DMV adoption of mDLs

Digital ID in Government
  • Explore the benefits of mobile drivers licenses (mDLs) in enhancing convenience and security for Americans.
  • Address privacy concerns and interoperability challenges across state DMV systems in the United States.
  • Discuss the role of mDLs in U.S. digital identity ecosystems and their integration with federal and state-level credentials.
  • Highlight real-world examples of mDL adoption, such as pilot programs in Arizona, Colorado, and Maryland.
  • Examine the future of mobile drivers licenses in America, including advancements in technology, federal standards, and state-level policy frameworks.
Sep 1011:30
Conference pass

Mastering EMRTDs: Ensuring data integrity and authenticity in travel documents

Seminar Theatre A
Sep 1011:40
Conference pass

Document truth: ML-driven solutions overcome existing verification barriers

Seminar Theatre B
Sep 1011:50
Conference pass

Digital identity: Powering the next wave of government digital transformation

Seminar Theatre A

Digital identity is rapidly emerging as a cornerstone of modern digital public infrastructure, key to fast-tracking government digital transformation. Achieving this vision demands a robust technological foundation—one that is scalable, interoperable, and adaptable to diverse policy and operational environments. In this session, we’ll examine how digital identity orchestration is driving tangible outcomes for governments and their constituents through real-world implementations. We’ll cover the role of digital identity in eGovernment, key challenges in the digital ecosystem, and essential frameworks and building blocks for secure, scalable citizen-centric solutions.

Sep 1011:50
Conference pass

From friction to flow: How biometrics are reimagining airport security, passenger experience, and officer efficiency

Biometric Innovations

Since 9/11, air travel has operated under a heightened mandate for security—often at the expense of passenger convenience and operational efficiency. But today, with the rise of facial biometrics, airports and border agencies are proving that it’s possible to achieve world-class security and a smooth, stress-free traveler experience—while also empowering frontline officers to focus on what matters most.

This session explores how modern biometric technologies, including privacy-first solutions from iProov, are transforming the airport journey. Attendees will learn:

  • How facial biometrics deliver fast, secure identity verification at every checkpoint
  • The role of liveness detection in stopping fraud and deepfakes before they reach the border
  • Ways biometrics reduce manual checks, streamline workflows, and enhance officer efficiency
  • Real-world success stories from airports and border agencies
  • How to balance strong security with privacy, consent, and traveler trust
Session led by: iProov Ltd
Sep 1012:10
Conference pass

Roundtable discussions

Roundtables
Roundtable 10: The Power of Network APIs: Building the Next Generation of Fraud Protection [Vonage]
Abbie Barbir, Senior Security Advisor, Co-Founder of ADIA, Aetna; a CVS Pharmacy Health Company
Roundtable 11: What the Heck is an NHI—And How Do I Secure It? [Silverfort]
Roundtable 12: Sardine
Roundtable 2: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [Telesign]
Roundtable 3: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [HID]
Roundtable 4: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [FusionAuth]
Roundtable 5: Strategies for Enhancing Customer Acquisition and Minimizing Fraud [ROC]
Blake Moore, Chief Operating Officer, ROC
Roundtable 6: From Sign-In to Strategy: Using Identity Metrics to Drive Business Decisions [Strivacity]
Roundtable 7: Who Gave the Bot Admin Access? Managing Identity in the Age of AI [Zluri]
Roundtable 8: Advancing Multimodal Biometrics with Integrated Presentation Attack Detection [IrisID]
Roundtable 9: The Evolution of Liveness Detection [Jumio]
Sep 1013:40
Conference pass

Seminar Presentation: HAND

Seminar Theatre B
Will Kreth, CEO, HAND (Human & Digital)
Sep 1014:00
Conference pass

Biometrics in payments: Securing transactions, elevating experiences

Digital ID in Financial Services

Step into the future of payments, where biometrics are redefining the transaction landscape. This session uncovers the pivotal role of biometric technology in enhancing payment security while delivering an unparalleled consumer experience. Discover the core of identity validation and learn how seamless authentication processes are effectively combating fraud. Engage with J.P. Morgan’s Prashant Sharma as he showcases cutting-edge innovations in identity verification, transforming checkout experiences into secure, effortless interactions. Join us to explore how identity-driven payments are setting new standards for security and convenience in the digital age.

Sep 1014:00
Conference pass

Digital wallet presentation: Kantara Initiative

Digital ID in Government
Sep 1014:00
Conference pass

Facial biometrics: progress made and use cases available from higher accuracy

Biometric Innovations
Will Graves, Deputy Assistant Director Futures Identity, OBIM
Sep 1014:20
Conference pass

A look into the future of payments

Digital ID in Financial Services
  • Explore how emerging technologies like blockchain and AI are transforming payment systems and driving future innovations.
  • Examine advancements in payment security and strategies for balancing robust protection with seamless user experiences.
  • Discuss the impact of evolving regulatory landscapes on the payments industry and how companies can ensure compliance.
  • Design payment systems that prioritize user experience while maintaining high-security standards.
  • Highlight the role of identity verification in fraud prevention and its integration into modern payment systems.
Moderator: Phil Goldfeder, CEO, American Fintech Council
Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1014:20
Conference pass

Digital wallets: Reviewing the potential of increased adoption and innovation

Digital ID in Government
  • Explore the latest advancements in digital wallet technology and their role in enhancing user experience.
  • Address privacy, fraud prevention, and cybersecurity risks in digital wallets.
  • Discuss strategies for achieving cross-platform and cross-border compatibility.
  • Highlight applications in payments, digital identity, and government services.
  • Examine the impact of AI, blockchain, and decentralized technologies on digital wallet innovation.
Moderator: Annet Steenbergen, Independent advisor Digital Identity (Wallets) and travel, independent
Ryan Galluzzo, Digital Identity Program Lead, NIST
Jeff Reich, Executive Director, Identity Defined Security Alliance
Sep 1014:20
Conference pass

Facial biometrics: Exploring practical applications across industries

Biometric Innovations
  • Examine advancements, challenges, and ethical considerations in facial recognition technology.
  • Explore practical applications of facial recognition across industries from security to customer experience.
  • Promote the responsible and ethical use of facial recognition while addressing public concerns.
  • Highlight efforts to reduce bias and improve fairness in facial recognition technologies.
Moderator: John Wagner, President, John Wagner Consulting
John Splain, Sr. Biometrics SME, Biometrics Guru LLC
Joel Brogan, Research Group Lead | Multimodal Sensor Analytics, Oak Ridge National Lab
Session led by: FaceTec
Sep 1014:20
Conference pass

How are verification and authentication strategies evolving across enterprise systems in different sectors?

Access Management and Authentication
  • Explore real-world experiences with verification and authentication solutions from diverse end-users.
  • Balance customer priorities: How do we address friction versus risk in authentication processes?
  • Highlight the newest solutions and technologies shaping the future of identity verification.
  • Understand how different sectors and populations require tailored approaches to identity solutions can customers and workers be treated the same?
  • Examine the varying priorities and unique challenges faced by industries in implementing effective verification and authentication systems.
Moderator: Jeremy Grant, Managing Director, Technology & Innovation, Venable LLP
Jessica Garcia, Authentication & Access Management Director, Otis Elevator
Ken Robertson, Assistant Vice President, Principal Information Security Engineer, Fifth Third Bank
Session led by: Proximus Global
Sep 1014:20
Conference pass

Strong customer authentication (SCA): Step up your security beyond PSD2

Seminar Theatre A
Falguni Vallabhbhai Patel, Member Of Technical Staff - II, eBay
Sep 1014:20
Conference pass

Verify once, use everywhere: What government can learn from the private sector about reusable identities

Seminar Theatre B

While reusable identity (RPs) is already reshaping how the private sector handles identity, financial institutions still face a chicken-and-egg challenge: how to modernize verification without falling out of step with regulators. This session explores how RPs—cryptographically derived, privacy-preserving credentials—can address that gap. By building on trusted standards like mobile driver’s licenses and enabling individuals to carry secure, pre-verified identity data, banks can enhance fraud detection, reduce redundancy, and improve financial access for marginalized groups. We’ll demystify common misconceptions, examine case studies from early adopters, and highlight how custodial approaches like Persona’s align with priorities from agencies like FinCEN, OCC, and FDIC—offering a path toward more secure, compliant, and inclusive identity infrastructure.

Sep 1014:40
Conference pass

Insider threats: Using identity intelligence to detect enterprise anomalies

Seminar Theatre A

Join us as we dive into insider threats and the techniquesthat can be used to uncover what is really going on insider your enterprise.

Sep 1014:50
Conference pass

Redefining borders: How facial recognition is shaping the future of global travel

Biometric Innovations

With global air travel projected to reach 8 billion passengers annually by 2040, the need for faster, safer, and more seamless border experiences has never been greater. In this session, we will explore how facial recognition technology is revolutionizing the way we cross borders — enhancing security, streamlining immigration processes, and redefining the traveler experience. From biometric eGates to AI-powered identity verification, we’ll dive into real-world implementations, emerging innovations, and the ethical considerations that come with this digital shift. Join HID as we uncover how facial recognition is not only changing how we travel, but also reshaping the very concept of borders in an increasingly connected world.

Sep 1015:00
Conference pass

Seminar Presentation: iProov

Seminar Theatre A
Sep 1015:20
Conference pass

Digital travel credentials in action

Seminar Theatre B
Sep 1015:20
Conference pass

National identity initiative: Pakistan's digital ID system

Seminar Theatre A
Sep 1015:40
Conference pass

Seminar Presentation: NextgenID

Seminar Theatre A
Sep 1015:50
Conference pass

Unlocking ethical biometrics: Inclusive design, governance and trust 

Biometric Innovations

Biometric technologies such as facial recognition offer transformative potential but when mishandled can lead to exclusion and privacy challenges. This presentation lays out a framework for ethical biometrics, prioritizing inclusive design, fairness, accessibility, privacy, governance, and trust, and concluding by offering actionable insights for designing and evaluating inclusive, trustworthy biometric systems.

Sep 1016:00
Conference pass

Beauty and the beast - Unifying identity security across cloud and legacy IAM silos

Seminar Theatre B
Sep 1016:00
Conference pass

Fraud wars: AI, regulation, and real-time defense in the identity economy

Seminar Theatre A

Fraudsters now operate at machine speed. Soups Ranjan will strip away the buzzwords and map the real battlefield:

  • How generative AI is weaponized for synthetic IDs, deepfake onboarding, and bot-driven account takeovers;
  • The counter-AI stack: from human-like behavior to device signals that stop attacks without torching user experience
  • Why the patchwork of U.S. state bills (e.g., California’s SB 362, New York’s digital-ID pilot) matters
  • A data-backed look at fraud shift. Why losses are migrating from payments to account origination and what that signals for 2026.

Attendees leave with a two-minute diagnostic they can run on their own orgs Monday morning and a playbook for aligning fraud, risk, and product teams around real-time signals designed to catch the most sophisticated synthetic IDs.

Sep 1016:10
Conference pass

Fighting fraud: Assessing the state of play across the fraud landscape

Digital ID in Financial Services
  • Explore efforts to combat fraud within the identity ecosystem and the strategies making an impact.
  • Examine AI innovations that are both enabling and preventing fraud in identity systems.
  • Analyze legislative developments across the U.S. and their implications for fraud prevention.
  • Understand trends in identity theft and fraud, their impact on individuals and how to educate and protect the public effectively.
Sep 1016:10
Conference pass

How will the latest CIAM strategies build consumer trust?

Access Management and Authentication
  • Identify and addressing gaps in CIAM to enhance security and user experience.
  • Explore how CIAM priorities differ across industries and adapting solutions accordingly.
  • Leverage CIAM innovation for fraud prevention and trust-building.
  • Balance friction versus risk with technologies like passwordless authentication, MFA, and facial recognition.
  • Gain insights from end users of CIAM technology to guide best practices and improve implementation strategies.
Sep 1016:10
Conference pass

Identity initiatives: what is working and where?

Digital ID in Government
  • Explore how identity initiatives are evolving to meet the demands of an increasingly digital and interconnected world.
  • Examine the role of international collaborations and standards in shaping the future of national identity systems.
  • Balance security, privacy, and user convenience in national identity programs amid rising data protection concerns.
  • Analyze the impact of emerging technologies like AI, biometrics, and blockchain on the development of national identity systems.
Sep 1016:10
Conference pass

Reviewing the ethics of mass biometric technology adoption

Biometric Innovations
  • Investigate the controversies and legal implications of using biometrics in security, identification, and access control.
  • Address key ethical issues such as privacy, discrimination, and consent in biometric technology applications.
  • Delve into critical considerations surrounding the ethical use of biometric technologies.
  • Explore current use cases for biometric technologies and the ethical challenges they present.
  • Examine proposed solutions, including legal and regulatory frameworks, as well as monitoring and oversight efforts.
Moderator: Janice Kephart, Chief Executive Officer, Identity Strategy Partners
Christian Lau, CTO, Los Angeles Football Club
Session led by: Amivero
Sep 1016:20
Conference pass

Solving KYC fatigue: The case for reusable business credentials

Seminar Theatre A

Financial institutions are facing increasing pressure to provide seamless digital experiences while adhering to strict regulatory compliance. This session examines how reusable business identity can support both objectives by facilitating efficient and secure interactions across markets and platforms, helping organizations streamline compliance, expedite onboarding, and reduce fraud across jurisdictions.

Sep 1016:40
Conference pass

From CIAM to AIAM: Securing the identity of autonomous agents

Access Management and Authentication

You’ve heard of CIAM. You’ve implemented WIAM. But are you ready for the next evolution in identity? MeetAIAM—Agentic Identity and Access Management—where identities aren’t just managed, they think, act, and adapt.

As AI systems evolve from passive tools to autonomous agents, a new security paradigm is emerging. Many GenAI systems claim autonomy, but true Agentic AI exhibits goal-directed behavior, memory, planning, and the ability to act independently across systems. This session begins by clarifying what Agentic AI really is—and why that distinction matters.

We’ll then explore how IAM must evolve to support Agentic AI. Attendees will learn how emerging protocols likeOAuth 2.1,MCP (Model Context Protocol), andACP (Agent Communication Protocol)are enabling:

  • Secure, delegated agent authentication
  • Contextual access control across tools and APIs
  • Trust negotiation and identity propagation between agents

Sep 1016:40
Conference pass
Sep 1016:40
Conference pass

Overcoming traditional methods to serve underserved populations and protect biometric data

Biometric Innovations
Sep 1016:40
Conference pass

The new face of fraud: How deepfakes are changing the game and how to fight back

Digital ID in Financial Services

This presentation will explore AI-driven deepfakes in fraudulent activities. We'll cover what deepfakes are, how they're used by malicious actors in scams like CFO fraud, and showcase a few typical attacks. We'll discuss methods for detecting these sophisticated fakes—both human observation and AI-powered "agent detection"—and provide actionable strategies to enhance employee resilience and protect your organization.

Sep 1017:20
Conference pass

Create your personal agenda –check the favourite icon

Sep 119:05
Conference pass

Keynote: CBP innovation: Leveraging technology to enhance border security

Keynotes
Diane Sabatino, Acting Executive Assistant Commissioner, Office of Field Operations, U.S. Customs and Border Protection
Sep 119:25
Conference pass

Utah's journey towards a state sponsored digital ID

Keynotes
Christopher Bramwell, Chief Privacy Officer, State of Utah
Sep 119:45
Conference pass

Navigating the future of digital identity: Initiatives, compliance strategies, and marketplace implications

Keynotes
Sep 1110:20
Conference pass

Biometric at border: The role of iris recognition

Seminar Theatre A

National security has taken center stage across the world; now is the opportunity for biometrics to make the case for efficiency, accuracy, safety, and speed. Iris ID has 25-year history of developing and researching cutting edge technologies and solutions using iris recognition. This presentation explores how iris biometrics can deliver reliable identity verification and authentication—enhancing border control efficiency while upholding the highest security standards. I’ll delve into how this non-invasive, high-precision technology works, its advantages over other biometric methods, and showcase real-world deployment case studies.

Sep 1110:40
Conference pass

Seminar Presentation: Muehlbauer

Seminar Theatre A
Sep 1110:40
Conference pass

Silent Authentication: A new way to secure your customer journey [Vonage]

Seminar Theatre B

Two-Factor Authentication (2FA) has been essential but often causes friction, impacts user experience, and is vulnerable to social engineering attacks. CAMARA Network Powered Digital Solutions, developed by GSMA and the Linux Foundation, offers a seamless alternative with Number Verification and Silent Authentication. This technology enables secure, frictionless authentication directly through mobile network operators, eliminating the need for OTPs and reducing vulnerabilities.

This session highlights how Silent Authentication is transforming digital authentication, prioritizing both security and user experience.

Sep 1111:00
Conference pass

Combatting synthetic identity fraud

Documents and Credentials

Learn how commercial and government entities are verifying driver's license and identification card information against department of motor vehicle data. AAMVA’s Driver License Data Verification (DLDV) service is a tool being used to combat synthetic identity fraud through real-time data verification.

Sep 1111:00
Conference pass

Customs and Border Protection: Aligning strategies for the future of border security

Identity Innovations in Travel
Sep 1111:00
Conference pass

Digital identity: It may be secure, but will it protect your privacy?

Identity and Cyber

Modern identity systems authenticate users with advanced identity, encryption, and communication technologies. Despite these advancements, how do digital identity solutions affect their users’ personal privacy?

Traditional IAM protects users within closed ecosystems. Federated architectures extend centralized identity to external relying parties, but often with a ‘phone home’ verification mechanism that can be used to track users. Decentralized Identity helps platform providers overcome these problems through peer-to-peer identifiers and verification methods that don’t require issuer participation whenever users present their digital identities.

This presentation will:

  • Illustrate the privacy impacts of ‘phone home’ architectures and tools
  • Explore Decentralized Identity’s privacy improvements
  • Describe how recent legislation from the US State of Utah is creating a new model for privacy-oriented digital identity in government information systems.
Sep 1111:00
Conference pass

Passkeys in focus: OTIS elevators case study

Access Management and Authentication
Alyson Ruff, Senior Director Cybersecurity, Identity and Access Management, Otis Elevator
Sep 1111:00
Conference pass

Real or fake? Defending against deepfakes

Seminar Theatre A
Sep 1111:20
Conference pass

Assessing the challenges and rewards of passkey adoption in your organization

Access Management and Authentication
  • Explore the rise of passkeys as a secure, user-friendly alternative to traditional passwords.
  • Examine the role of passkeys in reducing phishing risks and enhancing authentication processes.
  • Discuss how passkeys align with evolving security standards and the future of passwordless authentication.
  • Highlight real-world implementations of passkeys across industries and lessons learned.
  • Address challenges in adoption, including interoperability, user education, and integration with existing systems.
Sep 1111:20
Conference pass

Beyond recognition: The future of face analytics from age estimation to deepfakes

Seminar Theatre A
Blake Moore, Chief Operating Officer, ROC
Sep 1111:20
Conference pass

How will decentralized identity serve the future of personal identity management?

Identity and Cyber
  • How decentralized identity gives people more control over their personal data and improves privacy by reducing reliance on big databases.
  • The potential of decentralized identity to enable secure and seamless identification across borders and industries.
  • How decentralized identity enhances security by using cryptography and minimizing risks like fraud and data breaches.
  • The challenges of adopting decentralized systems, including building infrastructure, creating regulations, and educating users.
  • Practical steps for businesses to start using decentralized identity while working with their current systems
Moderator: Kaliya Young, Founding Partner, Identity Woman
Dino Cataldo Dellaccio, Chief Information Officer, UN Joint Staff Pension Fund
Sep 1111:20
Conference pass

Identity at the border: How will technology enhance border protection techniques?

Identity Innovations in Travel
  • Explore how technology enhances identity verification and strengthens security at ports and border crossings.
  • Discuss the role of biometrics, digital credentials, and automation in streamlining immigration and customs processes.
  • Examine strategies to balance border security with efficiency and traveller convenience.
  • Gain insights from U.S. and international leaders on the challenges and innovations shaping border management.
Sep 1111:20
Conference pass

Modeling users: Best practices

Seminar Theatre B

When we engage with customers at FusionAuth, one question we consistently are asked is: "How should we model our users in our CIAM system?"

This architectural decision shapes everything from user experience to system security.

In this talk, I’ll explore three CIAM user modeling approaches:

  • Tenant-based modeling
  • Application-based modeling
  • Organization-based modeling

We'll dissect the advantages and limitations of each approach, provide a decision framework to select the right model for your requirements, and reveal practical techniques for guiding users to the correct authentication pathway before they ever log in.

At the end of this talk, you’ll know how to pick the right user modeling approach for your authentication needs.

Sep 1111:20
Conference pass

Reviewing modern credential security

Documents and Credentials
  • Debunk counterfeiting myths and solutions.
  • Develop cutting-edge technologies for secure credentials.
  • Expand the knowledge of security features and common fraud/deception with training programmes and biometrics.
  • How can law enforcement agencies react to agile security document fraud?
  • Identify areas for new inter-agency cooperation regarding security documents.
Sep 1111:40
Conference pass

Zero friction verification

Seminar Theatre A
Sep 1111:50
Conference pass

Digital identity at the border: What it means for you, me, and global travel

Identity Innovations in Travel
Sep 1111:50
Conference pass

State endorsed digital identity framework: What steps remain for digital credentials to meet SEDI standards?

Identity and Cyber

During the 2025 legislative session, Utah passed landmark legislation—S.B. 260—establishing the State Endorsed Digital Identity (SEDI) framework. Since then, SEDI has fueled ongoing discussions about Verifiable Digital Credentials and their role in government services, with a strong emphasis on protecting individual privacy. Learn how SEDI is intended to function, and why the Utah Legislature has made it clear that, despite the presence of various digital credentials in the state, none currently meet the achieveable standards set by SEDI.

Sep 1112:10
Conference pass

Roundtable discussions

Roundtables
Roundtable 1: Streamlining Identity Verification: Leveraging Mobile Technology in Law Enforcement [OVD Kinegram]
Roundtable 2: Red Cards vs. Red Tape: Will Border Bureaucracy Bench World Cup Fans in 2026? [Entrust]
Roundtable 3: Beyond the Checkpoint: Biometrics for Seamless Security, Passenger Convenience, and Operational Efficiency [iProov]
Roundtable 4: The rocky road to identity resilience [Semperis]
Roundtable 5: Identity Reimagined: Embracing Digital IDs [Ernst & Young]
Roundtable 9: Vouched
Sep 1114:00
Conference pass

Document anti-counterfeiting presentation

Documents and Credentials
Robert Celeste, Executive Director, Open Credentialing Initiative
Sep 1114:00
Conference pass

How will decentralized identity shape the future of identity management?

Identity and Cyber
Sep 1114:00
Conference pass

Innovations in cybersecurity: bolstering protection amidst an increase in cybercrime

Identity and Cyber
Sep 1114:00
Conference pass

MFA attacks and MFA hygiene - Becoming less of an easy target

Access Management and Authentication
Sep 1114:00
Conference pass

The journey towards frictionless: How is the aviation industry improving the onboarding experience?

Identity Innovations in Travel
  • Explore digital transformation in airports to enhance passenger experiences through seamless identity verification and biometrics.
  • Discuss innovations like touchless check-ins, automated security processes, and streamlined border controls.
  • Highlight how technology reduces wait times, improves efficiency, and balances security with convenience.
  • Examine the global impact of frictionless travel solutions on the future of the aviation industry.
Moderator: Annet Steenbergen, Independent advisor Digital Identity (Wallets) and travel, independent
Ryan Propis, Vice President, Security and Facilitation, U.S. Travel Association
Session led by: Muehlbauer Group
Sep 1114:10
Conference pass

Seminar Presentation: Vouched

Seminar Theatre B
Sep 1114:20
Conference pass

Anti-counterfeiting: What trends and methods are the biggest threat?

Documents and Credentials
  • Detect and preventing document forgery.
  • Addressing digital document fraud and new developments.
  • Briefing on new efforts to combat document fraud.
  • Examine the increasing use of biometrics (e.g., fingerprints, facial recognition) to strengthen identity verification and combat identity fraud.
  • Discuss the evolution of counterfeiting detection across a variety of governments.
  • Examine the impact of counterfeit documents on migratory populations.
Sep 1114:20
Conference pass

How will decentralized identity serve the future of personal identity management?

Identity and Cyber
  • How decentralized identity gives people more control over their personal data and improves privacy by reducing reliance on big databases.
  • The potential of decentralized identity to enable secure and seamless identification across borders and industries.
  • Will decentralized identity enhance security by using cryptography, minimizing risks like fraud and data breaches?
  • The challenges of adopting decentralized systems, including building infrastructure, creating regulations, and educating users.
  • Practical steps for businesses to start using decentralized identity while working with their current systems.
Dino Cataldo Dellaccio, Chief Information Officer, UN Joint Staff Pension Fund
Moderator: Kaliya Young, Founding Partner, Identity Woman
Sep 1114:20
Conference pass

MFA and zero trust: The future of access management?

Access Management and Authentication
  • Learn how multi-factor authentication (MFA) strengthens identity verification and serves as a cornerstone of Zero Trust strategies.
  • Identify challenges in implementing Zero Trust and MFA, including user resistance, legacy system integration, and scalability.
  • Examine next-generation MFA solutions, such as biometrics and passkeys, and their role in enhancing Zero Trust security.
  • Discuss the balance between robust security measures and maintaining a seamless user experience in Zero Trust environments.
  • Explore real-world examples and lessons learned from organizations adopting Zero Trust and MFA to protect sensitive data and systems.
Moderator: Stephen Hutchinson, Director of Security Architecture, Mitsubishi U.F.J. Financial Group
Louis Eichenbaum, Program Manager, U.S. Department of the Interior
Ken Robertson, Assistant Vice President, Principal Information Security Engineer, Fifth Third Bank
Sep 1114:20
Conference pass

Threat assessment: evaluating the latest technological innovations being used in cybercrime

Identity and Cyber
  • Explore how AI strengthens cybersecurity through threat detection, response automation, and predictive analytics.
  • Address risks of AI misuse in cyberattacks, including identity fraud and deepfakes.
  • Examine the role of AI in securing digital identity ecosystems and protecting personal data.
  • Balance innovation and ethics: preventing bias and ensuring transparency in AI-powered security tools.
  • Collaborate across sectors to harness AI's potential while mitigating emerging cybersecurity threats.
Sep 1114:30
Conference pass

Frictionless travel data reimagined: From booking to baggage

Identity Innovations in Travel

In this talk, we’ll explore how legacy travel metrics—many built for a different era—can be reexamined and reimagined to meet the needs of today’s frictionless travel expectations. By understanding the original purpose behind established data points, we can identify what still serves us, what needs to evolve, and where new insights can emerge. We'll focus on three key phases of the journey:pre-travel, examining booking data and how user intent can be better captured;at the airport, looking at virtual agents and redefining how we measure success beyond deflection rates; andpost-travel, where we’ll unpack baggage handling metrics like “time to customer” to reveal hidden friction. Through this lens, we’ll discuss how to build more adaptive, customer-centric feedback loops that allow our data to grow as fast as traveler expectations.

Scott Smith, Director, Global Airport Operations Performance & Execution, United Airlines
Sep 1115:30
Conference pass

Non-human identities: What does enterprise architecture look like in the automated age?

Access Management and Authentication
  • Assess the rise in use cases for NHIs and the new security concerns that are raised by this.
  • Review the validity of zero trust models for NHIs to prevent compromised assets becoming a threat.
  • Explore what the future looks like for NHI usage across different industries and sectors.
  • Where are the best use cases that demonstrate NHIs enhancing existing enterprise architecture systems?
  • How will sentient NHIs, such as agentic AI operators, increase security risks pertaining to user authentication and verification?
Sep 1115:30
Conference pass

Physical documents in a digital world

Documents and Credentials
  • Discuss the momentum behind the shift to digital documentation.
  • Weigh up the pros and cons of digitizing sensitive documents.
  • Are there examples of documents that must remain physical? What security concerns exist surrounding digital documentation?
  • How can we create a seamless process for digitization of physical documents such as birth certificates?
  • What are the best use cases for adopting digital frameworks and standards when transferring documents.
Sep 1115:30
Conference pass

Reviewing enhancements made in DNA testing

Identity Innovations in Travel
  • Explore DNA as a unique biometric identifier and how it differs from other biometrics in accuracy and application.
  • Examine applications of DNA in security and identification, including law enforcement, border control, and disaster victim identification.
  • Highlight technological advances such as rapid DNA sequencing and its potential for real-time verification.
  • Address ethical and privacy challenges, including consent, data ownership, and the risk of genetic profiling.
  • Discuss future integration, focusing on scalability, cost, and the role of DNA in next-generation biometric systems.
Moderator: Suzanne Smalley, Digital privacy and cybersecurity reporter, The Record from Recorded Future News
Susan Welti, DNA Technical Leader, Montgomery County, MD Crime Lab
Sep 1115:30
Conference pass

Trust and Safety panel

Identity and Cyber
  • Address online threats like fraud and identity theft in digital identity systems.
  • Balance user privacy with platform security in digital identity and fraud prevention.
  • Leverage AI and machine learning to enhance identity verification and content moderation.
  • Create transparent and accountable systems for identity verification and content moderation.
  • Collaborate with industry, law enforcement, and regulators to maintain a trusted digital identity ecosystem.
  • Discuss developments in age verification software.
Moderator: Iain Corby, Executive Director, Age Verification Providers Association
Sep 1116:00
Conference pass

Ethical AI: How should agentic AI be tailored to match a user's ethical considerations?

Access Management and Authentication
Sep 1116:00
Conference pass

Is zero trust a necessity with the rise of AI?

Identity and Cyber
last published: 11/Jul/25 11:25 GMT

 

GET INVOLVED AT IDENTITY WEEK AMERICA

 

 

TO SPONSOR


Sophia Farwell

s.farwell@sciencemediapartners.com

 

 

TO SPEAK


Francis Wright

frank.wright@terrapinn.com

 

 

MARKETING & PRESS


Rob Arrenberg 

r.arrenberg@sciencemediapartners.com