Create your personal agenda –check the favourite icon
With identity-related breaches a continuous threat, the business impact of handling identity correctly has never been more vital. Of organizations surveyed in 2024, 93% of identity stakeholders said that security outcomes could have lessened the business impact of incidents. With the increasing number of identities and attackers stepping up their game, enterprises must ensure that all identities (human and non-human) are protected. In this session, you will see the results of an exploration into the current state of cybersecurity. IDSA commissioned this study with Dimensional Research to discover approaches large companies take toward security and identity.
In today's digital landscape, government agencies, regulated industries, and enterprises face increasing challenges in securing user authentication, email signing, and document signing.
Join HID's expertsfor an insightful presentation on how our cutting-edge PKI-as-a-Service (PKIaaS) and Credential Management Solutions can transform your cybersecurity infrastructure, enabling seamless userauthentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements.
In this presentation, we will:
The digital world is built on trust, but that trust is fragmented. On one side, traditional Identity and Access Management (IAM) governs human authentication and authorization. On the other, Public Key Infrastructure (PKI) quietly underpins machine identities, secure communications, and cryptographic trust. These two forces have operated in silos for too long—but in an era of evolving cyber threats and the looming impact of quantum computing, they need each other more than ever.
This session brings IAM and PKI together, demonstrating how their integration is essential to fortifying security, automating risky manual processes, and ensuring long-term resilience. As non-human identities explode across IoT, AI, and software, and as quantum advancements threaten traditional cryptography, organizations must bridge the divide to build a unified, adaptable security foundation.
Join us to discover:
PKI and IAM must work together—and only by uniting them can we build the trusted digital future our world demands.
In a world where first impressions happen online, the login screen has become your brand’s front door and identity is the key. But too often, businesses treat Customer Identity and Access Management (CIAM) as just a backend function.
In this fast-paced session, we’ll explore how modern identity platforms can do more than just authenticate users—they can reduce friction, detect fraud before it happens, and unlock real-time insights that improve ROI, CX, and security outcomes.
You’ll learn:
If you think identity is just an IT problem, think again. This session will change how you see your sign-in flow—and show how CIAM can drive growth across your business.
This session will provide an overview of the current Mobile Driver License (mDL) landscape, including updates on active programs, the AAMVA Digital Trust Service, new state and jurisdiction participation, Relying Party engagement, and AAMVA’s broader role in identity management.
Identity and access management is central to every Identity Week attendee’s role. This session offers a practical, forward-looking approach to modernizing IGA using Activity Driven Intelligence—real-time user behavior and access activity—beyond static data. It aligns with Identity Week’s focus on automation, integration, and continuous security, sharing real customer insights over theory.
You’ve heard that identity is at the core of cybersecurity. That makes identity threat detection and response (ITDR) the foundation of a resilient business. But navigating decades of configuration creep and the complexities of hybrid Active Directory/Entra ID environments make for a daunting task. Here are 5 simple steps you can take now to improve your identity security and boost your business’ ability to survive and thrive despite a volatile threat landscape.
Digital identity is rapidly emerging as a cornerstone of modern digital public infrastructure, key to fast-tracking government digital transformation. Achieving this vision demands a robust technological foundation—one that is scalable, interoperable, and adaptable to diverse policy and operational environments. In this session, we’ll examine how digital identity orchestration is driving tangible outcomes for governments and their constituents through real-world implementations. We’ll cover the role of digital identity in eGovernment, key challenges in the digital ecosystem, and essential frameworks and building blocks for secure, scalable citizen-centric solutions.
Since 9/11, air travel has operated under a heightened mandate for security—often at the expense of passenger convenience and operational efficiency. But today, with the rise of facial biometrics, airports and border agencies are proving that it’s possible to achieve world-class security and a smooth, stress-free traveler experience—while also empowering frontline officers to focus on what matters most.
This session explores how modern biometric technologies, including privacy-first solutions from iProov, are transforming the airport journey. Attendees will learn:
Step into the future of payments, where biometrics are redefining the transaction landscape. This session uncovers the pivotal role of biometric technology in enhancing payment security while delivering an unparalleled consumer experience. Discover the core of identity validation and learn how seamless authentication processes are effectively combating fraud. Engage with J.P. Morgan’s Prashant Sharma as he showcases cutting-edge innovations in identity verification, transforming checkout experiences into secure, effortless interactions. Join us to explore how identity-driven payments are setting new standards for security and convenience in the digital age.
While reusable identity (RPs) is already reshaping how the private sector handles identity, financial institutions still face a chicken-and-egg challenge: how to modernize verification without falling out of step with regulators. This session explores how RPs—cryptographically derived, privacy-preserving credentials—can address that gap. By building on trusted standards like mobile driver’s licenses and enabling individuals to carry secure, pre-verified identity data, banks can enhance fraud detection, reduce redundancy, and improve financial access for marginalized groups. We’ll demystify common misconceptions, examine case studies from early adopters, and highlight how custodial approaches like Persona’s align with priorities from agencies like FinCEN, OCC, and FDIC—offering a path toward more secure, compliant, and inclusive identity infrastructure.
Join us as we dive into insider threats and the techniquesthat can be used to uncover what is really going on insider your enterprise.
With global air travel projected to reach 8 billion passengers annually by 2040, the need for faster, safer, and more seamless border experiences has never been greater. In this session, we will explore how facial recognition technology is revolutionizing the way we cross borders — enhancing security, streamlining immigration processes, and redefining the traveler experience. From biometric eGates to AI-powered identity verification, we’ll dive into real-world implementations, emerging innovations, and the ethical considerations that come with this digital shift. Join HID as we uncover how facial recognition is not only changing how we travel, but also reshaping the very concept of borders in an increasingly connected world.
Biometric technologies such as facial recognition offer transformative potential but when mishandled can lead to exclusion and privacy challenges. This presentation lays out a framework for ethical biometrics, prioritizing inclusive design, fairness, accessibility, privacy, governance, and trust, and concluding by offering actionable insights for designing and evaluating inclusive, trustworthy biometric systems.
Fraudsters now operate at machine speed. Soups Ranjan will strip away the buzzwords and map the real battlefield:
Attendees leave with a two-minute diagnostic they can run on their own orgs Monday morning and a playbook for aligning fraud, risk, and product teams around real-time signals designed to catch the most sophisticated synthetic IDs.
Financial institutions are facing increasing pressure to provide seamless digital experiences while adhering to strict regulatory compliance. This session examines how reusable business identity can support both objectives by facilitating efficient and secure interactions across markets and platforms, helping organizations streamline compliance, expedite onboarding, and reduce fraud across jurisdictions.
You’ve heard of CIAM. You’ve implemented WIAM. But are you ready for the next evolution in identity? MeetAIAM—Agentic Identity and Access Management—where identities aren’t just managed, they think, act, and adapt.
As AI systems evolve from passive tools to autonomous agents, a new security paradigm is emerging. Many GenAI systems claim autonomy, but true Agentic AI exhibits goal-directed behavior, memory, planning, and the ability to act independently across systems. This session begins by clarifying what Agentic AI really is—and why that distinction matters.
We’ll then explore how IAM must evolve to support Agentic AI. Attendees will learn how emerging protocols likeOAuth 2.1,MCP (Model Context Protocol), andACP (Agent Communication Protocol)are enabling:
This presentation will explore AI-driven deepfakes in fraudulent activities. We'll cover what deepfakes are, how they're used by malicious actors in scams like CFO fraud, and showcase a few typical attacks. We'll discuss methods for detecting these sophisticated fakes—both human observation and AI-powered "agent detection"—and provide actionable strategies to enhance employee resilience and protect your organization.
Create your personal agenda –check the favourite icon
National security has taken center stage across the world; now is the opportunity for biometrics to make the case for efficiency, accuracy, safety, and speed. Iris ID has 25-year history of developing and researching cutting edge technologies and solutions using iris recognition. This presentation explores how iris biometrics can deliver reliable identity verification and authentication—enhancing border control efficiency while upholding the highest security standards. I’ll delve into how this non-invasive, high-precision technology works, its advantages over other biometric methods, and showcase real-world deployment case studies.
Two-Factor Authentication (2FA) has been essential but often causes friction, impacts user experience, and is vulnerable to social engineering attacks. CAMARA Network Powered Digital Solutions, developed by GSMA and the Linux Foundation, offers a seamless alternative with Number Verification and Silent Authentication. This technology enables secure, frictionless authentication directly through mobile network operators, eliminating the need for OTPs and reducing vulnerabilities.
This session highlights how Silent Authentication is transforming digital authentication, prioritizing both security and user experience.
Learn how commercial and government entities are verifying driver's license and identification card information against department of motor vehicle data. AAMVA’s Driver License Data Verification (DLDV) service is a tool being used to combat synthetic identity fraud through real-time data verification.
Modern identity systems authenticate users with advanced identity, encryption, and communication technologies. Despite these advancements, how do digital identity solutions affect their users’ personal privacy?
Traditional IAM protects users within closed ecosystems. Federated architectures extend centralized identity to external relying parties, but often with a ‘phone home’ verification mechanism that can be used to track users. Decentralized Identity helps platform providers overcome these problems through peer-to-peer identifiers and verification methods that don’t require issuer participation whenever users present their digital identities.
This presentation will:
When we engage with customers at FusionAuth, one question we consistently are asked is: "How should we model our users in our CIAM system?"
This architectural decision shapes everything from user experience to system security.
In this talk, I’ll explore three CIAM user modeling approaches:
We'll dissect the advantages and limitations of each approach, provide a decision framework to select the right model for your requirements, and reveal practical techniques for guiding users to the correct authentication pathway before they ever log in.
At the end of this talk, you’ll know how to pick the right user modeling approach for your authentication needs.
During the 2025 legislative session, Utah passed landmark legislation—S.B. 260—establishing the State Endorsed Digital Identity (SEDI) framework. Since then, SEDI has fueled ongoing discussions about Verifiable Digital Credentials and their role in government services, with a strong emphasis on protecting individual privacy. Learn how SEDI is intended to function, and why the Utah Legislature has made it clear that, despite the presence of various digital credentials in the state, none currently meet the achieveable standards set by SEDI.
Create your personal agenda –check the favourite icon
With identity-related breaches a continuous threat, the business impact of handling identity correctly has never been more vital. Of organizations surveyed in 2024, 93% of identity stakeholders said that security outcomes could have lessened the business impact of incidents. With the increasing number of identities and attackers stepping up their game, enterprises must ensure that all identities (human and non-human) are protected. In this session, you will see the results of an exploration into the current state of cybersecurity. IDSA commissioned this study with Dimensional Research to discover approaches large companies take toward security and identity.
In today's digital landscape, government agencies, regulated industries, and enterprises face increasing challenges in securing user authentication, email signing, and document signing.
Join HID's expertsfor an insightful presentation on how our cutting-edge PKI-as-a-Service (PKIaaS) and Credential Management Solutions can transform your cybersecurity infrastructure, enabling seamless userauthentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements.
In this presentation, we will:
The digital world is built on trust, but that trust is fragmented. On one side, traditional Identity and Access Management (IAM) governs human authentication and authorization. On the other, Public Key Infrastructure (PKI) quietly underpins machine identities, secure communications, and cryptographic trust. These two forces have operated in silos for too long—but in an era of evolving cyber threats and the looming impact of quantum computing, they need each other more than ever.
This session brings IAM and PKI together, demonstrating how their integration is essential to fortifying security, automating risky manual processes, and ensuring long-term resilience. As non-human identities explode across IoT, AI, and software, and as quantum advancements threaten traditional cryptography, organizations must bridge the divide to build a unified, adaptable security foundation.
Join us to discover:
PKI and IAM must work together—and only by uniting them can we build the trusted digital future our world demands.
In a world where first impressions happen online, the login screen has become your brand’s front door and identity is the key. But too often, businesses treat Customer Identity and Access Management (CIAM) as just a backend function.
In this fast-paced session, we’ll explore how modern identity platforms can do more than just authenticate users—they can reduce friction, detect fraud before it happens, and unlock real-time insights that improve ROI, CX, and security outcomes.
You’ll learn:
If you think identity is just an IT problem, think again. This session will change how you see your sign-in flow—and show how CIAM can drive growth across your business.
This session will provide an overview of the current Mobile Driver License (mDL) landscape, including updates on active programs, the AAMVA Digital Trust Service, new state and jurisdiction participation, Relying Party engagement, and AAMVA’s broader role in identity management.
Identity and access management is central to every Identity Week attendee’s role. This session offers a practical, forward-looking approach to modernizing IGA using Activity Driven Intelligence—real-time user behavior and access activity—beyond static data. It aligns with Identity Week’s focus on automation, integration, and continuous security, sharing real customer insights over theory.
You’ve heard that identity is at the core of cybersecurity. That makes identity threat detection and response (ITDR) the foundation of a resilient business. But navigating decades of configuration creep and the complexities of hybrid Active Directory/Entra ID environments make for a daunting task. Here are 5 simple steps you can take now to improve your identity security and boost your business’ ability to survive and thrive despite a volatile threat landscape.
Digital identity is rapidly emerging as a cornerstone of modern digital public infrastructure, key to fast-tracking government digital transformation. Achieving this vision demands a robust technological foundation—one that is scalable, interoperable, and adaptable to diverse policy and operational environments. In this session, we’ll examine how digital identity orchestration is driving tangible outcomes for governments and their constituents through real-world implementations. We’ll cover the role of digital identity in eGovernment, key challenges in the digital ecosystem, and essential frameworks and building blocks for secure, scalable citizen-centric solutions.
Since 9/11, air travel has operated under a heightened mandate for security—often at the expense of passenger convenience and operational efficiency. But today, with the rise of facial biometrics, airports and border agencies are proving that it’s possible to achieve world-class security and a smooth, stress-free traveler experience—while also empowering frontline officers to focus on what matters most.
This session explores how modern biometric technologies, including privacy-first solutions from iProov, are transforming the airport journey. Attendees will learn:
Step into the future of payments, where biometrics are redefining the transaction landscape. This session uncovers the pivotal role of biometric technology in enhancing payment security while delivering an unparalleled consumer experience. Discover the core of identity validation and learn how seamless authentication processes are effectively combating fraud. Engage with J.P. Morgan’s Prashant Sharma as he showcases cutting-edge innovations in identity verification, transforming checkout experiences into secure, effortless interactions. Join us to explore how identity-driven payments are setting new standards for security and convenience in the digital age.
While reusable identity (RPs) is already reshaping how the private sector handles identity, financial institutions still face a chicken-and-egg challenge: how to modernize verification without falling out of step with regulators. This session explores how RPs—cryptographically derived, privacy-preserving credentials—can address that gap. By building on trusted standards like mobile driver’s licenses and enabling individuals to carry secure, pre-verified identity data, banks can enhance fraud detection, reduce redundancy, and improve financial access for marginalized groups. We’ll demystify common misconceptions, examine case studies from early adopters, and highlight how custodial approaches like Persona’s align with priorities from agencies like FinCEN, OCC, and FDIC—offering a path toward more secure, compliant, and inclusive identity infrastructure.
Join us as we dive into insider threats and the techniquesthat can be used to uncover what is really going on insider your enterprise.
With global air travel projected to reach 8 billion passengers annually by 2040, the need for faster, safer, and more seamless border experiences has never been greater. In this session, we will explore how facial recognition technology is revolutionizing the way we cross borders — enhancing security, streamlining immigration processes, and redefining the traveler experience. From biometric eGates to AI-powered identity verification, we’ll dive into real-world implementations, emerging innovations, and the ethical considerations that come with this digital shift. Join HID as we uncover how facial recognition is not only changing how we travel, but also reshaping the very concept of borders in an increasingly connected world.
Biometric technologies such as facial recognition offer transformative potential but when mishandled can lead to exclusion and privacy challenges. This presentation lays out a framework for ethical biometrics, prioritizing inclusive design, fairness, accessibility, privacy, governance, and trust, and concluding by offering actionable insights for designing and evaluating inclusive, trustworthy biometric systems.
Fraudsters now operate at machine speed. Soups Ranjan will strip away the buzzwords and map the real battlefield:
Attendees leave with a two-minute diagnostic they can run on their own orgs Monday morning and a playbook for aligning fraud, risk, and product teams around real-time signals designed to catch the most sophisticated synthetic IDs.
Financial institutions are facing increasing pressure to provide seamless digital experiences while adhering to strict regulatory compliance. This session examines how reusable business identity can support both objectives by facilitating efficient and secure interactions across markets and platforms, helping organizations streamline compliance, expedite onboarding, and reduce fraud across jurisdictions.
You’ve heard of CIAM. You’ve implemented WIAM. But are you ready for the next evolution in identity? MeetAIAM—Agentic Identity and Access Management—where identities aren’t just managed, they think, act, and adapt.
As AI systems evolve from passive tools to autonomous agents, a new security paradigm is emerging. Many GenAI systems claim autonomy, but true Agentic AI exhibits goal-directed behavior, memory, planning, and the ability to act independently across systems. This session begins by clarifying what Agentic AI really is—and why that distinction matters.
We’ll then explore how IAM must evolve to support Agentic AI. Attendees will learn how emerging protocols likeOAuth 2.1,MCP (Model Context Protocol), andACP (Agent Communication Protocol)are enabling:
This presentation will explore AI-driven deepfakes in fraudulent activities. We'll cover what deepfakes are, how they're used by malicious actors in scams like CFO fraud, and showcase a few typical attacks. We'll discuss methods for detecting these sophisticated fakes—both human observation and AI-powered "agent detection"—and provide actionable strategies to enhance employee resilience and protect your organization.
Create your personal agenda –check the favourite icon
National security has taken center stage across the world; now is the opportunity for biometrics to make the case for efficiency, accuracy, safety, and speed. Iris ID has 25-year history of developing and researching cutting edge technologies and solutions using iris recognition. This presentation explores how iris biometrics can deliver reliable identity verification and authentication—enhancing border control efficiency while upholding the highest security standards. I’ll delve into how this non-invasive, high-precision technology works, its advantages over other biometric methods, and showcase real-world deployment case studies.
Two-Factor Authentication (2FA) has been essential but often causes friction, impacts user experience, and is vulnerable to social engineering attacks. CAMARA Network Powered Digital Solutions, developed by GSMA and the Linux Foundation, offers a seamless alternative with Number Verification and Silent Authentication. This technology enables secure, frictionless authentication directly through mobile network operators, eliminating the need for OTPs and reducing vulnerabilities.
This session highlights how Silent Authentication is transforming digital authentication, prioritizing both security and user experience.
Learn how commercial and government entities are verifying driver's license and identification card information against department of motor vehicle data. AAMVA’s Driver License Data Verification (DLDV) service is a tool being used to combat synthetic identity fraud through real-time data verification.
Modern identity systems authenticate users with advanced identity, encryption, and communication technologies. Despite these advancements, how do digital identity solutions affect their users’ personal privacy?
Traditional IAM protects users within closed ecosystems. Federated architectures extend centralized identity to external relying parties, but often with a ‘phone home’ verification mechanism that can be used to track users. Decentralized Identity helps platform providers overcome these problems through peer-to-peer identifiers and verification methods that don’t require issuer participation whenever users present their digital identities.
This presentation will:
When we engage with customers at FusionAuth, one question we consistently are asked is: "How should we model our users in our CIAM system?"
This architectural decision shapes everything from user experience to system security.
In this talk, I’ll explore three CIAM user modeling approaches:
We'll dissect the advantages and limitations of each approach, provide a decision framework to select the right model for your requirements, and reveal practical techniques for guiding users to the correct authentication pathway before they ever log in.
At the end of this talk, you’ll know how to pick the right user modeling approach for your authentication needs.
During the 2025 legislative session, Utah passed landmark legislation—S.B. 260—establishing the State Endorsed Digital Identity (SEDI) framework. Since then, SEDI has fueled ongoing discussions about Verifiable Digital Credentials and their role in government services, with a strong emphasis on protecting individual privacy. Learn how SEDI is intended to function, and why the Utah Legislature has made it clear that, despite the presence of various digital credentials in the state, none currently meet the achieveable standards set by SEDI.