Identiverse - A CRA Resource
Identiverse - A CRA Resource
  • 722
  • 344 063
Building Radiant AI: Lessons Learned on Applying Large Language Models in Identity
Generative AI, with its capabilities in analyzing data and behavior, presents a promising solution to improve identity and access risk management. Large Language Models (LLMs) are a generational leap for understanding risks and detecting data anomalies. However, they also suffer from issues including hallucinations, privacy, and data protection-blocking many use cases.
This webinar will address the integration of LLMs to streamline access governance processes and reduce risk management, including real-world applications, commercial and open source LLM options, and common integration patterns.
zhlédnutí: 48

Video

Ceremonies
zhlédnutí 32Před 21 dnem
Speaker: Ian Glazer - Co-Founder and Board Emeritus - IDPro Date: Wednesday, May 31, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this ceremony over and over, day a...
Zero Trust Architecture for B2C Identity at General Motors
zhlédnutí 54Před 21 dnem
Speaker: Andrew Cameron - IT Fellow, Identity and Access Management - GM Date: Wednesday, May 31, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: While GM continues to innovate towards an "All EV reality," the importance of securing the digital experience of its customers remains a key priority. We all know that strong identity is at the core of...
Bringing National Australia Bank’s Digital Identity to Life: From Ideation to Market Launch
zhlédnutí 32Před 21 dnem
Speakers: Rick Iversen - Australian Payments Plus; Natalie Reed - Deloitte Australia; & Linden Dawson - National Australia Bank Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: In developing customer digital identity for a large enterprise, there is often a long and winding journey to success. Join identity industry profes...
The Laws of Identity in the Era of Ubiquitous Identity
zhlédnutí 43Před 21 dnem
Speaker: Nat Sakimura - Chairman - OpenID Foundation Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: The laws of identity (2005) are a set of fundamental principles for building identity systems, and successful protocols like OpenID Connect were designed taking account of it. They are also closely related to the OECD Priv...
Microsoft Presents The Imperative to Modernize - Saying Goodbye to ADFS and Going Beyond AD
zhlédnutí 25Před 21 dnem
Speakers: TJ Cutting - Microsoft & David Gregory - Microsoft Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: Cloud is the driving force powering digital transformation today, but there is no one size fits all cloud strategy. Most organizations are working to enable access anywhere, yet, these initiatives often don’t scale...
How Much Data Do You Really Need to Collect to Know Your Customer
zhlédnutí 19Před 21 dnem
Speaker: Mr. Denny Prvu - Global Director of Identity and Access Management - RBC Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: This presentation will provide an overview of the types of data and how they can be used for not only user identity proofing, personalization and authorization, but also for user consent models...
IDMWORKS Presents Modernizing your Customer IAM Capabilities
zhlédnutí 25Před 21 dnem
Speaker: Nick Hunt - Director IAM Delivery - IDMWORKS Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: Everyone has Digital Transformation and modernization strategies to address changing needs, rebranding, and focusing growing their business. But, Consumer IAM projects to support this either fall short or are point soluti...
Beyond Trust Presents the 2023 Microsoft Vulnerabilities Report - Dissected
zhlédnutí 21Před 21 dnem
Speaker: Morey Haber - Chief Security Officer - BeyondTrust Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: Morey Haber, CSO will examine how the past ten years of vulnerability trends, along with today’s technologies, like cloud and AI, collectively influence how we should think about cybersecurity and risk management in...
Tilting at White Towers Making Your Identity Architecture Actionable
zhlédnutí 9Před 21 dnem
Speaker: Stephen Hutchinson - Director of Security Architecture - Mitsubishi Bank of Tokyo Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: As an identity professional, you're constantly studying and reviewing new technologies, new protocols, and new products within the space but you struggle for the best way to extract th...
Create your Identity Strategy for Building a Solid Foundation to Enforce Zero Trust Principles
zhlédnutí 17Před 21 dnem
Create your Identity Strategy for Building a Solid Foundation to Enforce Zero Trust Principles
High Security and Interoperable OAuth 2 0 What’s the Latest
zhlédnutí 24Před 21 dnem
High Security and Interoperable OAuth 2 0 What’s the Latest
Authentication Tales from the Field
zhlédnutí 27Před 21 dnem
Authentication Tales from the Field
Radiant Logic Presents: Getting Better Sleep with Analytics Driven Identity Data Management
zhlédnutí 16Před 21 dnem
Radiant Logic Presents: Getting Better Sleep with Analytics Driven Identity Data Management
Crumbling the Cookie Fixing a Weak Link in Authentication on the Web
zhlédnutí 49Před 21 dnem
Speaker: Zachary Voase - Senior Security Software Engineer - Netflix Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: WebAuthn, OAuth 2.0, passkeys, ... the list goes on. We've never had so many tools to securely establish user and application identity while maintaining privacy and convenience. But we risk turning back the...
Radiant Logic Presents How to Tackle the 4 C's on Your Road to Zero Trust
zhlédnutí 37Před 21 dnem
Speaker: Wade Ellery - Field Chief Technology Officer - Radiant Logic Date: Thursday, June 1, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: From Presidential mandates to C-Level decrees, the call to start the Journey to Zero Trust has sounded. But, less than 1% of enterprises today have a mature Zero Trust program in place, which means most id...
Realizing Universal Citizen-Centric Identity
zhlédnutí 15Před 21 dnem
Speaker: Elizabeth Garber - IDPartner & Mark Haine - OpenID Foundation Date: Wednesday, May 31, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: International digital identity infrastructures underpin the goals of governments, intergovernmental agencies (e.g., United Nations' sustainable development goals), and private industry alike. At a human ...
QOMPLX Presents: The Whole Nine Yards: Establish a Comprehensive Identity Security Stack
zhlédnutí 7Před 21 dnem
Speakers: Derek Melber - QOMPLX, Inc. Date: Wednesday, May 31, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: Nearly 90% of all attacks include or target identity specifically. This has made identity the new security perimeter. It also means that a new look at securing identities is required, to ensure that all identity is protected, on-premise...
Amazon Web Services: A Journey to First-Class, Personalized CIAM, Featuring Neiman Marcus Group
zhlédnutí 56Před 21 dnem
Speakers: Marc von Mandel - Amazon Web Services & Sriram Vaidyanthan - Neiman Marcus Group Date: Wednesday, May 31, 2023 Location: ARIA Resort & Casino | Las Vegas, NV #identiverse2023 identiverse.com Description: What does it take to make every customer interaction unforgettable? It starts with a hallmark customer experience. That's what Neiman Marcus Group did when they chose AWS for cloud-na...
How Hyatt is Driving Exceptional Customer Experiences with Modern FIDO Passwordless Authentication
zhlédnutí 25Před 21 dnem
How Hyatt is Driving Exceptional Customer Experiences with Modern FIDO Passwordless Authentication
1Kosmos Presents Bringing Verified Identity and Passwordless to the Masses
zhlédnutí 14Před 21 dnem
1Kosmos Presents Bringing Verified Identity and Passwordless to the Masses
Mind the Gap in Traditional Security: ITDR and Where It Fits in Your Identity Security Stack
zhlédnutí 15Před 21 dnem
Mind the Gap in Traditional Security: ITDR and Where It Fits in Your Identity Security Stack
Ping Identity Presents: Faster User Experiences with Orchestration
zhlédnutí 18Před 21 dnem
Ping Identity Presents: Faster User Experiences with Orchestration
Transmit Security: Build a Robust New Account Opening Experience Without Compromising on Security
zhlédnutí 23Před 21 dnem
Transmit Security: Build a Robust New Account Opening Experience Without Compromising on Security
Identity as a Revenue Driver Tales from the Product Side of Identity
zhlédnutí 58Před 21 dnem
Identity as a Revenue Driver Tales from the Product Side of Identity
QOMPLX Presents - Hybrid Active Directory Attacks Anatomy and Defenses
zhlédnutí 19Před 21 dnem
QOMPLX Presents - Hybrid Active Directory Attacks Anatomy and Defenses
The Silent Scream of Every Network: The Horror that is Hybrid Active Directory Security
zhlédnutí 16Před 21 dnem
The Silent Scream of Every Network: The Horror that is Hybrid Active Directory Security
Seamless and Secure - Give Your Customers the Experience They Deserve
zhlédnutí 17Před 21 dnem
Seamless and Secure - Give Your Customers the Experience They Deserve
Enforcing Consent Conformance in Your Authorization Logic with a Fine-Grained Permissions Model
zhlédnutí 25Před 21 dnem
Enforcing Consent Conformance in Your Authorization Logic with a Fine-Grained Permissions Model
Representing Application Permissions Models via the SCIM 2.0 Roles and Entitlements Attributes
zhlédnutí 65Před 21 dnem
Representing Application Permissions Models via the SCIM 2.0 Roles and Entitlements Attributes

Komentáře

  • @BrightButNeverBurned
    @BrightButNeverBurned Před 15 dny

    Great topic but the presenters are demonstrating things we can't see. Is it expected that we only see the title slide the whole way through? 😢

  • @Ko_Ackerman
    @Ko_Ackerman Před 4 měsíci

    It's a shame we have no visual for the presentation.

  • @blockchainprofessor.x
    @blockchainprofessor.x Před 6 měsíci

    Hope they dub it CIDO. Picked up cido.eth today

  • @JM.TheComposer
    @JM.TheComposer Před 7 měsíci

    When will people finally realise: 1. Passkeys are generally protected by your phone's biometrics, so you lose 5th Amendment protections if Law Enforcement gets your phone and wants access. Biometrics are *not* Protected Speech! Precedent exists for forcing a suspect to unlock via fingerprint. Your PIN is Protected Speech, but you can't hide Passkeys behind a PIN if your screen lock is biometric. 2. Only the Private Key is needed for the FIDO2 Ceremony. Your biometrics release the Key, but the remote server can't truly verify what biometrics were used. So Passkeys are really 1FA, or at best "1.5FA".

  • @StijnHommes
    @StijnHommes Před 7 měsíci

    Passkeys are Here! What Now? Make sure you don't waste 25 minutes of your life watching a video about this nonsense (or worse, watch the speaker deliver it live). Now we need to make sure FIDO is disbanded and put on trial for criminal conspiracy for their plan to break the internet and take away our passwords.

  • @donsheppard9113
    @donsheppard9113 Před 8 měsíci

    Unfortunately your slides did not show in my browser.

  • @lillianwalter2468
    @lillianwalter2468 Před 8 měsíci

    Promo'SM

  • @JM.TheComposer
    @JM.TheComposer Před 9 měsíci

    Finally, someone realizes that passkeys aren't really 2FA.

  • @clintcurrie40
    @clintcurrie40 Před 11 měsíci

    Once we all get chips implanted in our heads, then we will know who I am, who I am, who I am, who I am [slaps self upside the head]. What was I saying? : )

  • @DavidBrossard
    @DavidBrossard Před rokem

    It was an honor and privilege to take part in the closing panel.

  • @jazmynmattie544
    @jazmynmattie544 Před rokem

    𝓟Ř𝔬𝓂𝔬𝐒ϻ 💪

  • @atran2678
    @atran2678 Před rokem

    Proud of you, Arthur!

  • @mvsk6852
    @mvsk6852 Před rokem

    Hello There, thanks for the information. Do we have any video on how to set this OpenID connect with Nginx reverse proxy for SSO

  • @paypal7880
    @paypal7880 Před 2 lety

    You mentioned bearer tokens can be copied and replayed. Isn't that also true for a signed token? If a man in the middle, between the client and the resource server stole the signed token, can he not use it (until the expiry)?

  • @nandinidash7832
    @nandinidash7832 Před 2 lety

    Are you aware of your self-identity or living with misconception? czcams.com/video/KoBxm0FJY3U/video.html

  • @gatty.
    @gatty. Před 2 lety

    My goodness that was a lot of information!

  • @gokhantaskan6225
    @gokhantaskan6225 Před 2 lety

    Thank you for the video!

  • @arianvanputten2908
    @arianvanputten2908 Před 2 lety

    How does this compare to device authorization grant (RFC 8628) ?

  • @lpgalmeida
    @lpgalmeida Před 3 lety

    Next level. Thank you.

  • @BabbaYagga
    @BabbaYagga Před 3 lety

    boring

  • @canelbuino7087
    @canelbuino7087 Před 3 lety

    This guy is proof that not all stoners are burnouts.

    • @gatty.
      @gatty. Před 2 lety

      How come, did he mention he's smoked a fair amount in his past or something? He didn't say anything in his presentation. Either way, good on him for his bright future!

  • @sahilroyal8939
    @sahilroyal8939 Před 3 lety

    Difference between PingID and Ping SDK?

  • @domaincontroller
    @domaincontroller Před 3 lety

    02:21 CSRF 08:22 token leakage 18:48 token reuse/misuse 26:16 question 1

  • @najah68
    @najah68 Před 3 lety

    great talk, great proposal for OAUTH improvement

  • @kierans777
    @kierans777 Před 3 lety

    I'm unable to view the slides. Following the link leads me to "Uploaded SlideShare Suspended"

  • @Vincent-bt4tv
    @Vincent-bt4tv Před 3 lety

    dat face Victorrio. . .

  • @yuliiamaidanova3506
    @yuliiamaidanova3506 Před 4 lety

    Very inspiring and informative video! Our team implemented FIDO2 & WebAuthn in Jira marketplace.atlassian.com/apps/1222257/webauthn-for-jira?hosting=server&tab=overview Looking forward to hearing your thoughts on this)

  • @surensingh123
    @surensingh123 Před 4 lety

    Excellent talk !

  • @kernelfactory7839
    @kernelfactory7839 Před 4 lety

    Not sure I would call PING Federate the "Swiss Army knife". Here are some recent questions we asked the PING consultants: Can PF interface with Identity Manager? "NO" Can PF interface to DataPower API's? "NO" Can PF interface with TopSecret? "No". Pretty dull knife if you ask me.

  • @fritzoscar3847
    @fritzoscar3847 Před 4 lety

    For me, the whole "story telling" is so distracting from the topic I came here to learn about originally.

  • @mprat5673
    @mprat5673 Před 4 lety

    1 year later he wear the same clothe... hahaha czcams.com/video/Bu3e5cFDRdg/video.html

  • @venkateshtheerthala748

    how do i create a pingfederate account?

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    I love how he deep dive into the risk-based authentication. Great video!

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    The talk is so smooth and clear!

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    It was an insightful panel discussion! Thanks for bringing this up to the public guys.

  • @maheshraghavaraju9906

    :)

  • @nasimhazari6971
    @nasimhazari6971 Před 4 lety

    Great explanation! Thanks for sharing.

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    A nice introduction to the CIAM's challenges, but I think you need to explain more about the assessment, blueprint, and roadmap since those are the meat of this talk.

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    I wonder how privacy could have a business model.

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    So far I enjoy the video! So many things I don't know and excited to learn it!

  • @TheRoxas13th
    @TheRoxas13th Před 4 lety

    This is a great introduction! Thanks

  • @jameslatham9805
    @jameslatham9805 Před 4 lety

    That was amazing! This guy really knows his sh*t!

  • @BunniChaithanya
    @BunniChaithanya Před 4 lety

    Great Idea !!

  • @PSingletary
    @PSingletary Před 5 lety

    Hey! :44

  • @vladimirklasnja5430
    @vladimirklasnja5430 Před 5 lety

    Great presentation. Richard is a such a wealth of knowledge. Two thumbs up!

  • @szeredaiakos
    @szeredaiakos Před 5 lety

    So .. if i lost my finger/fingers and/or the key, i fall back to password which i don't remember since i used it 3 years ago, then whats the next? Final fallback? Email? Which is incidentally the main entry point of phishing. And after all that i'll probably be nervous enough not to check the domain a certain mail sends me to. And if i'd be a bad actor, i would still have a bright future ahead of me (especially with this widening of avenues of attack).

    • @fredrikwendt9696
      @fredrikwendt9696 Před 5 lety

      Just spending two weeks going for a swim (summer vacation) is enough to make my fingerprints not be recognized by my phone ...

    • @szeredaiakos
      @szeredaiakos Před 5 lety

      @@fredrikwendt9696 LoL. Is that a thing? Definitely it will be something i look out for. Last summer i did not have any issues with the S9+ fingerprint sensor, yet i did not have my fingers wrinkled to the extreme.

    • @fredrikwendt9696
      @fredrikwendt9696 Před 5 lety

      @@szeredaiakos Summer vacation for me was 4 weeks with swimming/playing in the pool every day. I don't remember when the fingerprint sensor stopped recognizing me, but I know it took about 10 days after I got home before it started working again. Nokia 7+.

  • @petrg.3752
    @petrg.3752 Před 5 lety

    You should learn English, Vittorio. Your presentation is useless

  • @mohitvaish
    @mohitvaish Před 5 lety

    Cool solution to a troublesome issue for so many IAM programs!