Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Identity & Access Management at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2018)

2jbp5wm.jpg?width=750

1. Adventures in Open Banking: Understanding OAuth and OpenID Client Ecosystems

Speaker: Pamela Dingle

What happens when you need to create an open API ecosystem with robust security requirements, in a short period of time, implemented by conservative entities and mandated across the entire EU? Enter the complex world of Open Banking. In this talk, Pam Dingle will unpack the thrills and chills of the standards profiles and security measures that form the OpenID Foundation’s UK Open Banking profile.

>>Go To Presentation

vhx1zc.jpg?width=750

2. Can Blockchain Enable Identity Management?

Speakers: Kurt Lieber, Prakash Sundaresan

Blockchain continues to gain traction in the market place as a compelling solution for making identity and access management (IAM) more cost effective by harnessing the power of distributed members in order to “crowdsource” identity services. This session will review an attempt to prove this hypothesis through a proof-of-concept (POC) built for a not-for-profit healthcare consortium.

>>Go To Presentation

10yjqzq.jpg?width=750

3. Fool Proof: Protecting Digital Identity in the Age of the Data Breach

Speakers: Gregory Crabb, Paul Grassi

In the age of the data breach there are no more secrets. Name, address, date of birth and Social Security number have been the de facto identity attributes for years. But as this information has become more exposed it’s time for organizations to rethink identity proofing and take a more holistic approach to knowing who they are doing business with online.

>>Go To Presentation

11kcwtl.png?width=750

4. Identity-Based Security and Privacy for the Internet of Things

Speaker: Robert Brown

The Internet of Things presents both a challenge and opportunity for identity management - a challenge because existing mechanisms for authentication & authorization must be extended and adapted for the particular constraints of devices (both legacy and new) and an opportunity because the devices that users more and more carry with them offer new abilities to enable a more seamless authentication experience for those users. Both of these aspects demand a consistent, cohesive and interoperable identity layer across IoT verticals, platforms, and protocols. Critically, we need an identity layer that acknowledges the full continuum of risk (and so appropriate security measures) that the IoT presents. Good security means knowing who entities (both device & user) are and what they should or should not be allowed to do. Good privacy requires that users will be able to control how their devices collect, store and share data. This talk will examine how existing & new tools (like OAuth, UMA, FIDO, and DLTs) may help meet these fundamental requirements for securing the IoT.

>>Go To Presentation

316kmlg.png?width=750

5. OAuth 2.0 Threat Landscapes

Speaker: Prabath Siriwardena

OAuth 2.0 is at the heart of OpenID Connect, Mobile Connect, UMA and many other popular standards. Understanding the threat landscapes in OAuth 2.0 is essential in building a secured identity infrastructure. This talk will guide you through multiple attacks that took place over last couple of years, their root causes and how to mitigate any future security exploits by following best practices.

>>Go To Presentation

2vi2drr.jpg?width=750

6. Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication

Speaker: Jackson Shaw

People use more passwords today than ever before. But with the advent of Apple’s latest iPhone releases and its TouchID and FaceID technologies, we’ll begin to see a wider acceptance of some biometrics methods like fingerprint and facial scanning. This session will assess the security of these methods compared to the tried and true password.

>>Go To Presentation

2rx72ad.jpg?width=750

7. Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank

Speakers: Leyla Goncharenko, Anton Mitrofanov

This session will present a case study about the innovative approach that Sberbank has taken to implement biometrics in the bank with over 100M customers. Speakers will share best practices in designing an omnichannel user experience for customers, and how risk-based approach and machine learning helped them to build an intelligent system that is soft to legitimate users and hard to fraudsters.

>>Go To Presentation

1445we9.png?width=750

Your Complete Guide To Top Talks @RSA Conference 2018 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2018 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform