KNOW Identity 2017 Agenda

Expand All +
  • Monday, March 26th


  • 07:30 - 08:45
    Duo helps defend organizations against breaches through its easy and effective cloud-based Trusted Access product suite. The company verifies the identity of users, and the health of their devices, before granting them access to applications. Duo’s balance of security and usability has led them to be an enduring and trusted partner to thousands of customers world-wide, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Yelp, Zillow, ParamountPictures, and more. The Ann Arbor, Michigan-based company maintains offices in Austin, Texas; San Mateo, California; and London, and is backed by Benchmark, Geodesic Capital, Google Ventures, Index Ventures, Lead Edge Capital, Meritech Capital Partners, Radar Partners, Redpoint Ventures, True Ventures, and Workday. Visit duo.com to find out more.
    Where
    Booth & Kiosk Exhibit Area

  • 07:30 - 09:00

  • 07:30 - 18:30

  • 08:45 - 09:00

  • 09:00 - 09:20
    Where
    Keynote Room

  • 09:20 - 10:00
    Galloway will detail the power and influence big tech have on consumers lives and why it’s time for intervention. Participants will have the opportunity to ask questions. For the past decade, the loudest arguments waged regarding the Four (Amazon, Apple, Facebook, and Google) were about which CEO was more Jesus-like or should run for president. However, the worm has turned against big tech and we’re starting to realize that it’s time someone ought to put on the brakes.
    Where
    Keynote Room

  • 10:00 - 10:30
    Acuant Inc. is a global technology company that provides comprehensive Identity Verification solutions responding to various levels of risk and assurance requirements. Utilizing patented technology Acuant transforms data intake into a business-enhancing proposition while instantly reducing the risk of fraudulent transactions. Verification products include ID Document Authentication, RFID Chip Reading and Facial Recognition & Match. Acuant’s intelligent engineering is made to work in any industry in any environment with compatibility for Windows, iOS, Android, Hybrid and HTML 5- and built to allow meeting the highest level security requirements and regulations such as KYC, PII, HIPAA and AML. Partners include start-ups, Fortune 500 and FTSE 350 organizations in all industries including Government, Financial, Healthcare, Hospitality and Security.

  • 10:30 - 11:20
    Trust is an important component of interactions between people when risk is present. Humans use heuristics, including trusting others to play by the rules, to make sense of a rapidly changing world filled with other humans that don't always act rationally. In this panel we'll cover trust across a wide range of altitudes and applications, from the theoretical—starting with the writings of Plato and Aristotle—to the latest technologies used to facilitate trust in the sharing economy and the blockchain. We'll also explore how trust can be measured with several applied techniques, the impact of trust-losing events, and why trust is still of interest even in situations where there is little to no risk.
    Where
    Blue Room

  • 10:30 - 11:20
    What is the actual value of data about each of us in the digital world? Is it possible to determine specific financial value in areas such as personalized health, advertising, retail, investing, risk evaluation, and artificial intelligence? And will we, as producers of most of this data, ever be able to get our fair share of the economics? If so, how might that work?
    Where
    Red Room

  • 10:30 - 11:20
    Confidence moves economic markets. Yet everyday confidence in digital interactions erodes due to a lack of a ubiquitous network to verify people, organizations and the various digital relationships between each. For this reason, and with this vision, Canada is focused on establishing the world's first security and privacy by design aligned network based approach for the verification of claims that leverages the best capabilities of governments, banks, universities, and technology providers. The Digital ID & Authentication Council of Canada (DIACC) and IdentityNORTH (IDN) will share real-world data related to Canada's digital identity story and support our vision of a digital identity ecosystem must focus on the benefits that will take shape in the digital economy.
    Where
    Green Room

  • 10:30 - 11:20
    Blockchain backed decentralized identity will change the world for the better. There is little argument that it will not. The debate is when. Some will say it will take 10-20 years to realize the vision of self-sovereign identity. Some believe we are right around the corner. This panel will discuss what it will take for decentralized identity to be a reality. What is needed for businesses to adopt? What is needed for consumers? What technical issues must be solved?
    Where
    Yellow Room

  • 11:20 - 11:40

  • 11:40 - 12:30
    For businesses, networked biometrics can tap into a large base of pre-enrolled biometric users, remove responsibility for managing biometric IDs, and reduce the burden of enrolling new users. For consumers, networked biometrics can allow a single enrollment to turn on benefits across multiple companies and multiple verticals from cutting lines at airports to logging in at work all with just one enrollment.
    Where
    Blue Room

  • 11:40 - 12:30
    Know your customer and identity verification due diligence have become more complicated with the rise of synthetic identities and data breaches. At the same time, customers are demanding seamless user experiences and real-time onboarding. How are organizations using real-time identity verification and asynchronous pattern recognition to create a robust event driven KYC process? What are the technology and cost considerations to make such an approach feasible?
    Where
    Yellow Room

  • 11:40 - 12:30
    As KYC regulations grow increasingly more stringent globally, does mobile identity hold the key to comprehensive and cost effective KYC? Many companies with primarily mobile users have already adopted a mobile identity first KYC paradigm. What can other businesses learn from these early adopters? Does mobile identity need to coexist with a “traditional” KYC strategy or is a paradigm shift needed?
    Where
    Green Room

  • 11:40 - 12:30
    When it comes to safeguarding the movement and storage of money, or financing, is MFA enough or simply a stop gap? Where and how should biometrics play a part? Who truly owns your financial data and whose job is it to decide the security measures required?
    Where
    Red Room

  • 12:30 - 13:20
    Teams will be given 24 hours to hack together a solution that solves at least one of the challenges. Each team may consist of between 3 and 5 team members. At the end of the 24 hours, the teams will have an additional 2 hours to prepare to demo their solution in front a panel of judges and audience members. The judges will determine the $25,000 grand cash prize winner.
    Where
    Hackathon Room

  • 12:30 - 13:30
    Where
    Keynote Room

  • 13:30 - 14:20
    As digital transformation and new services over connected devices revolutionize the consumer experience, creating a trusted journey and clear value proposition for all is paramount. Seamless, more personalized customer journeys across finance, travel, health, education and retail are already seeing adoption globally. Across these complex and diverse ecosystems two things remain constant -- Consumers and Data. Regulators are trying to protect and empower consumers with 2018 seeing a raft of new laws come into effect. These changes have been catalysts to driving innovation and are a re-think of the consumer journey to enable personalized services and a clear value exchange that offers users control over their data. This panel featuring experts across diverse sectors will examine the enablers required to build trusted relationships with consumers to ensure value creation and sustainable growth in a connected world.
    Where
    Yellow Room

  • 13:30 - 14:20
    The best online financial services companies are turning the "burden" imposed by the regulators into an opportunity to better get to know their customers and harness their data. How do startups compete and thrive in a changing regulatory environment? In what ways can technology help organizations both increase compliance coverage in a cost-effective way and provide powerful insights on omni-channel customer interactions?
    Where
    Green Room

  • 13:30 - 14:20
    Recent breaches have increased the attention on use of the SSN for both identifying individuals and authenticating them. Panelists will discuss where using the SSN may still be appropriate and where it was not appropriate before the recent wave of attention and certainly isn't now.
    Where
    Blue Room

  • 13:30 - 14:20
    With the release of the updated identity policy from OMB for public comment per the requirement in the IT Modernization Plan now is a great time to discuss where industry should work with government to move Federal identity forward. Where are the opportunities for private sector innovation to solve Federal problems, and where should industry look to innovate further? This is a critical time for progress, and we are all impacted by what happens next.
    Where
    Red Room

  • 14:20 - 14:40

  • 14:40 - 15:30
    Creating a database of identities enables companies to comply with regulations, understand customers, and for governments to protect their citizens. But it remains difficult to perform analysis using external data sources like news, customer data, social media activity, and analyst reports because of the challenges involved in linking mentions to identity records. This panel will discuss real world challenges and successful strategies to make these connections and construct knowledge graphs.
    Where
    Blue Room

  • 14:40 - 15:30
    Biometrics are a global phenomenon that enterprises across the spectrum from financial service and healthcare providers to retail and ecommerce operations ignore at their peril. On-device smartphone biometrics have been embraced to improve the user authentication experience. However, will the big payoff will come from adoption of biometrics in the Cloud to dramatically improve identity assurance across the enterprise?
    Where
    Green Room

  • 14:40 - 15:30
    The session will explore the range of stakeholder motivations for self attested and 3rd party certified identity services, debate the current and future state of the market and most important of all, ask ourselves the question - will consumers care?
    Where
    Yellow Room

  • 14:40 - 15:30
    Today, SSNs are used for many more things than their original purpose. Unfortunately, criminals can use your SSN to commit identity theft, such as apply for credit, take out loans, make high value purchases and impersonate you. Hear a range of organizations debate on how your Phone Number could be the new SSN, the potential benefits & drawbacks, including the security and privacy aspects of such a change.
    Where
    Red Room

  • 15:30-16:00
    Ubiquity Global Services is a multinational outsourcing organization headquartered in New York City. Our expanding network includes service delivery locations in the United States, El Salvador, Portugal and the Philippines. Founded in 2012, Ubiquity offers innovative customer experience management solutions designed to improve user satisfaction while reducing total servicing costs. Our solutions include live customer support services, interactive voice response solutions (IVR), risk management services and a variety of physical correspondence services. Ubiquity has developed a next-generation technology platform that powers processes engineered for operational excellence while delivering our clients meaningful and actionable business intelligence. Together with our clients, Ubiquity is pioneering a new approach for maximizing the potential of every customer contact.

  • 16:00-17:00
    Ansari will explore the way her identity has played a role in her childhood, her immigration to the United States from Iran, and in her career as the first female private space explorer and first astronaut of Iranian descent. Now she serves as CEO, chair, and co-founder of Prodea Systems, which explores and implements a new seamless world connecting people, data and devices.
    Where
    Keynote Room

  • 17:00 - 18:30
    North 6th Agency, Inc. (N6A) is an award-winning brand communications and social media agency based in New York City and Toronto. N6A’s client roster includes emerging, mid-sized and enterprise brands from a range of industries, with a dedicated Cybersecurity & Digital Identity division servicing businesses within cybersecurity, cryptocurrency, digital identity, fin/tech, data privacy, and verification sectors. N6A offers services including strategic earned media campaigns, media relations, awards and speaking programs, analyst relations, crisis communication, executive media coaching, and social media marketing. N6A has been a finalist for Most Innovative Culture by Digiday, as well as the fastest-growing agency in the United States and among the 50 Most Powerful Agencies by the Observer.
    Where
    Booth & Kiosk Exhibit Area

  • Tuesday, March 27th


  • 07:30 - 08:45
    TransUnion is more than just a credit reporting agency. We’re a sophisticated, global risk information provider striving to use Information for Good. Serving roughly 45,000 companies and more than 500 million customers in 33 countries globally, we’re committed to providing the most complete and multidimensional information available, to help our customers make the best possible choices.
    Where
    Booth & Kiosk Exhibit Area

  • 07:30 - 09:00

  • 07:30 - 18:30

  • 08:45 - 09:00

  • 09:00 - 09:20
    David will kick off day two of the conference.

  • 09:20 - 10:00
    Trust in traditional institutions like government, big business, the media, and even non-profits is at record lows. Yet, at the same time, Airbnb is helping build trust between people who've never met and empowering millions to travel the world or open up their homes to others. Hear how Airbnb approaches this immense challenge by leveraging technology, innovation, and maintaining a core focus on safety.
    Where
    Keynote Room

  • 10:00 - 10:30
    One Company, One Solution. Aristotle is recognized as the pioneer in political technology. Every occupant of the White House — Democrat and Republican — for more than 25 years, has been an Aristotle customer, as are most U.S. Senators, most members of the U.S. House of Representatives, and Democratic and Republican state party organizations. Year round, thousands of Americans involved in the political process — from grassroots organizers to Washington insiders — rely on Aristotle.

  • 10:30 - 11:20
    Billions of unbanked and underbanked individuals are precluded from meaningful participation in the formal economy due to ineffectual identity. Companies and governments around the world are working to address these challenges. What have been effective solutions and investments that make the poorest people economically visible? How are systems leveraging government-issued identification, digital attestations from private sector, and user-owned digital identities?
    Where
    Yellow Room

  • 10:30 - 11:20
    When connecting individuals in real life through our products, how do we ensure we're facilitating their interactions both on platform and off in a way that ensures their trust not just of each other but also us? We're responsible for not only the goods and services changing hands, but also the payment information and other data that makes the transaction possible.
    Where
    Blue Room

  • 10:30 - 11:20
    Each Demo Session focuses on one of OWI's Identity Building Blocks. Sponsors and other KNOW participants will present product announcements, demonstrations, and more, engaging with participants. During this session, there will be 5 presentations, and each presenter will have 10 minutes total time to present and take any audience questions.
    Where
    Green Room

  • 10:30 - 11:20
    Advances in machine learning and artificial intelligence have created promising results across identity use cases from authentication to remote identity proofing. However, these technologies are also increasingly available to fraudsters and hackers, creating an ever escalating arms race. How do artificial intelligence and machine learning fit with other emerging technologies for identity use cases? What are the opportunities and pitfalls for organizations to be aware of? And how will humans continue to remain in the equation on both sides?
    Where
    Red Room

  • 11:20 - 11:40

  • 11:40 - 12:30
    Trust is the foundation of any relationship – and essential to trust is the idea of identity. If one of the key enablers in the future digital economy will be trust, how do we need to rethink the concept of identity?
    Where
    Blue Room

  • 11:40 - 12:30
    Identity related services have seen an unprecedented volume of investment from RegTech to cybersecurity to data automation. This panel of investors will discuss investment trends, opportunities, market dynamics, and industry growth potential.
    Where
    Red Room

  • 11:40 - 12:30
    Account takeover (ATO) is on an unprecedented rise driven by automated attacks, and fueled by the sheer volume of stolen passwords and other credentials. With the scope, scale and frequency of online attacks against user accounts increasing, how can organizations large and small fight to secure their users accounts? Hear from a range of organizations on the technologies they're deploying, what strategies have been most effective, and how to enable security without sacrificing user convenience.
    Where
    Yellow Room

  • 11:40 - 12:30
    Each Demo Session focuses on one of OWI's Identity Building Blocks. Sponsors and other KNOW participants will present product announcements, demonstrations, and more, engaging with participants. During this session, there will be 5 presentations, and each presenter will have 10 minutes total time to present and take any audience questions.
    Where
    Green Room

  • 12:30 - 13:30
    HID powers the trusted identities of the world's people, places and things. Every day millions of people in more than 100 countries use our products and services to securely access physical and digital places. Over 2 billion things that need to be identified, verified and tracked are connected through HID Global’s technology. We make it possible for people to transact safely, work productively and travel freely. We work with governments, universities, hospitals, financial institutions and some of the most innovative companies on the planet—helping them to create trusting and trusted physical and digital environments so that they and the people who use them can fulfill their potential.
    Where
    Keynote Room

  • 13:30 - 14:20
    What if authentication and identity were ’solved’ problems? We trust our users, we trust our customers …now what? We’ll explore what forward-thinking financial institutions are already doing today with cutting edge technology that can delight your customers and transform your business.
    Where
    Red Room

  • 13:30 - 14:20
    We'll discuss insights on some of the more interesting GDPR articles, thoughts on implementation strategies and a look forward to what opportunities and risks a post-GDPR world may unlock.
    Where
    Blue Room

  • 13:30 - 14:20
    Each Demo Session focuses on one of OWI's Identity Building Blocks. Sponsors and other KNOW participants will present product announcements, demonstrations, and more, engaging with participants. During this session, there will be 5 presentations, and each presenter will have 10 minutes total time to present and take any audience questions.
    Where
    Green Room

  • 13:30 - 14:20
    Identity holds the key to delivering the convenient access users demand, and securing critical data and infrastructure. However, given recent technological advancements and new methods on the horizon, identity is positioned to undergo a seismic shift within enterprises. How will distributed identity coexist with the notion of enterprise-owned assets? How will enterprise security need to adapt to new use cases? What are some practical strategies for transformation?
    Where
    Yellow Room

  • 14:20 - 14:40

  • 14:40 - 15:30
    Hackathon entrants will demo their solutions in front a panel of judges and audience members. The judges will determine the $25,000 grand cash prize winner, announced later in the day.
    Where
    Startup/Hackathon Amphitheater

  • 15:30 - 16:00
    Asignio is a web-based, biometric authentication platform based on handwriting recognition technology. Users create a signature unique to them, drawing a simple combination of letters or numbers with their finger directly on a touchscreen device. This signature combines the familiarity of hand-drawn initials with the security of a biometric. Users can use their signature as trusted identity access to any account on any device at any time. This signature-based access creates a consistent login experience while fortifying protection against fraud. Asignio authentication complies with data privacy regulations, protects high-risk transactions, and secures user onboarding—all with the simplicity of a signature.

  • 16:00 - 17:00
    The top 10 startups that apply will get to present in front of a panel of distinguished investors, members of media, and identity experts. Each startup will have three minutes to pitch their innovative solution, idea, or technology. At the end of each pitch, the panel of judges will be given an addition three minutes for Q&A. The winner will take home the $10,000 grand cash prize and the prestige of winning the KNOW Identity Startup Pitch Competition.
    Where
    Startup/Hackathon Amphitheater

  • 17:00 - 17:30
    Where
    Booth & Kiosk Exhibit Area

  • 17:00-18:30
    Trulioo is a global identity verification company building a framework of trust online for today’s digital world by providing secure access to 4 billion consumers in over 60 countries via 200 trusted data sources globally through a single integration point. Trulioo helps businesses and organizations reduce fraud and comply with a diverse range of international electronic ID verification requirements, such as Anti-Money Laundering (AML) and Know Your Customer (KYC). With the flexibility, scalability and intelligence provided by GlobalGateway, Trulioo’s on-demand identity verification platform, businesses save time, reduce operational costs, increase efficiencies across all business units, and facilitate a more transparent online verification process.
    Where
    Booth & Kiosk Exhibit Area

  • Wednesday, March 28th


  • 07:30 - 08:45
    Founded in 2012, BounceX’s People-Based Marketing (PBM) cloud is the first new revenue channel with scale in 10 years. With offices in NYC and London and named the fastest growing software company in America by Inc Magazine in 2016, we currently power thousands of digital properties, expanding across a multitude of industries. For the first time, brands and publishers have a meaningful paid channel outside of Google and Facebook. We are trusted by global enterprises such as Forever21, Avis, Lufthansa, CNN, Uniqlo, Comcast and many more.
    Where
    Booth & Kiosk Exhibits

  • 07:30 - 08:45
    It’s hard to talk about the sensitive issues in modern trust & safety, yet at the same time it’s critical to work together to beat the attackers. Risk Salon facilitates collaboration across the tech industry with our monthly invite-only events (no vendors, no media) using the Chatham House Rule to protect information, small discussion groups for effective communication, and plenty of socializing time to forge relationships. We come from diverse functional areas (engineering, product, data science, operations, legal, and more) and we share best practices and success stories to help protect everyone’s platforms and users.
    Where
    Hackathon Room

  • 07:30 - 09:00

  • 07:30 - 14:40

  • 08:45 - 09:00

  • 09:00 - 09:20
    Where
    Keynote Room

  • 09:20 - 10:00
    In a time when data breaches and loss of personal information is a regular occurrence, the US government continues to provide much needed services to its citizens through a web of outdated, antiquated, and siloed technology. To combat this decades old problem, the White House has launched the President's Management Agenda - a broad initiative that will provide the foundation for addressing these critical challenges. Listen to Margaret Weichert outline the three pillars that underpin the White House's strategy to reshape the government into a modern, secure, user-friendly digital ecosystem.
    Where
    Keynote Room

  • 10:00 - 10:30
    We are an organization of individuals who choose to dedicate our talent, education and experience to making a difference. We represent nearly every profession; we are accountants, attorneys, engineers, planners, systems analysts, deputies, fire fighters, and more. Together we work as a team to serve the needs and shape the future of our unique and dynamic community.

  • 10:30 - 11:20
    Gone are the days when a fingerprint reader on your smartphone marked you as an early adopter of new and exciting technology. Ubiquity has created a widespread familiarity with biometrics never seen before, which is having a ripple effect throughout the vertical markets. Beyond consumer tech, biometrics are changing finance, healthcare, border control, law enforcement, government applications, and much more. Join this expert panel of authentication and identity experts for a discussion about key concerns in the contemporary biometrics landscape as they relate to the current period of rapid evolution in strong authentication technology. Privacy controversies, cloud versus on-device authentication paradigms, markets on the verge of disruption, data breach prevention, the state of liveness detection, and more are on the table!
    Where
    Yellow Room

  • 10:30 - 11:20
    Each Demo Session focuses on one of OWI's Identity Building Blocks. Sponsors and other KNOW participants will present product announcements, demonstrations, and more, engaging with participants. During this session, there will be 5 presentations, and each presenter will have 10 minutes total time to present and take any audience questions.
    Where
    Green Room

  • 10:30 - 11:20
    Many organizations today are relying on more partners for more functions than ever before. While this has allowed organizations to focus on core competencies and increase efficiency, it has introduced new risks that are more outside the control of the organization. This panel will look across the current risks, best practices, and where how organizations can prepare for increased risk from third parties.
    Where
    Blue Room

  • 10:30 - 11:20
    At its core, digital identity includes all digital means of identifying oneself. However, there are many ways of defining the term and there currently lacks a shared understanding of what digital identity means, and what a desirable outcome (‘Good ID’) should look like. There is an urgency to the discussion because large-scale digital transformations such as this can create both opportunities and risks. This panel will explore the path to creating such a shared understanding. It will discuss the understanding of the term ‘digital identity’, the need for concerted efforts in this direction, existing initiatives by different stakeholders, and reasons for past successes and failures. It will focus on how different stakeholders – governments, multi-laterals, industry bodies, corporations, start-ups, donors, academia, civil society and individuals – can come together to ensure that a consensus emerges, and that it includes all the protections that individuals need to have in a digital age.
    Where
    Red Room

  • 11:20 - 11:40

  • 11:40 - 12:30
    Blockchains for identity use cases have been a hot topic across many sectors. This panel of experts will break present a holistic assessment of the business, economic, privacy and security risks associated specifically with using public blockchains for identity.
    Where
    Yellow Room

  • 11:40 - 12:30
    Each Demo Session focuses on one of OWI's Identity Building Blocks. Sponsors and other KNOW participants will present product announcements, demonstrations, and more, engaging with participants. During this session, there will be 5 presentations, and each presenter will have 10 minutes total time to present and take any audience questions.
    Where
    Green Room

  • 11:40 - 12:30
    If an organization exists for long enough, it will experience an incident. This panel of experts will provide lessons learned from real life examples, how organizations can prepare in advance, how to work with regulators, the media, and stakeholders, and finally what not to do.
    Where
    Blue Room

  • 11:40 - 12:30
    Even when cybersecurity and software bugs are known problems, corporate and government actors alike are often reactive and will only invest after the damage has been done. What role can whistleblowers, the media and security researchers play in driving change? Should gaps reported through bug bounty or other programs be publicly published if an organization does not move to remediate? What are the ethical and practical implications of such an approach?
    Where
    Red Room

  • 12:30 - 13:30
    Experian® is the world’s leading global information services company. During life’s big moments – from buying a home or a car, to sending a child to college, to growing a business by connecting with new customers – we empower consumers and our clients to manage their data with confidence. We help individuals to take financial control and access financial services, businesses to make smarter decisions and thrive, lenders to lend more responsibly, and organizations to prevent identity fraud and crime. We have 17,000 people operating across 37 countries and every day we’re investing in new technologies, talented people and innovation to help all our clients maximize every opportunity. We are listed on the London Stock Exchange (EXPN) and are a constituent of the FTSE 100 Index. Learn more at www.experianplc.com or visit our global content hub at our global news blog for the latest news and insights from the company.
    Where
    Keynote Room

  • 13:30 - 14:20
    Security posture needs to adjust to the rapid rise of connected devices. Webcams, routers, plant sensors, point-of-sale solutions ... all these have been vectors for attack - but there's more to come. Industrial manufacturers have created smart turbines, robotic assembly lines, as well as ships and locomotives that make their own decisions based on a huge volumes of data provided by a swarm of sensors as well as from other machines. We need to learn - and apply - lessons we learned about human users with the advent of de-perimiterization. Things, it turns out, need Identity too!
    Where
    Green Room

  • 13:30 - 14:20
    We've heard that identity is the new perimeter in cybersecurity. Many have pointed to the fact that traditional security perimeters encircling corporate networks no longer meet the needs of today’s enterprise. However, in a landscape primarily dominated by point solutions, what does this statement mean in practice? This panel will explore the practical challenges and opportunities in an identity centric view of cybersecurity.
    Where
    Red Room

  • 13:30 - 14:20
    Centralized cloud identity has peaked. Distributed ledgers, decentralized identifiers, and verifiable claims have made sovereign identity possible. The benefits to people are overwhelming, especially with regard to privacy, control of data, and fraud reduction. Three standard technologies in particular stand out as enablers of this new digital identity infrastructure: (1) OpenID Connect, an OAuth based federated identity layer; (2) Sovrin, an advanced distributed ledger technology; (3) FIDO, a standards-based cryptographic authentication protocol. This session will provide an overview of each of these technologies as well as references to open source software that can be deployed today to put it to work.
    Where
    Yellow Room

  • 13:30 - 14:20
    One of the foundational ways to address risk is the transference of risk, and this session will focus on how organizations are using cyber insurance to support broader trust and safety goals. Experts from insurance companies and risk owners will discuss the role insurance plays today and where it may go in the future
    Where
    Blue Room

  • 14:20 - 14:40
    Booth & Kiosk Exhibit Area

Time until the KNOW Identity Conference 2018: