{"id":4917,"date":"2019-12-09T21:50:59","date_gmt":"2019-12-09T21:50:59","guid":{"rendered":"https:\/\/heliview.be\/data-driven-business\/?page_id=4917"},"modified":"2025-05-02T07:14:42","modified_gmt":"2025-05-02T07:14:42","slug":"programme-2024","status":"publish","type":"page","link":"https:\/\/heliview.com\/digital-identity-trust-belgium\/programme-2024\/","title":{"rendered":"Programme 2024"},"content":{"rendered":"
Chairman of the day Erik van Zuuren will open the programma and walk you trough what the day will bring.<\/p><\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:30 – 9:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Join us to delve into the principles of decentralized identity, where we will:
\nEnable users to securely manage and control their personal data, make anonymous identity claims without unnecessary exposure, and selectively authorize data access based on necessity.
\nDecrease vulnerabilities and reduce the risk of breaches associated with centralized systems, thereby enhancing organizational privacy and security.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”5983″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter.<\/p>\n
Join this discussion as Matt shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6082″ img_size=”” css=””][vc_btn title=”11:45 – 12:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
What you will learn:<\/p>\n
We will cover four key areas:<\/p>\n
Join us for actionable insights and clear examples to implement these strategies in your organisation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”5991″ img_size=”” css=””][vc_btn title=”11:45 – 12:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6250″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
Lunch is waiting for you at the network plaza. While enjoying a sandwich, you can discuss the morning program with fellow participants or obtain information about your issues from partners. The in-person meetings also take place here.
\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”12:15 – 13:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Join this session to get answers to these questions.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”5955″ img_size=”” css=””][vc_btn title=”13:20 – 13:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
OAuth is the most important framework for federated authorization on the web. It also serves as the foundation for federated authentication using OpenID Connect. While RFC6749 and RFC6819 give advice on securing OAuth deployments, many subtle and not-so-subtle ways to shoot yourself in the foot remain. One reason for this situation is that OAuth today is used in much more dynamic setups than originally anticipated. Another challenge is that OAuth today is used in high-stakes environments like financial APIs and strong identity proving.<\/p>\n
To address these challenges, the IETF OAuth working group is working towards a new Security Best Current Practice (BCP) RFC that aims to weed out insecure implementation patterns based on lessons learned in practice and from formal security analyses of OAuth and OpenID Connect. The BCP gives concrete advice to defend against attacks discovered recently (like the AS mix-up attack) and discourages the use of less-secure grant types such as the Implicit Grant.<\/p>\n
This talk will outline the challenges faced by OAuth in dynamic and high-stakes environments and go into the details of the MUSTs, MUST NOTs, and SHOULDs in the new Security BCP.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6012″ img_size=”” css=””][vc_btn title=”13:20 – 14:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Trust is vital in the digital world, and certificates and so-called Qualified Trust Services seem to be the golden standard. Let\u2019s learn from experiences of the banking world where certificates are widely used for secure communications,\u00a0 Open Banking, PSD2 etc. Do all certificates provide the same trust level?\u00a0 To what extent do they live up to their security promises? What are the potential setbacks, and what can be done to mitigate them?<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6172″ img_size=”” css=””][vc_btn title=”14:55 – 15:20″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n