Identity World - Individual Recognition for Global Development | Sept. 25-27, 2017 – Marseille, France


This version is continuously updated and enriched with additional speakers: keep posted!
Update: July 17, 2017
DAY 1 – Monday Sept. 25 AFTERNOON
IDENTITY WORLD CONFERENCE Smart Security Week Innovation Live
Keynotes & panels addressing transversal topics of the Smart Security Week conferences


Welcome Cocktail
DAY 2 – Tuesday Sept. 26
All-day: Exhibition & Demos
Exhibition & Demos
Smart Security Week Awards Ceremony
Gala Evening
DAY 3 – Wednesday Sept. 27
Exhibition & Demos
Exhibition & Demos

DAY 1 - Monday September 25 Afternoon

2.00pm – 6.30pm: Opening Session | 3.50pm – 4.30pm: Coffee & Refreshment Break – Networking – Exhibition

Cooperative Cybersecurity for our Connected World

Common to the co-located conferences forming Smart Security Week, the Grand Opening will give a global view of public and private Cybersecurity initiatives to forge a united response to cyber threats, from policies and regulations to PPP, from industry solutions to best practices. The European Union’s responses to cyber threats has paved the way to cooperative cybersecurity between Member States with the NIS Directive, cPPP, IoT “Trust Label”, Privacy, GDPR, eIDAS and a renewed cybersecurity framework in preparation. On the other side of the Atlantic, the US NIST’s Framework also aims to the convergence of cybersecurity responses. The recent development of these initiatives, and others from around the globe, will be presented and discussed in the first part of the Opening. The second part will focus on private sector cybersecurity responses with focuses on Digital Identity management and IoT security challenges.

Part 1 – Large Scale Cybersecurity Initiatives Worldwide
Day 1
25 Sep 2017

European Union Cybersecurity Strategy: a new framework to deal with new challenges

Steve Purser

Cooperation between States & Cybersecurity Agencies: ENISA’s View (Title TBC)

Donna Dodson

US NIST Cybersecurity Framework 1.1: Achievements & Road Ahead (Title TBD)

Public-Private Partnerships on Cybersecurity

Ammar Jaffri

Regional Conflicts VS Cyber Conflicts… Need for Regional Cooperation

• Regional Conflicts are natural and has a History of Conflicts due to Number of Reasons
• There is an urgent need to bridge the Gaps in Cyber Space as Terrorists are getting benefit
• Only Cooperation in Cyber Space and timely sharing of Information may create confidence
• Gaps may be identified which can be used to trigger any Cyber War between Countries

Donna Dodson

PANEL DISCUSSION: Transatlantic Cybersecurity Cooperation: Forging an United Response to Universal Cyber Threats

Part 2 – Preparing to Cyber Attacks: Security Industry Responses to Protect Data, Assets and People
Day 1
25 Sep 2017

IoT Security: EU’s certification and labelling for connected devices

Raghu K Dev

Cognitive Security and Threat Intelligence (Title TBD)

Patrice Slupowski

Future of Digital Identity and IoT Security (Title TBD)

Helmut Scherzer

Reload the Responsible Internet Citizen – The Internet of the Future

• Personal Identity Card with free Digital Signature
• Signature for Internet Communication
• Wiki-Reality
• Name the ‘dark side’ of the power
• Privacy Initiative
• Back to the responsible Citizen
• Reality Check

Alain Ducass

PANEL DISCUSSION: Next Massive Attacks of Biometric Databases: Are We Ready?

Smart Security Week Innovation Live
2.00pm: Exhibition Opening
Welcome Cocktail

DAY 2 - Tuesday September 26

9.00am - 1.00pm: Break-out Sessions | 10.50 - 11.20am: Coffee & Refreshments Break – Networking – Exhibition

Latest lessons & challenges worldwide
Day 1
26 Sep 2017
Alban Féraud

Managing National Identities to Develop Services and Digital Ecosystems

● Connect, Trust and Act in the digital age/ a new way of delivering services
● What is at stake for government, businesses, and citizens?
● The role of national governments
● Developing national identity solutions (scope/ key issues/fundamental parameters/ Recommendations)
● Country use cases

Deddy S. Bratakusumah

Development e-ID Card in Indonesia: Progress and Prospectives

● The background of the Program of Citizen Identification Number (NIK) in Indonesia
● The regulations to support the program
● The e-ID Card Project as an implementation of “NIK” program
● Progress and prospect of the program

National ID deployments cases in Africa TBA

Alain Ducass

Digital ID and Social Inclusion Challenges

PPP models – Building a full national Digital Strategy
Day 1
26 Sep 2017
Alain Ducass

Identity, an Essential Component of the Digital Strategy of African States

● Many African countries are building together their digital strategy including e-gov and cybersecurity aspects
● How the three strategies are articulated one to another
● Examples coming from Africa and Europe
● e-ID (and e-IDAS) impacts on economic development and social inclusion of emerging countries.

Harbir Nat

Building Self Sustaining Universal Identity Systems

● The public and private, economic and social benefits of digital UID Systems are pretty much proven
● This drives the need for call countries to rapid implement Digital UID Systems
● Do such programs need to be funded and owned by Governments ?
● Private, for profit investments in UID will led to faster and more efficient implementation of UID Systems

Digital Identity: PPP Cooperation Recommendations (work in progress)

● New macroeconomic study of public-private partnerships (PPPs) on the implementation of digital identity systems
● Recommendations as to the PPP model to be carried out according to the objective pursued by the government (enrolment, identification, issuance of secured securities, etc.) and the management of the sovereign identity system
● Recommendations with respect to the fundamental question of funding for this type of operation, risk management, and the various pitfalls likely to occur when deploying the system

1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 6.45pm: Break-out Sessions | 3.50 – 4.30pm: Coffee & Refreshments Break – Networking – Exhibition

Leveraging the power of Mobile to bridge the Identity gap
Day 1
26 Sep 2017
Paul Langlois-Meurinne

Sharing Experience from a Blockchain Mobile ID Pilot in Kenya

● ID management in developing markets through mobile phone and blockchainµ
● Sharing concrete field experience of a pilot in Kenya, results, challenges, learnings, opportunities, etc
● Initial use case around KYC registration for SIM and mobile money. Description of user experience
● Objective of establishing a trusted and certified Proof of Existence and Proof of Address for anyone

Alexander Ristic

Future of Identity Management. Identity Check through New ID Applications on the Smartphone

● Future of Identity Management
● From printed ID documents to Identity Applications on smart phones
● Is Cost Justification possible for Security Printing Improvements?
● How to implement new government services?

Gil Bernabeu

Globalplatform: Facilitating Global Mobile ID Solutions

● How service providers can leverage existing infrastructures on which to deploy mobile ID solutions, resulting in significant cost and time savings
● How GlobalPlatform’s infrastructure robustly safeguards the security, integrity and privacy of services deployed on a platform alongside services from other providers
● The crucial role of the secure component in deploying mobile ID solutions

Perspectives for eGov & Developing World
(Jointly with World e-ID & Cybersecurity)
Session Chair: Jim Dray, Science Adviser, US National Institute of Standards and Technology (NIST)
Day 1
26 Sep 2017
Adewale Omoniyi

Blockchain – Building Trust through Digital Identity

● Blockchain as a Trust Broker – Public Private Decentralized Ledgers
● IBM POV on digital Identity for Governments
● Blockchain and Cyber Security POV
● Identity – Fundamental to Access – Financial and Economic Inclusion, Access to Health and Social Services, Education, Governance and Transparency

Daniel Gasteiger

How Blockchain Technology Can Enable Governments To Deliver Secure Digital Identity And E-Gov Services

● The Issue with Identity and how blockchain can help (self-sovereign digital identities)
● How such an identity forms the basis for secure e-gov services on blockchain tech
● Switzerland as a logical hub for companies involved in such products (democracy, stability/security, data protection

John Erik Setsaas

Identities on a Global Level – Taking the Blockchain Thinking to the Next Level

● Blockchain is excellent for ensuring immutability, and thereby that identities cannot be deleted
● Blockchain is not the best when it comes to privacy and the right to be forgotten
● A new distributed infrastructure is needed, where blockchain is an important part
● Four storage areas in the distributed network: blockchain, IdP truststore, identity data, secret key

Gala Evening

DAY 3 - Wednesday September 27

9.00 – 10.50am: Break-out Sessions | 10.50 – 11.20am: Coffee & Refreshments Break – Networking – Exhibition | 11.20am – 1.00pm: Break-out Sessions

Digital Identity for Financial Inclusion
Day 1
27 Sep 2017
Paul Makin

Developments in Identity for Financial Sector Development

● Opportunities presented by the development of government-issued digital identities in the delivery of financial and other services
● Different types of digital identity and their applicability, with an eye to the emergence of new types of digital identity
● Regtech and the applications of digital identities for the provision of more sophisticated tools to regulatory authorities

Nicola Jentzsch

National Identification Systems and Financial Intermediation: International Evidence

● I present evidence on the link of identity systems and financial intermediation in 172 countries
● The analysis shows a positive effect of identity systems on financial access and intermediation
● Additionally I present more detailed results from FinScope at the country level on who is identified
● These results give a very good idea who has to be targeted with roll-out interventions

Ashish Gadnis

Economic Identity for Financial Inclusion & Humanitarian Aid on Blockchain

● Lack of ownership of a secure and unique digital identity is a fundamental reason that too many are not able to benefit from a growing middle class
● Several startups are applying blockchain technology towards self-sovereign identity
● A unique approach using blockchain (NOT bitcoin), potential paths towards universal identities

Linking CRVS with national ID systems & business cases
Day 1
27 Sep 2017
Fabien Rouaud

CRVS in a User-Centric Identity Environment: Challenges and Solutions

● Vision of a national ID system at the service of the citizen
● Where to start in the maze of challenges related to CRVS and NID
● Complete analysis of two countries National ID Systems with particular focus on CRVS

Sophie Ogilvy

Do We Need More Innovative Approaches to get CRVS off the Ground?

● Looking at the wider context that CRVS implementations are considered in
● New ideas to accelerate and drive investment in CRVS
● Ideas for collaboration

Launch of OSCE/ODIHR Compendium of Good Practices in Identity Management

The OSCE (Organization for Security and Co-operation in Europe) Office for Democratic Institutions and Human Rights will publish in September 2017 the OSCE ODIHR Compendium of Good Practices in Identity Management. This session marks the formal launch of this OSCE/ODIHR work to support the exchange of good practices in issuance of identification and travel documents and to facilitate cross-border mobility.

The workshop will gather its partners and IoT security stakeholders around its latest achievements and upcoming challenges.
ARMOUR 3 main goals:
• Enhancing FIRE (Future Internet Research and Experimentation) testbeds with an experimentation toolbox enabling large-scale IoT Security & Trust experiments
• Delivering methods and technologies for enabling Security & Trust in the large-scale IoT
• Defining a framework to support the design of Secure & Trusted IoT applications as well as establishing a certification scheme for setting confidence on Security & Trust IoT solutions
Day 1
27 Sep 2017
Zoran Đoković

OSCE/ODIHR Compendium of Good Practices in Identity Management (Title TBC)

OSCE participating States (Title TBA)

OSCE participating States Speech (Title TBA)


1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 4.30pm: Break-out Sessions

WORKSHOP (Jointly with World e-ID & Cybersecurity)
eIDAS & Mutual Recognition Lessons for Developing World
This workshop will be scouring the European e-ID landscape to provide contributions for the design of a model identity ecosystem for a developing country.

Tuire Saaripuu, Head of Registration at Population Register Centre, Certification Authority Services, Finland; Chair of Porvoo Group
Jon Shamah, Chair of EEMA, UK; Principal Consultant, EJ Consultants, UK
Shaun Topham, President EU e-Forum
– eIDAS unit representative to be announced

eIDAS, the cross-border e-ID model which the EU has designed for the Europeans, has the potential to play an integral part of the global online ecosystem of the future. eIDAS-compliant e-IDs can provide a viable solution for accessing them and bring many benefits for platforms and their users.

Having the possibility to use a secure and reliable eID can be instrumental in building trust among strangers, while providing the necessary convenience and security. And since the use of eIDs in the global digital environment is a choice, nor an obligation imposed by regulation, it is important to define collectively some principles and rules that we can jointly subscribe to and which reflect our common understanding of how we can interact in the future.

Lessons learned in this context from the feedback gained from the ongoing deployment of eIDAS nodes will help elicit elements which be of value more globally, and in the formulation of plans for new eID systems in developing countries.

Day 1
27 Sep 2017


Updates on Cooperation Programs along Digital Transformation
Program TBA
Day 1
27 Sep 2017


End of the conference