Identity World - Individual Recognition for Global Development | Sept. 25-27, 2017 – Marseille, France

Program

This version is continuously updated and enriched with additional speakers: keep posted!
Update: September 22, 2017
PROGRAM AT A GLANCE

DAY 1 - Monday September 25 Afternoon

2.00pm – 6.30pm: Opening Session | 3.50pm – 4.30pm: Coffee & Refreshment Break – Networking – Exhibition

PLENARY GRAND OPENING
Cooperative Cybersecurity for our Connected World
Chaired by: Jon Shamah, Chair of EEMA ; Principal Consultant, EJ Consultants, UK

Common to the co-located conferences forming Smart Security Week, the Grand Opening will give a global view of public and private Cybersecurity initiatives to forge a united response to cyber threats, from policies and regulations to PPP, from industry solutions to best practices. The European Union’s responses to cyber threats has paved the way to cooperative cybersecurity between Member States with the NIS Directive, cPPP, IoT “Trust Label”, Privacy, GDPR, eIDAS and a renewed cybersecurity framework in preparation. On the other side of the Atlantic, the US NIST’s Framework also aims to the convergence of cybersecurity responses. The recent development of these initiatives, and others from around the globe, will be presented and discussed in the first part of the Opening. The second part will focus on private sector cybersecurity responses with focuses on Digital Identity management and IoT security challenges.

Day 1
25 Sep 2017
Jon Shamah

Introduction: Keeping Safe in a Digitally Connected World

Part 1 – Large Scale Cybersecurity Initiatives Worldwide
Day 1
25 Sep 2017
Alar Streimann

Securing the Digital Society: e-Estonia Lessons

Slawomir Górniak

Cybersecurity Strategies in the EU

● Policies for cooperation at EU level: Cooperation and protection of infrastructure, Crisis management
● Emerging EU policy areas
● Strategies: Cooperation, Preparedness, Certification

James Clarke

Accelerating EU-US Dialogue in Cybersecurity and Privacy

● H2020 EU project AEGIS presentation: stimulating cooperation around cybersecurity
● EU-US Cybersecurity reflection on Research and Innovation
● EU-US Cybersecurity reflection on policy and legislation challenges in cybersecurity and privacy

Donna Dodson

US NIST Cybersecurity Framework 1.1: Achievements & Road Ahead (Title TBD)

Donna Dodson
James Clarke
Andrew Churchill
Claudio Caimi

PANEL DISCUSSION: Transatlantic Cybersecurity Cooperation: Forging an United Response to Universal Cyber Threats

Part 2 – Preparing to Cyber Attacks: Security Industry Responses to Protect Data, Assets and People
Day 1
25 Sep 2017
Helmut Scherzer

Reload the Responsible Internet Citizen

• Personal Identity Card with free Digital Signature
• Signature for Internet Communication
• Wiki-Reality
• Name the ‘dark side’ of the power
• Privacy Initiative
• Back to the responsible Citizen
• Reality Check

Dr. Detlef Houdeau

ECIL recommendations to EU Commission

European Cyber Security Leaders (ECIL): harmonization replace fragmentation, NIS2.0 should follow NIS, rapide action force is indicated, incentive for private actors to participate on security information sharing, recommendations for asset protection of SMEs in EEA, security algo based on guidelines from EU, staged security and mutual acceptance is needed, backdoor for illegal use must be prevented, EU regulatory sandboxing is recommended, new cyber security innovation via economic incentives.

Raghu K Dev

Cognitive Security and Threat Intelligence (Title TBD)

Patrice Slupowski

Future of Identity for a Global Connected World

• Life is becoming more digital so crime is following the trend
• With 15 connected objects for each user are we going to be physically hacked and harassed by things?
• Passwords are dead and new tools are absolutely required
• Privacy will become absolutely essential to protect our digital patrimony

Alain Ducass
Patrice Slupowski
Mohammed Murad
Michiel Loeff

PANEL DISCUSSION: Next Massive Attacks of Biometric Databases: Are We Ready?

Smart Security Week Innovation Live
2.00pm: Exhibition Opening

DAY 2 - Tuesday September 26

9.00am - 1.00pm: Break-out Sessions | 10.50 - 11.20am: Coffee & Refreshments Break – Networking – Exhibition

NATIONAL ID DEPLOYMENTS
Latest lessons & challenges worldwide
Session Chair: Alain Ducass, Chairman of energeTIC, France
Day 1
26 Sep 2017
Michiel van der Veen

KEYNOTE Who are you? The future of identity in developing countries

Deddy S. Bratakusumah

Development e-ID Card in Indonesia: Progress and Prospectives

● The background of the Program of Citizen Identification Number (NIK) in Indonesia
● The regulations to support the program
● The e-ID Card Project as an implementation of “NIK” program
● Progress and prospect of the program

Mohammed Murad

Iris Comes of Age for National ID Programs

● Overview of Iris recognition technology
● Implementation of case studies
● Lessons learned from real-life deployments
● The technology works equally well for children

STRENGTHENING ID ECOSYSTEMS
PPP models – Building a full national Digital Strategy
Session Chair: Alain Ducass, Chairman of energeTIC, France
Day 1
26 Sep 2017
Alain Ducass

KEYNOTE Identity, an Essential Component of the Digital Strategy of African States

● Many African countries are building together their digital strategy including e-gov and cybersecurity aspects
● How the three strategies are articulated one to another
● Examples coming from Africa and Europe
● e-ID (and e-IDAS) impacts on economic development and social inclusion of emerging countries.

1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 6.45pm: Break-out Sessions | 3.50 – 4.30pm: Coffee & Refreshments Break – Networking – Exhibition

MOBILE ID POWER
Leveraging the power of Mobile to bridge the Identity gap
Session Chair: Alain Ducass, Chairman of energeTIC, France
Day 1
26 Sep 2017
Jean-Marc Stenger

Sharing Experience from a Blockchain Mobile ID Pilot in Kenya

● ID management in developing markets through mobile phone and blockchainµ
● Sharing concrete field experience of a pilot in Kenya, results, challenges, learnings, opportunities, etc
● Initial use case around KYC registration for SIM and mobile money. Description of user experience
● Objective of establishing a trusted and certified Proof of Existence and Proof of Address for anyone

Alexander Ristic

Future of Identity Management. Identity Check through New ID Applications on the Smartphone

● Future of Identity Management
● From printed ID documents to Identity Applications on smart phones
● Is Cost Justification possible for Security Printing Improvements?
● How to implement new government services?

Gil Bernabeu

Globalplatform: Facilitating Global Mobile ID Solutions

● How service providers can leverage existing infrastructures on which to deploy mobile ID solutions, resulting in significant cost and time savings
● How GlobalPlatform’s infrastructure robustly safeguards the security, integrity and privacy of services deployed on a platform alongside services from other providers
● The crucial role of the secure component in deploying mobile ID solutions

Jan Rochat

Securing sensitive and critical patient data

ID ON BLOCKCHAIN
Perspectives for eGov & Developing World
(Jointly with World e-ID & Cybersecurity)
Session Chair: Jim Dray, Science Adviser, US National Institute of Standards and Technology (NIST)
Day 1
26 Sep 2017
Adewale Omoniyi

Blockchain – Building Trust through Digital Identity

● Blockchain as a Trust Broker – Public Private Decentralized Ledgers
● IBM POV on digital Identity for Governments
● Blockchain and Cyber Security POV
● Identity – Fundamental to Access – Financial and Economic Inclusion, Access to Health and Social Services, Education, Governance and Transparency

Daniel Gasteiger

How Blockchain Technology Can Enable Governments To Deliver Secure Digital Identity And E-Gov Services

● The Issue with Identity and how blockchain can help (self-sovereign digital identities)
● How such an identity forms the basis for secure e-gov services on blockchain tech
● Switzerland as a logical hub for companies involved in such products (democracy, stability/security, data protection

John Erik Setsaas

Identities on a Global Level – Taking the Blockchain Thinking to the Next Level

● Blockchain is excellent for ensuring immutability, and thereby that identities cannot be deleted
● Blockchain is not the best when it comes to privacy and the right to be forgotten
● A new distributed infrastructure is needed, where blockchain is an important part
● Four storage areas in the distributed network: blockchain, IdP truststore, identity data, secret key

Salvatore Francomacaro

Blockchain and Distributed Ledger Technology in International Standards

John Erik Setsaas
Adewale Omoniyi
Daniel Gasteiger
Salvatore Francomacaro
Jim Dray

PANEL DEBATE – Blockchain Based Identity Management: From Promises to Reality

DAY 3 - Wednesday September 27

9.00 – 10.50am: Break-out Sessions | 10.50 – 11.20am: Coffee & Refreshments Break – Networking – Exhibition | 11.20am – 1.00pm: Break-out Sessions

ID FOR FINANCIAL SECTOR
Digital Identity for Financial Inclusion
Day 1
27 Sep 2017
Matthew Soursourian

Why Does ID Matter for Financial Inclusion?

● Why financial inclusion advocates believe better identity systems could lead to more financial inclusion
● Recent examples of national identification initiatives

Nicola Jentzsch

National Identification Systems and Financial Intermediation: International Evidence

● I present evidence on the link of identity systems and financial intermediation in 172 countries
● The analysis shows a positive effect of identity systems on financial access and intermediation
● Additionally I present more detailed results from FinScope at the country level on who is identified
● These results give a very good idea who has to be targeted with roll-out interventions

SUSTAINABLE CRVS
Linking CRVS with national ID systems & business cases
Day 1
27 Sep 2017
Christophe Rapine

CRVS in a User-Centric Identity Environment: Challenges and Solutions

● Vision of a national ID system at the service of the citizen
● Where to start in the maze of challenges related to CRVS and NID
● Complete analysis of two countries National ID Systems with particular focus on CRVS

Sophie Ogilvy

Do We Need More Innovative Approaches to get CRVS off the Ground?

● Looking at the wider context that CRVS implementations are considered in
● New ideas to accelerate and drive investment in CRVS
● Ideas for collaboration

OSCE ODIHR SPECIAL SESSION
Presentation of OSCE /ODIHR Compendium of Good Practices in Identity Management

The ICAO TRIP strategy outlines the so-called five elements of traveller identification management, of which Evidence of Identity is one of the key parts. To contribute to improved information sharing on good practices in identity management the OSCE (Organization for Security and Co-operation in Europe) developed a Compendium of Good Practices in Identity Management in the OSCE Region.

The Compendium is intended for the use of identity management practitioners and policymakers who are exploring options to improve their national identity management infrastructure as a whole or some of its individual components. The benefit of the Compendium comes from the wealth of information it provides in a structured and analytical format about the characteristics of identity management systems in OSCE participating States.

Presentation of the Compendium is accompanied by the presentations of select OSCE participating States showcasing their experiences in developing and improving frameworks for issuance of national identity cards and travel documents.

Day 1
27 Sep 2017
Zoran Đoković

KEYNOTE Compendium of Good Practices in Identity Management in the OSCE Region

Maxim Sokoliuk

Introduction of Unified State Demographic Registry and biometric documents in Ukraine

Mikheil Kapanadze

Identity Management in Georgia: Civil Registry, Identity Documents, and Electronic Services

PANEL DISCUSSION

1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 4.30pm: Break-out Sessions

PANEL DEBATE:
Digital ID for Next Gen Online Services
Day 1
27 Sep 2017
Frederic Reboulleau
Donal Mc Guinness
Cedric Damico
Mikael Breton
Atreedev Banerjee

PANEL DEBATE: Digital ID for Next Gen Online Services

Porvoo Group / EEMA / eForum WORKSHOP
(Jointly with World e-ID & Cybersecurity)

This Porvoo Group / EEMA / eForum workshop will be scouring the European e-ID landscape to provide contributions for the design of a model identity ecosystem for a developing country.
Day 1
18 Nov 2017
Day 2
27 Sep 2017
Dr. Shaun Topham
Jon Shamah
Tuire Saaripuu
Gábor Bartha

WORKSHOP: eIDAS Deployments in the EU and Lessons for e-ID Globally

Title

End of the conference