|IDENTITY WORLD CONFERENCE||Smart Security Week Innovation Live|
PLENARY GRAND OPENING
Keynotes & panels addressing transversal topics of the Smart Security Week conferences
2.00pm: EXHIBITION OPENING
|NATIONAL ID DEPLOYMENTS||
All-day: Exhibition & Demos
|STRENGTHENING ID ECOSYSTEMS|
Exhibition & Demos
|ID ON BLOCKCHAIN|
Exhibition & Demos
Exhibition & Demos
Common to the co-located conferences forming Smart Security Week, the Grand Opening will give a global view of public and private Cybersecurity initiatives to forge a united response to cyber threats, from policies and regulations to PPP, from industry solutions to best practices. The European Union‚Äôs responses to cyber threats has paved the way to cooperative cybersecurity between Member States with the NIS Directive, cPPP, IoT ‚ÄúTrust Label‚ÄĚ, Privacy, GDPR, eIDAS and a renewed cybersecurity framework in preparation. On the other side of the Atlantic, the US NIST‚Äôs Framework also aims to the convergence of cybersecurity responses. The recent development of these initiatives, and others from around the globe, will be presented and discussed in the first part of the Opening. The second part will focus on private sector cybersecurity responses with focuses on Digital Identity management and IoT security challenges.
‚óŹ Policies for cooperation at EU level: Cooperation and protection of infrastructure, Crisis management
‚óŹ Emerging EU policy areas
‚óŹ Strategies: Cooperation, Preparedness, Certification
‚óŹ H2020 EU project AEGIS presentation: stimulating cooperation around cybersecurity
‚óŹ EU-US Cybersecurity reflection on Research and Innovation
‚óŹ EU-US Cybersecurity reflection on policy and legislation challenges in cybersecurity and privacy
‚ÄĘ Personal Identity Card with free Digital Signature
‚ÄĘ Signature for Internet Communication
‚ÄĘ Name the ‘dark side’ of the power
‚ÄĘ Privacy Initiative
‚ÄĘ Back to the responsible Citizen
‚ÄĘ Reality Check
European Cyber Security Leaders (ECIL): harmonization replace fragmentation, NIS2.0 should follow NIS, rapide action force is indicated, incentive for private actors to participate on security information sharing, recommendations for asset protection of SMEs in EEA, security algo based on guidelines from EU, staged security and mutual acceptance is needed, backdoor for illegal use must be prevented, EU regulatory sandboxing is recommended, new cyber security innovation via economic incentives.
‚ÄĘ Life is becoming more digital so crime is following the trend
‚ÄĘ With 15 connected objects for each user are we going to be physically hacked and harassed by things?
‚ÄĘ Passwords are dead and new tools are absolutely required
‚ÄĘ Privacy will become absolutely essential to protect our digital patrimony
|Smart Security Week Innovation Live
2.00pm: Exhibition Opening
‚óŹ The background of the Program of Citizen Identification Number (NIK) in Indonesia
‚óŹ The regulations to support the program
‚óŹ The e-ID Card Project as an implementation of ‚ÄúNIK‚ÄĚ program
‚óŹ Progress and prospect of the program
‚óŹ Many African countries are building together their digital strategy including e-gov and cybersecurity aspects
‚óŹ How the three strategies are articulated one to another
‚óŹ Examples coming from Africa and Europe
‚óŹ e-ID (and e-IDAS) impacts on economic development and social inclusion of emerging countries.
‚óŹ ID management in developing markets through mobile phone and blockchain¬Ķ
‚óŹ Sharing concrete field experience of a pilot in Kenya, results, challenges, learnings, opportunities, etc
‚óŹ Initial use case around KYC registration for SIM and mobile money. Description of user experience
‚óŹ Objective of establishing a trusted and certified Proof of Existence and Proof of Address for anyone
‚óŹ Future of Identity Management
‚óŹ From printed ID documents to Identity Applications on smart phones
‚óŹ Is Cost Justification possible for Security Printing Improvements?
‚óŹ How to implement new government services?
‚óŹ How service providers can leverage existing infrastructures on which to deploy mobile ID solutions, resulting in significant cost and time savings
‚óŹ How GlobalPlatform‚Äôs infrastructure robustly safeguards the security, integrity and privacy of services deployed on a platform alongside services from other providers
‚óŹ The crucial role of the secure component in deploying mobile ID solutions
‚óŹ Blockchain as a Trust Broker ‚Äď Public Private Decentralized Ledgers
‚óŹ IBM POV on digital Identity for Governments
‚óŹ Blockchain and Cyber Security POV
‚óŹ Identity ‚Äď Fundamental to Access ‚Äď Financial and Economic Inclusion, Access to Health and Social Services, Education, Governance and Transparency
‚óŹ The Issue with Identity and how blockchain can help (self-sovereign digital identities)
‚óŹ How such an identity forms the basis for secure e-gov services on blockchain tech
‚óŹ Switzerland as a logical hub for companies involved in such products (democracy, stability/security, data protection
‚óŹ Blockchain is excellent for ensuring immutability, and thereby that identities cannot be deleted
‚óŹ Blockchain is not the best when it comes to privacy and the right to be forgotten
‚óŹ A new distributed infrastructure is needed, where blockchain is an important part
‚óŹ Four storage areas in the distributed network: blockchain, IdP truststore, identity data, secret key
‚óŹ I present evidence on the link of identity systems and financial intermediation in 172 countries
‚óŹ The analysis shows a positive effect of identity systems on financial access and intermediation
‚óŹ Additionally I present more detailed results from FinScope at the country level on who is identified
‚óŹ These results give a very good idea who has to be targeted with roll-out interventions
‚óŹ Vision of a national ID system at the service of the citizen
‚óŹ Where to start in the maze of challenges related to CRVS and NID
‚óŹ Complete analysis of two countries National ID Systems with particular focus on CRVS
‚óŹ Looking at the wider context that CRVS implementations are considered in
‚óŹ New ideas to accelerate and drive investment in CRVS
‚óŹ Ideas for collaboration
The ICAO TRIP strategy outlines the so-called five elements of traveller identification management, of which Evidence of Identity is one of the key parts. To contribute to improved information sharing on good practices in identity management the OSCE (Organization for Security and Co-operation in Europe) developed a Compendium of Good Practices in Identity Management in the OSCE Region.
The Compendium is intended for the use of identity management practitioners and policymakers who are exploring options to improve their national identity management infrastructure as a whole or some of its individual components. The benefit of the Compendium comes from the wealth of information it provides in a structured and analytical format about the characteristics of identity management systems in OSCE participating States.
Presentation of the Compendium is accompanied by the presentations of select OSCE participating States showcasing their experiences in developing and improving frameworks for issuance of national identity cards and travel documents.
● Introduction by Donal Mc Guinness
● Moving to Real Time Identity Assessment
Recent high profile data hacks of PII (Personally Identifiable Information) have shown that the storing and management of PII is very tough.¬† It also proves that static PII alone isn‚Äôt necessarily strong proof of a person‚Äôs identity online. How to further ensure that the person is who they say they are?
What can be added to the mix in order to uncover instances of identity theft and account takeover in real time?
● Managing Customer Consent and Privacy
Consumer consent is a big issue today, and even more with the new GDPR regulations coming into force. Upon end-user consent, his personal data is used for specific use-cases, each marketed as a different service addressing specific use cases, in order to validate his identity, ease of registration, and/or ensure instantaneous location.
How to best manage this and maintain a smooth user experience?
● Role of Standards
What sort of standardisation is in place Mobile Identity and what are the best practice?
● New Territories of Identity Services: Focus on Financial Services
Many countries still only recognise a Face-to-Face KYC for onboarding new customers. What are the lessons to be taken by comparing and contrasting the countries regarding FS provision?
How has awareness developed among users regarding these services?¬† Any campaigns that aided consumers to identify and trust the digital identity offering?
● New Business Models for Digital Identity
Are there roles for complimentary identity players to participate in the eco-system; the likes of banks, utility companies, government agencies, etc.? what ideas do we have for clear business models for finding a win-win for all?
DEMO Video identification by G+D
DEMO Identity Proofing & Verification (IPV) by Morpho
With: G√°bor Bartha, Tuire Saaripuu, Jon Shamah, Shaun Topham.
eIDAS, the cross-border e-ID model which the EU has designed for the Europeans, has the potential to play an integral part of the global online ecosystem of the future. eIDAS-compliant e-IDs can provide a viable solution for accessing them and bring many benefits for platforms and their users.
Having the possibility to use a secure and reliable eID can be instrumental in building trust among strangers, while providing the necessary convenience and security. And since the use of eIDs in the global digital environment is a choice, nor an obligation imposed by regulation, it is important to define collectively some principles and rules that we can jointly subscribe to and which reflect our common understanding of how we can interact in the future.
Lessons learned in this context from the feedback gained from the ongoing deployment of eIDAS nodes will help elicit elements which be of value more globally, and in the formulation of plans for new eID systems in developing countries.