World e-ID & CyberSecurity - Digital Identity and Data Protection for Citizens and Businesses | Sept. 25-27, 2017 – Marseille, France

Call for Speakers

Deadline: March 31, 2017

Download Speaker Application Form
World e-ID & Cybersecurity brings together security professionals from government and private sector to explore and discuss how to improve secure identification and data protection for all. Now in its 13th edition, the conference is renowned for putting technology advances in a worldwide perspective through inspiring case studies along with outlooks over standards, regulations and policies evolution.
Over 2.5 days, its influential audience of 400+ project managers, government reps and technology experts join in to meet, learn, develop implementation best practices and international cooperation, see new perspectives and opportunities concerning their own plans in both public and private sectors.

WHAT’S HOT IN 2017?

At the crossroad of physical and online security, World e-ID & Cybersecurity 2017 will explore further the potential of secure identity technologies to address the new threats of our hyperconnected world, where cyberthreats and privacy concerns are rising. From printed documents to the identity of connected objects, the 2017 agenda will deliver a clear vision of the future as the boundaries are blurring between physical and online identification, between private and public sector cybersecurity or between citizen and consumer trust and privacy. These topics will be explored along three key themes:
– ID schemes and Secure Documents
– Digital Identity and Authentication
– Cybersecurity and Trust Models
ID schemes and Secure Documents: large scale rollouts of national IDs, border control, e-Passport, e-Driving Licence, e-Health schemes etc. keep progressing around the world. New generation technologies are being implemented in many countries, allowing multi-application and online access to public and private services. The most inspiring roll-outs and innovative technologies will be presented and discussed.
Digital Identity and Authentication: in our hyperconnected world, secure electronic identification, authentication and digital signatures are becoming central to protect the data of Citizens, Enterprises and Governments and to enable the digital economy. ID documents are well fitted to provide online identity services and Governments are also pushing Mobile Identity solutions offering more convenience.
In Europe, the eIDAS regulation now allows cross border use of e-ID and trust services for any online business activity.
The private sector is moving even faster with initiatives such as FIDO (Fast Identification On-line), the GSMA’s Mobile Connect solution used for example in Spain, Poland, Finland, the Adobe Cloud Signature Consortium not to mention other digital identify approaches by web giants… associated or not with innovative biometrics solutions. Another hot topics is the use of the Know Your Customer (KYC) trend for identification as seen in the banking sector and retail services.
Cybersecurity Strategies & Trust Models: along with the benefits of an open internet have come multiple threats such as identity theft and fraud, politically motivated attackers threatening critical infrastructures, espionage, etc. To ensure data protection and Citizens safety, more and more Governments address the Cybersecurity challenges at transnational scale through new standards, best practices, awareness-raising while organizations cooperate more actively with law enforcement agencies.
In Europe, the first EU-wide legislation on cybersecurity has come into play: the NIS Directive strengthening network and information security across the EU for essential services such as energy, transport, finance and health. New on the agenda, the General Data Protection Regulation (GDPR) will require that companies collecting, using and storing personal data have adequate protections and controls in place from may 2018.
The Internet of Things era also digital identity of machines, of objects and of persons in the Web and across domains and across companies
These topics, among others, will be addressed by World e-ID & Cybersecurity 2017 at both technological and strategic levels as detailed in the following list. Approximately 80 speakers and panellists will be carefully selected by the Program Committee. Your participation will be indeed an ideal opportunity to share expertise, visions and foster cooperation with leading organizations from over 60 countries.
Note the launch of the co-located conference “IDENTITY WORLD – Individual Recognition for Global Development” dedicated do realize the full potential of Digital Identity in developing countries. Contributions at any at any level technology, financing, socio-economic, legal, humanitarian… are invited.

LIST OF TOPICS
 ID SCHEMES AND SECURE DOCUMENTS
Case studies in Europe, the US, Asia Pacific, Africa, Middle East, South America:
National IDs:
– large scale programs, like RIC in Brazil, UIDAI in India, eID in Russia, GMPC in Nigeria, etc.
– e-Residence Permit (Alien Permits) and Asylum Seeker Card
– Education, Police, Military, First Responder, etc.
– Benefits programmes (unemployment, pensions…)
– Registration programmes, e.g. gun licence, voting
Note: a focus session on developing countries will be held jointly with Identity World
Transport and Security on the road
– eDriving License, eTachograph, eVehicle Registration, eToll collect, Taxi license and others
– EU regulations, recommendations, and roadmap
Travel documents and border control
– e-Passport:  3rd Generation SAC and 4th Generation LDS2.0
– eGate Programs worldwide
– Exit/Entry Programs worldwide
– Registered Traveller Programs worldwide
e-Health
– Transnational and national programs: in Europe, e-Emergency Card, e-Health cross border, eEHIC, EESSI, etc.
– National health cards projects, central vs. decentralized data management
– e-Health service as a subset of e-Government
Transnational e-ID initiatives and other working groups
– eIDAS coming into force as of 1st July 2016
– EU projects outcomes and perspectives such as EKSISTENZ on identity theft, FastPass on Border Control, COSTAR on SMEs cybersecurity, FIDELITY on e-Passport, ORIGINS on breeder documents, EOS projects (European Organisation for Security), e-MOBIDIG (Mobile identification interoperability group), e-SENS (Electronic Simple European Networked Services), PEPPOL (Pan-European Public Procurement Online), etc.
► Next Generation Secure Documents
– Multipurpose cards, e.g. combination of eGov Services, eTicketing, ATM, etc.
– Corporate security & access control solutions: card-based, biometrics-based, etc.
– Contactless cards, e.g. according ISO and NFC according ECMA
– new optical and electronical security features and combination of both
 DIGITAL IDENTITY & AUTHENTICATION
► Mobile ID services for Government, Enterprise and Bank
– Use cases of mobile ID applications and systems
– Challenges of Mobile Identity with mobile phones, tablets, tokens, etc.
– Secure mobile services and IDM
– Technology standards, such as ETSI, TCG, ISO, Global Platform, GSMA/Mobile Connect and others
► Biometrics and latest developments of matching, capture technologies, etc.
► Strong Authentication and Identity Infrastructures
– Trusted identities and privacy in Cyberspace
– Federated ID programs, NSTIC, FutureID and other initiatives
– e-Signature, e.g. qualified or mediated
– Security infrastructures: ICT, PKI, PKI 2.0, mobile PKI
– From IAM to IRM
► Biometric Security and Access Control Solutions
 CYBERSECURITY & TRUST MODELS
► Cybersecurity Strategies and Related Regulations
Building cooperation between government, military, law enforcement, enterprise and software development to consistent online security strategies:
– New EU-Regulation on Data Protection
– NIST with NSTIC in the US, TTIP related topics, bridge between other regions in the world
– EC NIS directive implementation, targets and milestones
– PPP Program of EC on Cyber Security
► Cybersecurity for Businesses
– CERTs, protection of organisations against cyber-threats and attack
– Technical and organisational measures
– Balancing privacy, security and usability
– Raising awareness about cyber threats
– Network Intrusion Detection System (NIDS), Anomaly detection technologies in ICT systems
– Separation technologies and references on ICT systems
– Big Data: Privacy and Security
► Critical infrastructures & IoT
– Security, certification and labelling of connected devices
– Energy network services & ICT security
– Health services, privacy and security cross border
– Transportation service & ICT security, e.g. airports, high speed trains operator
– Communication network services & ICT security, e.g. Web, Cloud, Mobile Network
– Financial service & ICT security
– Industrial Internet & security
– Cyber Defense Center and Services
FOR WHO?
The Program Committee is inviting presentation proposals from public and private sector organizations that are deploying/planning to deploy identity-based solutions and Cybersecurity strategies: government and enterprise strategy and project planners, online identity and digital services providers, system developers, implementers, managers and industry leaders, and others with extensive relevant experiences and insight.
Additional Participation Opportunities
► IDENTITY WORLD conference: share your vision and expertise of identity for global development.
► WORKSHOPS & TUTORIALS: World e-ID and Cybersecurity will host focused workshops and tutorials on the hottest e-ID and Cybersecurity issues.
► SMART SECURITY WEEK AWARDS: Get prepared! The Smart Security Week Awards will spotlight the best e-ID & Cybersecurity solutions. Finalists will be invited to the Awards ceremony during the Gala Evening. The Awards selection process will start in May 2017.

HOW TO SUBMIT?

Please send your speaking proposals using the submission template.
Authors are invited to submit their proposals electronically to lperron@strategiestm.com.
If authors do not receive acknowledgment within 72 hours, they are kindly invited to contact directly lperron@strategiestm.com.
All speaking proposals must be original ones and should be informative and impartial. The Program Committee will reject commercially-oriented presentations.
Deadline for abstract submission: March 31, 2017
Decisions and Presentation
Notification of acceptance or rejection will be sent to authors on April 28, 2017.
Authors of accepted presentations commit themselves to present their paper at the conference. In case of personal impediment, the speaking person should appoint the backup speaker.
Speaker’s registration
Registration fee is included in the Platinum, & Gold & Silver sponsor packages for one speaker. Regular registration speaker’s registration rate is €550 excl. vat. Speaker registration gives access to the conference & proceedings, breaks and lunches, networking tool. Speakers’ travel and accommodation expenses are not covered by the organizers.
Proceedings of the conference will be available at the opening of the event. Clear instructions about the proceedings will be sent to the authors of accepted presentations.
The organizers commit themselves not to disseminate the presentations before the conferences.
Other important dates:
► Official Program Appearance: June 1st, 2017
► Complete presentation for the proceedings: August 26, 2017
PROGRAM COMMITTEE
Chairman: Dr. Detlef Houdeau, Senior Director of Business Development, Identification Market, Infineon; Member of Silicon Trust, Eurosmart and BITKOM
Program Committee members: see online.