World e-ID & CyberSecurity - Digital Identity and Data Protection for Citizens and Businesses | Sept. 25-27, 2017 – Marseille, France

2016 Program

Download the program
PROGRAM AT A GLANCE
DAY 1 – Monday Sept. 26 Afternoon
World e-ID and Cybersecurity Innovation Live
PLENARY GRAND OPENING
SECURING GLOBALLY CONNECTED SOCIETY

2.00pm: EXHIBITION OPENING

Welcome Cocktail
DAY 2 – Tuesday Sept. 27
Track 1:
Technologies & Enterprise
Track 2:
Countries & Use cases
Workshop Innovation Live
Mobile ID Implementation:
Status and Outlook
ID for Development: Quo Vadis 2016
Statelessness & Inclusion
WORKSHOP
Identity Theft & e-Crime Observatory
Exhibition & Demos
New Trust Architectures for Digital ID ID4D: Civil Registration
and Applications
 
ID4D: Digital Identity,
Democracy & Peace
 
Exhibition & Demos
Smart Security Week Awards Ceremony
Gala Evening
eIDAS: Trust for Digital Transformation ID4D: Public & Private Sector
Cooperation
DAY 3 – Wednesday Sept. 28
Digital Identity in Europe Exhibition & Demos, Business meetings
Next Gen Secure Documents
Exhibition & Demos, Business meetings

DAY 1 - Monday September 26 Afternoon

2.00pm – 6.30pm: Opening Session | 3.50pm – 4.30pm: Coffee & Refreshment Break – Networking – Exhibition

PLENARY OPENING
SECURING GLOBALLY CONNECTED SOCIETY
Chaired by Jon Shamah, Principal Consultant, EJ Consultants, UK
The Opening addresses transversal topics of the 3 Smart Security Week conferences: World e-ID & Cybersecurity, Connect Security World and Security Automation World.
INTRODUCTION
Day 1
26 Sep 2016
Jon Shamah

Introduction

PART 1: IoT Security
Day 1
26 Sep 2016
Art Swift

KEYNOTE What’s Wrong with IoT Security and How Can We Fix It?

INNOVATION LIVE

PART 2: Introducing Security Automation World
PANEL: “From breach prevention to acceptance:
defining a sustainable security strategy to protect data”

PART 3: Identity & Access
Keynote: Cognitive Access Management
PANEL: “Identity on the blockchain”
Day 1
26 Sep 2016

KEYNOTE Cognitive Access Management

Today’s dynamic nature of organizations contributes to complexity for monitoring and controlling access and identity cyber-risks. Solution: Apply continuous learning, reasoning and human interact-ability to Identity and Access management domain.

  • Apply machine learning and cognitive approach on identity and access data
  • Aim at providing risk aware identity analytics
  • Recommend peer reviewed analysis to reviewers, administrators and business executives.
Peter Went

KEYNOTE World Citizen Card, a ‘token’ and/or ‘blockchain’?

Mr. Went will present his holistic view on ‘identity’, from the why  an identity, the impact of no identity, the right to an identity and the ‘foodchain’ of an identity. The latter is relevant in that there are layers of identity, from ‘simple’ breeder documents, to national ID documents to international (traveler) documents. Conventionally international (traveler) documents are physical documents like a passport, but ‘blockchain’ could be a consideration here.

John Erik Setsaas
Jim Dray
Peter Went
Jon Shamah

IDENTITY ON THE BLOCKCHAIN
PLENARY PANEL

Setup and moderated by Jim Dray, Senior Computer Scientist, Information Technology Laboratory, National Institute of Standards and Technology (NIST)

Blockchains have the potential to revolutionize business on the Internet and will undoubtedly impact the identity management world. However, the nature of this impact is not yet clear. This panel will explore the intersection of blockchain technology and identity management:

  • What capabilities does blockchain technology offer that can improve identity management?
  • What are the drawbacks of blockchain technology in the identity space?
  • Who is currently experimenting with identity on the blockchain?
  • What commercial offerings are available?
  • Are there opportunities for international collaboration?

INNOVATION LIVE

DAY 2 - Tuesday September 27

9.00am - 1.00pm: Break-out Sessions | 10.50 - 11.20am: Coffee & Refreshments Break – Networking – Exhibition

Track 1: Technologies & Enterprise
Mobile ID Implementation:
Status and Outlook
Session Chair: Jonas Andersson, Principal, A&A Marine Vision
Mobile IDs are no more a concept: Governments have the opportunity to provide citizens with new levels of convenience while enhancing their capabilities to deliver secure ID programs. And the private sector benefits from a stronger authentication while keeping it simple for customer. This session will decrypt the progress made by mobile ID technologies and assess the remaining challenges to deploy them through concrete case studies.
Day 1
27 Sep 2016
Adam Tangun

Mobile IDs: a New Level of Real-time Connectivity and Computing Power

    • A major shift in government-to-citizen ID credentials underway
    • Benefits of mobile ID for governments
    • New mobile ID platforms
    • Case studies from Europe, Africa and the United States

.

Jana Krimpe

Mobile ID – Your Mobile Passport in the new generation Government

  • How to establish Mobile ID infrastructure based on private-public-partnership (PPP) model?
  • Asan İmza (Mobile ID) – a technology needed for moving from e-government to m-government
  • How Asan İmza functions – the complete description of the Mobile ID ecosystem in Azerbaijan
  • Cases of use of Asan İmza – from e-services to cross-border digital signature platforms
  • Asan İmza (Mobile ID) – a key to Islamic digital market
Gil Bernabeu

Providing Security for Derived Mobile ID Credentials

  • Overview of derived mobile ID credentials and how they can complement traditional
  • identification credentials
  • Examples of when and how issuing derivatives of the same ID is useful.
  • Insight into the GlobalPlatform standard to simplify the issuance and deployment of derived credentials
Sridhar Bhupathiraju
Darmawan Suwirya
Benoit Famechon

Mobile Identity, Mobile Connect and a Twist

Speaker: Sridhar Bhupathiraju

  • Introduction to some Mobile Identity standards: Mobile Connect, openIDConnect, ….
  • Use cases and deployment challenges for Mobile Connect
  • A twist to keep simple user experience without compromising on security: one time key
  • Benefits to this new type of authenticator for a Mobile ID solution

PANEL DEBATE: 2016, the year of Mobile ID?

As government and private sectors initiatives are flourishing, what are the key trends emerging in terms of technologies, standards, privacy issues, etc.

Track 2: Countries & Use cases
ID for Development: Quo Vadis 2016
Session coordinated and chaired by Sanjay Dharwadker, Head Global ID Consultancy Practice, WCC Smart Search & Match
Sponsored by  

Introduction – The Billion that are done and over a Billion that remain
Day 1
27 Sep 2016
Dr. Ajay Bhushan Pandey

KEYNOTE Aadhaar: Empowering A Billion Indians

Vyjayanti Desai

KEYNOTE

ID for Development – Session 1
Statelessness & Inclusion
Day 1
27 Sep 2016
Melanie Khanna

Legal Aspects of Identity and Statelessness (Title TBD)

Dr. Laura Van Waas

Identity without belonging: What does legal identity mean for those denied nationality?

  • Legal identity is both an individual and public good:
    • all people have inherent identity and a right to this being recognised (individual) and
    • states have an interest in knowing who is on their territory for policy purposes (public) related to resource allocation, the delivery of goods and services and security.
  • The implementation of SDG 16.9 has the potential positive effect of ensuring that all people have their legal identity recognised, with the resultant positive individual and public consequences.
    • However, with every exercise in inclusion, there is a risk of (inadvertently) creating greater exclusion. In respect of SDG 16.9, there is the potential that this will lead to:
      • Heightened cost to individuals whose identity is still not recognised, making their already difficult situation even worse, as they are further shut out
      • Heightened cost to individuals whose identity is wrongly attributed, due to failure of the SDG process to engage with more fundamental and structural issues such as the fairness of laws and policies on nationality or the challenges faced with implementing these laws: creating or entrenching an identity without recognising belonging
    • Thus, the relationship between statelessness and SDG 16.9 is a difficult one, that must be taken on board and addressed. Most importantly, the indicators and related planning must take into account the potential impact on statelessness. In doing so, it is essential to look at the related human rights obligations of states, as set out in the CRC, CRPD, CEDAW, CERD etc.

    Session Wrap-Up

    Workshop
    WORKSHOP
    EKSISTENZ and eCRIME EU Projects – Session 3:
    Progressing the European Observatory on Identity Theft
    The EU project EKSISTENZ European Observatory on Identity Theft and eCrime (EOITEC) will be launched at World eID and Cyber-Security. More
    A key objective of EKSISTENZ is to lead key actors during the establishment and development of a European observatory on identity theft and eCrime. The workshop will bring together those active within the relevant research space and across the EU to provide a focal point and repository of knowledge for EKSISTENZ and sister projects along with initiatives such as the Porvoo Group. As it grows, it will take on a second, “citizen-facing,” persona. The EOITEC and its website will together and ultimately inform the citizen on methods, procedures and possibilities to recover his/her identity after theft, serve as a policy adviser to EU MSs, advance a common view for European identity protection through guidelines and assistance and build an identity think-tank for Europe and beyond.



    Day 1
    27 Sep 2016
    Baudouin de Sonis

    Introduction: What we wish to achieve, Progress made, Relationship with eIDAS European Observatory etc.

    Dr. Shaun Topham

    Initial Results contributions to the Observatory Repository Overview from EU projects

    • EKSISTENZ Project, Dr. Shaun Topham, President EU e-Forum, Senior Expert EU-China Smart Green Cities Initiative
    • eCRIME Project, Dr. Timothy Mitchener-Nissen

    New Trust Architectures for Digital ID
    Session Chair: Slawomir Gorniak, Expert in Security Tools & Architecture, ENISA
    Day 1
    27 Sep 2016
    Dr Bud P. Bruegger

    LIGHTest—H2020 Project to Create a Global Cross-Domain Trust Infrastructure

    • Overview of new H2020 project relevant for a wide range of applications, incl. identity management
    • Relevant for a wide range of applications, incl. identity management, e-signature, eprocurement,implementation of eIDAS, etc.
    • First realistic approach for a really global and generic trust infrastructure
    • The global, inclusive, and collaborative approach creates opportunities for active participation
    Jan Rochat

    New Ways of Identification, Authentication & Digital Signing

    Jerome Brugger

    Quality Assessment of Attributes in Federated Identity Systems – Key to Lively e-ID Ecosystems

    • Outlook to the challenge of attribute quality in a federated identity system
    • Overview presentation of the Swiss E-Government Standard on Quality of Attributes (eCH-0171)
    • Comparison of the standard with other approaches
    • Alternative quality approaches by using “redundant” information
    Jon Shamah

    Future Trust Services for Trustworthy Global Transactions

    • Open Source components and services complementing eIDAS ecosystem
    • Integrating similar trust services from other regions worldwide
    • Pilots in Austria, Germany, Portugal
    Tarvinder Sembhi

    Linking Foundational Identities, Civil Registries & Identity Programs

    • Linking foundational identities often requires you to start with functional identity programs
    • Thus the identity platform should be underpinned by a robust identity resolution engine
    • As functional identity programs are implemented, collect civil registration and breeder document information
    • Implement comprehensive CRVS systems as budgets allow, independent of legal aspects and policy

    ID for Development – Session 2
    Civil Registration and Applications
    Day 1
    27 Sep 2016
    Mia Harbitz

    Anneke Schmider

    Skye Gilbert

    PANEL DISCUSSION: Has Information Technology Been Able to Map CRVS Requirements? Why the Gaps?

    WORKSHOP
    EKSISTENZ and eCRIME EU Projects – Session 3 – Part 2
    Day 1
    27 Sep 2016
    Baudouin de Sonis

    Working Session to come to final agreement on the nature of the Observatory

    Co-ordinated by Baudouin de Sonis

    Dr. Shaun Topham

    Conclusions and Next Steps

    1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 6.45pm: Break-out Sessions | 3.50 – 4.30pm: Coffee & Refreshments Break – Networking – Exhibition

    Banks Pioneering Strong ID for Consumers
    Session Chair: Gilles Polin, Managing Consultant
    Day 1
    27 Sep 2016
    Didier Serra

    Can I see Some (Digital) ID?

    • Securing online identities
    • How and why financial institutions are pioneers in strong and
    • secure authentication for consumers
    • A stronger identity verification offering
    Arne Vidar Haug

    Solving Europe’s Identity Crisis

    • Financial institutions across Europe are facing challenges caused by regulation, decreasing customer satisfaction, increased competition from digital players, rising fraud and reduced return on equity.
    • On-boarding customers quickly is essential to remaining competitive and one obstacle to this is proving identity. Banks and fintechs have to adhere to stringent KYC processes to comply with regulations – which often include the requirement to provide physical forms of ID. The result is a painful process for both consumers and companies.
    • Signicat – a fintech company that helps banks to connect to existing ID systems across Europe – believes that by re-using existing private and public ID systems financial institutions and other regulated businesses could eliminate these pain points.
    • By re-using existing ID, banks can allow consumers to register and use services quickly and simply, and banks can accelerate expansion, boost market share, and accelerate regulatory compliance.
    Christophe Remillet

    Why the Facial Biometry Revolution is Happening in Financial Services?

    • The 4 digital authentication key challenges are user experience, security, universality and cost
    • Strong biometric performances mean nothing if it can be hacked in less than 15 minutes
    • Universality is also about the solution you bring to poor/illiterate people
    • 3D facial biometry currently offers the best overall solution

    ID for Development – Session 3
    Digital Identity, Democracy & Peace
    Day 1
    27 Sep 2016
    John Edge

    Unique and Digital: Leveraging Technology to Support the Identity Agenda

    • What is “digital identity”?
    • Why is digital identity a critical element of the identity agenda?
    • What are the technical specifications of digital identity and what emerging technologies could play a role in reaching these goals?
    • How do we harness the private sector to deliver on these aspirations?
    Shashi Raghunandan

    Identity challenges in the Humanitarian Context

    • Humanitarian Organizations face a range of challenges when it comes to identity
    • There is a need to create a common industry voice and vision to resolve these challenges
    • The presentation will aim to articulate the challenges, highlight the vision and the progress being made in moving toward this vision
    Niall McCann

    Marielle Debos

    Identity, Democracy & Biometrics – The Chad Experience

    Election technologies are booming in Africa. Under which conditions do these technologies confer credibility on the polls ? What are the potentialities and limits of biometric voter registration? Based on the case of Chad, this presentation will show that biometric voter registration raises a lot of expectations but does not prevent rigging when the social and political conditions are not right.

    PANEL DISCUSSION: Is identity a weapon in the politics of development?

    eIDAS: Trust for Digital Transformation
    Session Chair: Gilles Polin, Managing Consultant
    The European eIDAS regulation, rolled out on July1st 2016, is a major step allowing EU citizens, businesses and public administrations to go digital with electronic identification and trust services such as electronic signatures, seals, timestamps, electronic registered delivery services and website authentication. Through multiple case studies, this session will give the first lessons of eIDAS implementations and explores the nes trusted services associated to it.
    Day 1
    27 Sep 2016
    Mads Henriksveen

    New Trust Services for Acceleration of the Digital Transformation

    • The new eIDAS Regulation and the electronic identification and trust services covered
    • What is Qualified Website Authentication Certificate and (QWAC) and how are QWAC compared to SSL/TLS certificate?
    • What is an electronic seal compared to an electronic signature? How to use electronic seal in your digital transformation?
    • Showcase cross-border electronic trust services best practices, identify opportunities and possible hurdles.
    Slawomir Górniak-2016

    Technical Guidelines Implementing eIDAS Regulation

    • Status of deployment of eIDAS Regulation
    • Implementing measures of eIDAS
    • Technical guidelines developed by ENISA and stakeholders
    • Other ENISA studies in the field
    Ivan Nabalon

    eIDAS Changes Everything

    • Public eIDAS reborn an outdated and ineffective industry (eTrust Services) but truly necessary for public and private business and their digital transformation.
    • eIDAS impacts seriously in European GDP and empower European Based Business to compete outside
    • eIDAS enables e‐Admin to complete digital transformation the next 4‐6 years
    • A new range of solutions based on eIDAS enable states to perform an Active Democracy
    Kjell Hansteen

    Nordic Digital Identification – A Survey

    • National eID systems well suited for domestic purposes, but not adapted to cross border use
    • National eID assurance policies differs much. The eIDAS regulation is not going to solve this issue
    • The “Waiting Room issue”; as eGov services require local national person identifiers
    • Nordic eSignature practice is different
    David Ruana

    Successful Digital Transformation Cases using eIDAS

    • Making the digital transformation with Mobile ID’s verified identity services
    • Offering eSignature in the cloud, SSO, federation functions and 2FA
    • Making the digital transformation with eIDAS
    Robert Bielecki

    eIDAS in a Cloud, Mobile, Simple & Safe

    • Electronic Signatures in a Trusted Cloud is hard to implement, however…
    • Once achieved the goal, it enables advantages for all parties: provider, integrators and end users
    • The case study shows how LuxTrust has made it to offer mobility, simplicity transparency and security

    ID for Development – Session 4
    Public & Private Sector Cooperation
    Day 1
    27 Sep 2016
    Samia Melhem

    Stéphanie de Labriolle

    World Bank – Security Identity Alliance Joint Report Findings: Role of Private Sector Participation and PPP Model (Title TBC)

    Yiannis Theodorou

    Digital Identity: Towards Shared Principles for Public and Private Sector Cooperation

    PANEL DISCUSSION: How will Public-Private Partnerships Accelerate the Quest for Legal Identity and Birth Registration for All by 2030?

    Closing – Quo Vadis 2016
    Day 1
    27 Sep 2016
    Sanjay Dharwadker

    The Changing Narratives of Identity – Papyrus to the Merkle Tree

    DAY 3 - Wednesday September 28

    9.00 – 10.50am: Break-out Sessions | 10.50 – 11.20am: Coffee & Refreshments Break – Networking – Exhibition | 11.20am – 1.00pm: Break-out Sessions

    Security Advances for e-ID and Authentication
    Session Chair: Detlef Houdeau, Conference Program Committee Chair
    Have an update on the latest advances of a key security foundation for digital identity and strong authentication: cryptography. This session will review recent achievements concerning novel designs and integration strategies of cryptographic technologies, with regards to biometrics authentication and standardization challenges.
    Day 1
    28 Sep 2016
    Kim Schaffer

    Revisiting Authentication Metrics

    • Authentication continues to be a challenge as there is little or no metrology
    • Measuring Strengths of Authentication continues to be different for different mechanisms
    • A framework for determining the correct authentication mechanisms in a given environment is proposed
    Miroslaw Kutylowski

    Emerging Cryptographic Technologies for e-ID

    • 1 – Rethinking functionalities of electronic identity documents
    • 2 – New cryptographic concepts implementing privacy-by-design and eIDAS
    • 3 – Reducing the trust assumptions and certification costs
    • 4 – Self-evident protection of personal data and preventing forgeries
    Libor Neumann

    “On-the-fly” Migration of eID to Elliptic Curves Cryptography

    • Long-term sustainability of eID ecosystem
    • Modified universal eID cryptographic protocol for Elliptic Curves Cryptography
    • eID system requirements for on-the-fly cryptography migration
    • Migration enforcement and management in different situations
    Dr. Claude Barral

    Biometrics and Liveness Detection Issues in Mobile Devices

    Since 2013 and the arrival of the iPhone 5s on the market, more and more mobile devices for the consumer market arrive with biometric features for user authentication: fingerprints, face, iris, voice and so on. But what about the real security level of such devices and especially their trade-off between user convenience and security? User convenience is the major concern in such consumer market for manufacturers and end-users adoption with compulsory low false rejection rate and extremely fast recognition process. This may only be possible with compromising on the security level: intrinsic increase of the false acceptance rate and very weak, or even bypassed, liveness detection measures. This talk will highlight weaknesses of most recent biometric-enabled phones and other portable devices; will outline different liveness detection techniques and will present a wearable with so-called “augmented biometrics” with effective liveness detection which allow excellent user convenience without compromising the security.

    Dr. Beatrice Peirani

    Cryptography: a Pillar of Cybersecurity

    • Cryptography plays a central role in cybersecurity
    • Several organizations give recommendations on algorithms and key sizes
    • We need to work on quantum-resistant algorithms

    Digital Identity in Europe – Part 1
    Session Chair: Jon Shamah, Principal Consultant, EJ Consultants, UK
    Europe now counts 26 States issuing e-ID Cards in the public domain, the oldest program was started 1999 in Finland, the latest being Hungary and Ukraine last January. This session will review the latest European identity services projects selected for their renewed approach of delivering government identity services.
    Day 1
    28 Sep 2016
    Stefane Mouille

    Future of Digital Identities in 2020 in Europe

    • Digital identification in the public domain in Europe
    • New trends on card interface and travel functionality
    • Mobile application & derived identities
    • Future of eID in Europe
    Olivier Cipière

    Remote ID Proofing: Challenges and Solutions

    Sandy Porter

    Royal Mail and Citizen Safe Identity Services for UK Government

    • The major change in delivering government identity services that the Royalmail and Citizensafe identity services are at the forefront of
    • How these services are the driver for new innovative government and commercial identity and attribute services
    • Attribute exchange services that verify data but have privacy and user consent
    • Value of government and commercial services working together
    Ott Vatter

    e-Residency – the World’s First Digital Society

    • The first secure transnational digital identity issued by the Republic of Estonia.
    • A borderless digital society and unleashing the world’s entrepreneurial potential.
    • It does not matter where you are, it matters who you are.
    • Countries are competing with each other for talent that is constantly moving
    Dr. Lorenz Muller

    The New Swiss e-ID Concept

    • 1‐ How to implement a trustworthy, largely accepted and economically successful E‐ID in Switzerland
    • 2‐ Providing the Swiss E‐ID on three trust levels through accredited IdP operating in the market
    • 3‐ Usability and pervasiveness for the users as well as trust and economic advantages for IdP and relying parties are the keys for a successful E‐ID solution
    • 4‐ The Swiss government opts for market driven E‐ID solutions and cooperates with trustworthy IdPs

    Next Gen Secure Documents
    Session Chair: Detlef Houdeau, Conference Program Committee Chair
    Day 1
    28 Sep 2016
    Erik van Dijk

    What is Required to Build a ‘Security Chain’ in an eDocument Issuance Program?

    • Overcoming the operational and technical complexity of developing fully secure eDocuments programs
    • Secure Identity Alliance’s  eDocument Security Awareness Model (eSAM) Tool
    • Examples of high and low-end scenarios
    Alexandre Joly

    Switching from Graphic to Chip-Centric ID Control in the Age of Mobility

    • Chips of eID documents contain highly reliable but underexploited information
    • eID control requires high end equipment to reveal graphical security features
    • A secure and efficient mobile verification can only be completed through electronic security
    Alexander Ristic

    Identity Management 4.0 – From printed documents to Identity Applications

    • Identity Management 4.0
    • Is cost justification possible for security printing improvements?
    • From printed documents to Identity Applications
    • How to increase security in government administration?
    Marjo Geers

    Smart Tachograph New Security Concept

    • New Generation of Digital Tachograph in the EU
    • Specifications introduce new, state-of-the-art security concept with updated PKI, crypto algorithms and security protocols and introduces security mechanisms for new DSRC and GNSS interfaces.
    • New Smart Tachograph security concept has been designed and specified by UL
    • Migration phase will be discussed
    Dr. Markus Clabian

    FastPass – A harmonized modular reference system for automated border crossing (ABC)

    • Advanced technology for ABC systems
    • Piloting ABCs on air, sea and land borders
    • Security assessment of ABC systems

    Digital Identity in Europe – Part 2
    Session Chair: Jon Shamah, Principal Consultant, EJ Consultants, UK
    Day 1
    28 Sep 2016
    Pierre Gacon

    Tackling Identity Theft: Results from the EKSISTENZ EU Project

    Dr. Shaun Topham

    The EU Data Protection Directive and its Impact on Developing “Smart Cities”

    (Speaker TBC)

    Alberto Crespo

    ABC4EU & Smart Borders Initiative: improved security and facilitation of external borders crossing

    • Registered traveller systems for Third Country Nationals Facilitation
    • Innovation at the borders: assisting border guards with mobile-based solutions
    • Optimizing ABC processes across the Schengen Area: ABC4EU outcomes and their application in the context of the revised Smart Borders Package
    Sergii Ferlii

    The Evolution of National Identification in Ukraine

    Oleg Shvaikovsky

    Impact of e-ID on Public and Private Services

    • Trust in the online environment is key to economic and social development
    • The domain of issuing identity including e-ID should be a fundamental government tas
    • e-ID success lies on balanced development of four pillars: Legal infrastructure, Technology, Services and Human Behaviour and Inclusion
    • To encourage usage of e-ID Public Sector should take lead in building Seamless Society.
    1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 6.45pm: Break-out Sessions | 3.00 – 3.20pm: Coffee & Refreshments Break – Networking – Exhibition

    Addressing the Need for IoT Security
    Session Chair: Laurent Sourgen, Director – Strategic R&D programs, MMS Group, STMicroelectronics
    Day 1
    28 Sep 2016
    Gustavo Tanoni

    Bootstrapping Security – the Key to Internet of Things Authentication and Data Integrity

    • The Challenge to provide authentication to billions of devices
    • How to do end –to‐end encryption from sensor to enterprise software in a scalable way for billions of devices
    • Extending the reach of cellular networks to the IoT, for authentication and data confidentiality
    Dan Butnaru

    The Internet of Identity – What federates IoT?

    • IoT is not one single market, but many different ones.
    • Security needs for different IoT segments (Transport, eHealth, Industry 4.0, etc.) are depicted.
    • Identity and Privacy are the common denominator of all IoT security needs.
    • The contribution explains the security schemes that are or will be adopted in the near future
    Sridhar Bhupathiraju
    Darmawan Suwirya
    Olivier Potonniée

    Seamless Online Authentication using Bluetooth Devices in Proximity

    Speaker: Sridhar Bhupathiraju

    Connected Stadium Security
    UEFA Euro 2016: Cybersecurity 3 – Terrorism 0
    Session Chair: Gilles Polin, Managing Consultant, France
    Securing sensitive public-privatized spaces in the framework of demanding events such as UEFA Euro 2016 stadiums.
    Day 1
    28 Sep 2016
    Ziad Khoury

    KEYNOTE Euro 2016 Cybersecurity Lessons (Title TBC)

    Gilles Polin
    Ziad Khoury
    Jérôme Démolis
    Jean-Paul Thomasson

    PANEL – 360° Security Blueprint: Is Total Cybersecurity monitoring Achievable?

    Setup and moderated by Gilles Polin, Managing Consultant
    There has been a lot of talk in the media about the potential threat of terrorism facing the many angles of the EURO 2016 in France last summer.
    From fans using their smartphones getting access to ticketing or real-time information apps to organization’s internal communications or Critical Infrastructure Providers’ networks, cybercrime is more and more targeting major events trying to get revenues or organize disruption in conjunction with other criminal actions.
    In this session, we will look back to what happened over the last summer in France and talk about the trends and continuously evolving solutions in the field of Cyber security with key representatives of the hosting country and the UEFA.

    Cybersecurity: Mitigating the Risk to Business
    Session Chair: Detlef Houdeau, Conference Program Committee Chair
    Deploying the latest connected technologies in an enterprise is one of the most effective ways of driving new business and growth but it also increases the exposure to cyber threats. This session reviews the latest data protection technologies and services to detect threats and become more resilient to cyber-attacks.
    Day 1
    28 Sep 2016
    Uday Ali Pabrai

    Cyber Risk = Business Risk

    • 1‐ How to establish and audit‐ready compliance program
    • 2‐ Walk through how cyber‐attacks compromise sensitive enterprise assets
    • 3‐ Analyze critical areas to address in an enterprise security plan
    Apolline Aigueperse

    Russian Cybercrime

    • Which economical and structural factors drive the growth of Russian cybercrime?
    • What makes the Russian stolen data market so resilient and unique?
    • What is the typical profile of a Russian cybercriminal?
    • What will be the future trends on this black market?
    Bil Hallaq
    Dr. Timothy Mitchener-Nissen

    Towards Producing Effective Countermeasures to Combat ID-Theft and Fraud in e-Crime

    • Developing effective countermeasures for ID-Theft and Fraud within non-ICT sectors
    • Matching countermeasures to identified pinch-points within mapped cybercrime journeys focussing on economic cybercrime
    • Identified gaps that currently exist within portfolios of countermeasures focussing on economic cybercrime
    Alexis Fogel

    Does Employee Privacy End Where Enterprise Security Begins?

    Laurent Henocque

    Blockchain Based Rich and Agile Collaboration over Ultimate Privacy

    • Decentralized Trust using blockchain technology and Fido
    • Direct 1-1 exchanges using Diffie Helman key exchange and symmetric encryption
    • File embedded trust and semantics allow decentralized file organization, unlimited automation
    • Fully private collaborative work can be deployed above the user’s clouds and file systems

    Worldwide Deployments & Use Cases
    Session Chair: Gilles Polin, Managing Consultant, France
    This session gives a global view of the latest national/transnational e-ID deployments round the world. These innovative projects of various scales and services are detailed through concrete facts and figures, lessons learned and best practices for successful implementations.
    Day 1
    28 Sep 2016
    Rita Whittle

    KEYNOTE Digital Identity and Authentication: Improving Online Access to Government Services for Canadians

    • The Government of Canada (GC) has invested in online infrastructure and is collaborating with the private sector to further cyber authentication and identity management
    • A first in Canada’s public sector: an Innovative collaboration with the private sector created a Federation of Credentials
    • Developing a Pan-Canadian Identity trust Framework
    • Exploring strategic initiatives for the Government of Canada to improve the quality and integrity of program and service delivery by enabling the secure electronic confirmation of an individual’s identity information
    Samia Melhem

    World Bank’s Cloud Computing Toolkit (Title TBD)

    Dr. Takashi Obi

    Japan e-ID Card go to the next Stage

    • New Japanese e-ID program has been launched successfully
    • Several medical services can be securely linked to e-ID card
    • Prepare an e-id ecosystem based on new authentication scheme of PKI
    Roelof Troost

    A Refugee’s Journey: Becoming a Participant in Society

    • Somber outlook: there is no foreseeable end to the influx of asylum seekers into Europe.
    • Looking at the Asylum Seeker’s journey from their and from a government perspective: accept or reject the asylum seeker, place the refugee, repatriation.
    • More effective placement of asylum seekers across Europe: assigning them to locations based on best possible fit with regard to socio-economical aspects, education, skill & competence levels and available jobs.
    End of the conference