Identity Proofing – The Cornerstone of Strong Online Identities: Identity Proofing is the cornerstone of strong, trusted digital Identities. Adoption of advances in identity ecosystem technologies can fundamentally strengthen trusted digital identity and enhance quality of life, service, and user experience. The panel will highlight policy changes supporting opportunities for adoption of new capabilities in public and commercially focused proofing technologies and services. The panel will provide participants perspectives and use-cases to clarify authentication considerations, risks elements, and programmatic concerns across a diversity of identity proofing solutions. Solutions discussed will span from low to highest levels of assurance including trends in data-driven practices, mobile capabilities, and kiosk/machine approaches. Using Authenticators to Manage Risk: In today's business and commercial applications, identity assurance is mostly an exercise in risk management. Many, if not most, security protocols in use by organizations conducting business online really do not know that the online credential being utilized is appropriately associated with a specific person.
How Are Identity Attributes Used to Create Authentication Factors? This panel session will explore the many identity attributes that can be used to create authentication factors. What are these identity attributes? How do different organizations manage authentication using these attributes? What attributes are used, how are they managed, and how strong are they?
Mobility and IoT – The Next Identity Frontiers
Join experts from the mobile and IoT industries as they discuss the impact these worlds have on the burgeoning identity universe. As mobile devices increasingly dominate how end users access online services and resources, what are the new capabilities these devices deliver that can help strengthen online identity and improve assurance levels.
The Future of Strong Digital Identities
This panel concludes the primary event topics and takes the discussion into the future and discusses where the universe of digital identities is headed. As technologies become increasingly sophisticated, as practices and understanding advance, and as exploits become increasingly commonplace, what does the future hold?