Don’t trust your IAM:

This is why you need to Prove your Identity

Wed, JUNE 29, 2022, 10:00 Am – 11:00 Am CEST

Trust isn't earned, it's inherited

Identity and access management is all about making sure users have access to what they need – and when they need it. This is one of the most significant improvements that IT can bring to your organization. But it comes with a security dilemma: how to you know if the user account is being used by the right person?

The use of electronic identification (eID) such as BankID or MitID on top of your IAM solution allows you to prove the identity of all users at any given time. This way you can maximize the potential of your IAM investment and ensure compliance.

Onboarding staff, customers, and business partners with eID validation makes sure that the user account can be trusted. It’s tied together with a real-life person – and the right one too.

Topics we’ll cover:

Program

10:00 – 10:05   Welcome and introduction

10:05 – 10:15   IAM in a Zero Trust perspective
IAM is about making sure you have the correct access when you need it. Zero Trust adds some layers to that, as that implies, we do not trust anyone and need to minimize access to the actual need.

To succeed there are many aspects of IAM that needs to be in place and used in a proper way. By Lars Nikamo.

10:15 – 10:25   eID: The missing digital proof in your setup
Some of the biggest data breaches in history have their origins in insecure user accounts. Ensuring the correct rights and roles tackles a part of the issue, but the question whether the digital user account is used by the right individual remains.

By inheriting the trust of Electronic Identification (eID) you get a guarantee that the digital user is tied together with a real-life person – completely integrated into your existing IAM-lifecycle. By Bjarke Alling.

10:25 – 10:35   Customer case: Muskelsvindfonden
Being the CIO of a vast and diverse organization covering both a NGO, concert activities and a patient rehabilitation centre Poul Vels handles the IT of multiple units and very different user profiles.

Right now, Poul Vels is overseeing the process of implementing Zero Trust across the entire organization. A key component in achieving this is the use of eID and validated digital identities.

Poul Vels will share insights on how they are currently adopting the framework of Zero Trust: Identified challenges, pipeline, and perspectives on how the right technological solutions play an essential part. 

10:35 – 10:55   Q&A and panel discussion

10:55 – 11:00   Summary and next steps

Speakers

Lars Nikamo

Lars Nikamo

Nordic Presales Team Lead - Security Solutions at Micro Focus. Frequent speaker specialized in Identity and Security solutions

Bjarke Alling

Bjarke Alling

Group Director of Liga, former Chair of the National Danish Cybersecurity Council and Chair of the IT Security Committee at The Danish IT Industry Association

Poul Vels fra Muskesvindfonden

Poul Vels

IT-manager at Muskelsvindfonden, running the daily operations for Muskelsvindfonden, RCFM and Musholm. Also involved in Grøn Concerts and Cirkus Summarum.

Sophie Egede-Schrøder

Sophie Egede-Schrøder

Journalist, author and moderator with a deep knowledge of technology and international relations

did you miss the live webinar - watch the recording

Liga logo purple.
Muskelsvindfonden

Want to see it live?

Let us show you how GlobalID actually works! Fill in your details and we’ll get back to you to find a date for an online demo that fits your calendar.