83 |
OpenID Verifiable Credential Update |
Kristina Yasuda |
Torsten Lodderstedt |
82 |
Achieving Standard DID Methods |
Daniel Buchner |
|
81 |
OAuth Status List and Attestation-Based Client Authentication |
Paul Bastian |
Christian Bormann |
80 |
The intersection of federated identity, web 3, and self sovereignty |
Nat Sakimura |
|
79 |
Authorization for the Modern Enterprise? |
Gal Helemski |
|
78 |
The 2025 NHI Cybersecurity Landscape |
Lalit Choda |
|
77 |
How Cedar Simplies Authz for Developers |
Dinesh Rajasekharan |
|
76 |
Why Identity Orchestration Matters? |
Eric Olden |
|
75 |
Trinsic's pivot from SSI to identity acceptance |
Mike Schwartz |
Riley Hughes |
74 |
Cedarling Launch |
Mike Schwartz |
Mike Neuenschwander |
73 |
The Future of AuthZ, from A to Z |
Rohit Khare |
Alex Olivier |
72 |
Intro to MOSIP for foundational national identity |
SasiKumar Ganesan |
Yodahe Zemichael |
71 |
Connect.id TBD |
Andrew Black |
Dima Postnikov |
70 |
Removing Cloud Providers From the Zero Trust Equation |
Fabian Kammel |
|
69 |
[THANKSGIVING] |
|
|
68 |
UN and OpenWallet Collaboration for Digital Public Infrastructure |
Daniel Goldscheider |
Venkatesen (Vijay) Mauree |
67 |
Unraveling the 6Ws of Identity Security with ObserveID |
Axay Desai |
Richard A Weeks |
66 |
Demystifying Non‐Human Identity Management |
Ryan Bradley |
Karl McGuinness |
65 |
Improving bank mobile security |
Anders Rundgren |
Michael Buckland |
64 |
Amazon's Cedar Open Source Strategy |
Ricardo Sueiras |
Julian Lovelock |
63 |
Beyond Whack‐a‐Mole: Future‐Proof Against Tomorrow's Threats |
Heather Vescent |
Eric Leach |
62 |
Reflecting on FIDO's evolution to passkeys |
Yuriy Ackermann |
[Jari Takkala |
59 |
Product Manager Strategies for Trust and Safety |
Dario Salice |
Jeroen Kemperman |
58 |
Corporate Wallets |
Alen Horvat |
Nuttawut Kongsuwan |
57 |
Latest developments in DIDs |
Markus Sabadello |
Drummond Reed |
56 |
How modern AuthZ will change banking |
Or Weis |
Dave Hyland |
55 |
Certificate Rotation: Why TLS is still a pain point |
Ben Burkert |
|
54 |
Jumping the Decentralized Identity S Curve |
Tina Srivastava |
Rew Islam |
53 |
ID Transformer Okta to Ping in 45 Days |
Steve Giovannetti |
|
52 |
Canada's 103‐1 Digital Trust and Identity |
Tim Bouma |
Bonnie Yau |
51 |
NIST Digital Identity Assurance Levels |
Kenneth Myers |
Tom Clancy |
50 |
Universal Online Identification |
Lisa LeVasseur |
Pernille Tranberg |
49 |
Latest News on EU Wallet Initiatives |
Annet Steenbergen |
Teemu Kääriäinen |
48 |
Apache Fortress ANSI RBAC with OpenLDAP |
Shawn McKinney |
Nate Klingenstein |
47 |
IAM asleep at the wheel |
Lasse Andresen |
Moushmi Banerjee |
46 |
Yes please to multi‐layer authz |
Omri Gazitt |
Nicholas Hunt |
45 |
Intro to the Cedarling |
Kevin Kampman |
|
44 |
Securing identity and context in microservices |
Atul Tulshibagwale |
|
43 |
Intersection of IAM |
Alexandre Sieira |
Marc Boorshtein |
42 |
Strata Identity Continuity |
Granville Schmidt |
Mark Callahan |
41 |
National ID Challenges |
Hosni Dubu |
Joni Brennan |
40 |
You got the JWT... now what |
Gabriel Manor - Liechtman |
Alexandre Babeanu |
39 |
Blockchain vs. The Right To Be Forgotten ‐ one Solution |
Jeffery Stollman |
Praveen Kumar Marupadige |
38 |
Immortal passwords versus vulnerable humans |
Lee Tschetter |
Gautam Dev |
37 |
The Rise of Browser Identity APIs |
Samuel Goto |
|
36 |
Deepfakes II: BioID's Combat Strategy |
Ann-Kathrin Freiberg |
Pavel Balashov |
35 |
The Next generation of Open Banking and Bank ID is beginning |
Darrell Geusz |
Adrian Doerk |
34 |
Fear not the rise of the machines, for we have standards |
Pieter Kasselman |
Evan Gilman |
33 |
Consent Is Dead: How Bad Is It Really |
Eve Maler |
Jean-François LOMBARDO |
32 |
No things in IGA: Considering non‐human account management |
André Koot |
Senthil Chandrasekaran |
31 |
The Three Wallet Problem |
Dan Robertson |
|
30 |
OpenFGA Deep Dive |
Andres Aguiar |
Damian Schenkelman |
29 |
Deploying passkeys for high‐security use cases |
Rolf Lindemann |
John Bradley |
28 |
Transparency Performance Schema for Regulators |
Salvatore (Sal) D'Agostino |
Mark (Smartopian) Lizar |
27 |
Holy Grail: A Physical and Logical Access Card |
Mike Baker |
Darren Wieder |
26 |
Shared Signals CAEP |
Shayne Miel |
Mike Kiser |
25 |
Empowering Authorization Through Data |
Eric Anderson |
(Dr) Rogério (Augusto) Rondini |
24 |
Enhancing User Experience in First Party Native Applications |
Rifaat Shekh-Yusef |
Godwin Amila |
23 |
EIC Debrief |
Sebastian Rohr |
Henk Marsman |
22 |
Debunking Misconceptions About Passkeys |
Tim Cappalli |
Matthew Miller |
21 |
Go Beyond With AI & Identity |
Mike Berthold |
Gautam Hazari |
20 |
Identity Governance for the Whole Enterprise |
Jim Montgomery |
Frank (Francisco) Wray |
19 |
Continuous Authorization |
Rohit Khare |
|
18 |
Best ROI for National ID |
Jacques von Benecke |
Armando J. Manzueta Peña |
17 |
Agama Low Code Identity Orchestration |
Prabath Siriwardena |
Dhaval Desai |
16 |
Post Deep‐Fake: Can Identity Fraud Even Be Stopped Anymore? |
Ofer Friedman |
David Mahdi |
15 |
New in OAuth: First Party Native Authn and Global Token Revocation |
Aaron Parecki |
|
14 |
What's Unique About NFT's |
Stephen Wilson |
Otto Mora |
13 |
Big Tech Can't Solve Identity Crisis |
Rizel (Bobb-Semple) Scarlett |
Jeffrey Schwartz |
12 |
SSI beyond identities |
Alexandre Gomes |
Edgar Silva |
11 |
Rethinking the Rush to Policy as Code |
Paul Figura |
Patrick Parker |
10 |
Cerbos Deep Dive |
Brad Tumy |
Emre Baran |
9 |
Zero Standing Priviledge |
Ian Glazer |
Vladislav Shapiro |
8 |
"Digital Double" with Asanka, Mike and Phil |
Phil Windley |
Asanka Abeysinghe |
7 |
BlastRADIUS: Time to Upgrade |
Alan Dekok |
|
6 |
Live from IIW: Open ID 4 VP OpenID4VP over Browser API |
Kristina Yasuda |
Torsten Lodderstedt |
5 |
Best Practices for Client Authn |
Nat Sakimura |
|
4 |
Authz Renaissance: Why now |
David Brossard |
Gerry Gebel |
3 |
Token Exchange Discussion with Tyk, Gluu, and Curity |
Jacob Ideskog |
Ahmet Soormally |
2 |
Why the US needs a trust framework for privacy |
Ross Foard |
David Kelts |
1 |
Compare‐‐Contrast: India Aadhaar v. United States SSN |
Kaliya Young |
Matt Vogel |