Default image of it-sa 365

Secure digital identities: Down from the ivory tower

Secure digital identities have been known for a long time, but often fail in practice. This presentation shows how it can work.

Topic

Identity and access management

When & Where

calendar_month

Tue, 10/07/2025, 16:45 - 17:00

location_on

Forum, Booth 9-445

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

  • Language:

    German

Session description

The lecture addresses the importance of secure digital identities as a key prerequisite for trustworthy digitalization. Although technical solutions have long been available, real-world practice shows significant shortcomings: organizations often rely on insecure or outdated approaches such as passwords, Excel lists, or isolated PKI systems instead of professional, standards-based solutions.
Legislation such as eIDAS, CRA, NIS2, and GDPR has established a regulatory framework in which secure digital identities play a central role. However, implementation still faces major challenges. The main obstacles are complexity (different types of identities, platforms, and processes), heterogeneity (incompatible standards and competing technologies), poor usability, and concerns about admini ...

Speaker

Moderator