00: 3014 AgendaPresentation 0001: 50 The three offerings to manage Workforce Identities48 Agenda 02: 30 The trend of outsourced card personalization24 Intro to the IoT market 03: 28 Reasons why organizations are looking to outsource 06:05 What is “card personalization”? 06:47 Design and visual personalization 08:21 The Nexus personalization sites 10:03 Capabilities and competence centers 12:01 Authorization with SAML in Identity Manager 12:52 Traditional options 14:04 Improved role management, assignment and authorization based on information in the SAML response 15:55 Behind the scenes and in development – Virtual smart cards in practice on Apple watch 16:49 Wrap-up45 Managing the risks 04:35 Zero Trust 05:32 How many identities do we issue from our services 06:55 A few examples of IoT customers 09:09 Why using PKI 11:50 Two different types of IoT identities 12:55 Initial IoT birth certificates 14:07 Smart ID Factory CA 15:50 SKIP – Secure Key Injection Process 17:54 On field IoT identities 21:50 Smart ID lifecycle CA 24:05 Why different protocols 25:32 The Secure Care project 26:36 Integration with IoT platforms 27:20 Thin-edge 28:20 Summary and take aways |