Tech Talks

The ID Collective Tech Talks represent a vital component of our community-building efforts. These events offer opportunities to engage with peers, share insights, and listen to presentations on the latest advancements in digital identity.

Navigating The Maze - IT Regulations and Compliance

20th of November - Main d'Or, Kontich

We’ll dive into the complexities of IT regulations and compliance. Together, we’ll navigate the maze and find the way through. Join us at the ID Collective Tech Talk ‘Navigating The Maze – IT Regulations and Compliance’ and be part of the conversation. Register today!

Navigating The Maze - IT Regulations and Compliance

20th of November 2024 - Main d'Or, Kontich

We dove into the complexities of IT regulations and compliance. Together, navigated the maze and found clear paths forward. Join us at the ID Collective Tech Talks and be part of the conversation.

Program

17h30Reception with appetizers and drinks
18h00Word of welcome by host Yannick Verschueren
18h15Louis Malfait:
The Compliance Maze
18h45Marc Wouters:
De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen?
19h15Break with food and drinks
19h45Maarten Decat:
5 Tips on How to Take Control of Your Users and Their Access within Days
20h15Tech Thoughts:
Exchange insights and ideas with your peers

Speakers and Host

Yannick Verschueren (Host)

Yannick is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management.

Marc Wouters

De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen?
Marc will review the development of the eIDAS Regulation, explore the European Digital Identity Wallet and its link to eIDAS trust services, and share insights on a governance model that benefits government, businesses, and users alike.

Tim Van Hamme

"The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems". Tim, a post-doctoral researcher at DistriNet, KU Leuven​, will delve into the critical role machine learning plays in biometric authentication systems and its implications for security.

Roel Peeters

Roel Peeters, PhD in cryptography from KU Leuven and Security Architect at Itsme, talks about "Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)". Roel will discuss the traditional use of Hardware Security Modules (HSMs) in authentication and how modern public key techniques can provide a secure alternative, leading to simpler yet effective security strategies.

Yannick Verschueren (Host)

Yannick is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management.

Louis Malfait

The Compliance Maze

Louis will provide an in-depth look at the overlapping regulatory initiatives in the digital space, mapping out how these complex requirements intersect. He’ll reveal why navigating this “maze” of compliance is increasingly challenging for companies and offer insights into managing these demands effectively.

With 9 years of experience, Louis brings a unique perspective as the "non-technical guy in IT," bridging the gap between business and technology. As a former consultant in information security and data protection and now the lead for privacy, security, and IT compliance at De Cronos Groep, Louis has helped numerous organizations navigate complex compliance landscapes.

Marc Wouters

De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen?

Marc will review the development of the eIDAS Regulation, explore the European Digital Identity Wallet and its link to eIDAS trust services, and share insights on a governance model that benefits government, businesses, and users alike.

Marc brings a wealth of expertise from his recent role as an advisor at the Belgian Ministry of Economy. With a technical background and an impressive career at the crossroads of technology, strategy, and regulatory compliance, Marc has been a key player in the evolution of digital identity. From 2015 to early 2024, he led Belgium's supervisory authority for eIDAS trust services, closely following the development of the eIDAS Regulation and its impact on digital trust.

Maarten Decat

5 Tips on How to Take Control of Your Users and Their Access within Days

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance. However, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.

- Why Do Organizations Need to Take Control of User Access?
- How to Achieve Identity Visibility within Days?
- Case Study: Achieving NIS2 Compliance with Limited Resources
- Homework for IAM and Security Experts

Maarten is a highly-skilled Identity and Access Management (IAM) professional who founded Elimity, which brings together technology and business with a mission to improve the state of the art in user access governance.

Past Event
Tech Talks: Next Gen Authentication

Relive the first ID Collective Tech Talks. This event focused on ‘Next Gen Authentication,’ spotlighting cutting-edge technologies and methodologies that are redefining security and user experience.

Registration successful

Keep an eye on your inbox —
we’ll send more info a few days before the event.

See you soon!

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.