Tech Talks
The ID Collective Tech Talks represent a vital component of our community-building efforts. These events offer opportunities to engage with peers, share insights, and listen to presentations on the latest advancements in digital identity.
Navigating The Maze - IT Regulations and Compliance
20th of November - Main d'Or, Kontich
We’ll dive into the complexities of IT regulations and compliance. Together, we’ll navigate the maze and find the way through. Join us at the ID Collective Tech Talk ‘Navigating The Maze – IT Regulations and Compliance’ and be part of the conversation. Register today!
Navigating The Maze - IT Regulations and Compliance
20th of November 2024 - Main d'Or, Kontich
We dove into the complexities of IT regulations and compliance. Together, navigated the maze and found clear paths forward. Join us at the ID Collective Tech Talks and be part of the conversation.

Program
17h30 | Reception with appetizers and drinks |
18h00 | Word of welcome by host Yannick Verschueren |
18h15 | Louis Malfait: The Compliance Maze |
18h45 | Marc Wouters: De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen? |
19h15 | Break with food and drinks |
19h45 | Maarten Decat: 5 Tips on How to Take Control of Your Users and Their Access within Days |
20h15 | Tech Thoughts: Exchange insights and ideas with your peers |
Speakers and Host

Yannick Verschueren (Host)
Yannick is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management.

Marc Wouters
De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen?
Marc will review the development of the eIDAS Regulation, explore the European Digital Identity Wallet and its link to eIDAS trust services, and share insights on a governance model that benefits government, businesses, and users alike.

Tim Van Hamme
"The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems". Tim, a post-doctoral researcher at DistriNet, KU Leuven, will delve into the critical role machine learning plays in biometric authentication systems and its implications for security.

Roel Peeters
Roel Peeters, PhD in cryptography from KU Leuven and Security Architect at Itsme, talks about "Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)". Roel will discuss the traditional use of Hardware Security Modules (HSMs) in authentication and how modern public key techniques can provide a secure alternative, leading to simpler yet effective security strategies.

Yannick Verschueren (Host)
Yannick is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management.

Louis Malfait
The Compliance Maze
Louis will provide an in-depth look at the overlapping regulatory initiatives in the digital space, mapping out how these complex requirements intersect. He’ll reveal why navigating this “maze” of compliance is increasingly challenging for companies and offer insights into managing these demands effectively.
With 9 years of experience, Louis brings a unique perspective as the "non-technical guy in IT," bridging the gap between business and technology. As a former consultant in information security and data protection and now the lead for privacy, security, and IT compliance at De Cronos Groep, Louis has helped numerous organizations navigate complex compliance landscapes.

Marc Wouters
De European Digital Identity Wallet, een werkbaar eco-systeem voor digitale identiteit en digitaal vertrouwen?
Marc will review the development of the eIDAS Regulation, explore the European Digital Identity Wallet and its link to eIDAS trust services, and share insights on a governance model that benefits government, businesses, and users alike.
Marc brings a wealth of expertise from his recent role as an advisor at the Belgian Ministry of Economy. With a technical background and an impressive career at the crossroads of technology, strategy, and regulatory compliance, Marc has been a key player in the evolution of digital identity.
From 2015 to early 2024, he led Belgium's supervisory authority for eIDAS trust services, closely following the development of the eIDAS Regulation and its impact on digital trust.

Maarten Decat
5 Tips on How to Take Control of Your Users and Their Access within Days
With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.
However, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.
- Why Do Organizations Need to Take Control of User Access?
- How to Achieve Identity Visibility within Days?
- Case Study: Achieving NIS2 Compliance with Limited Resources
- Homework for IAM and Security Experts
Maarten is a highly-skilled Identity and Access Management (IAM) professional who founded Elimity, which brings together technology and business with a mission to improve the state of the art in user access governance.
Past Event
Tech Talks: Next Gen Authentication
Relive the first ID Collective Tech Talks. This event focused on ‘Next Gen Authentication,’ spotlighting cutting-edge technologies and methodologies that are redefining security and user experience.