Tech Talks

The ID Collective Tech Talks represent a vital component of our community-building efforts. 

These events offer opportunities to engage with peers, share insights, and listen to presentations on the latest advancements in digital identity.

Tech Talks - Next Gen Authentication

5th of June - Main d'Or Kontich

Relive the first ID Collective Tech Talks. This event focused on ‘Next Gen Authentication,’ spotlighting cutting-edge technologies and methodologies that are redefining security and user experience.

*Can’t see the registration form below? Then register here

Program

17h30 – Reception with appetizers and drinks

18h00 – Word of welcome by host Roman Peeters

18h15 – Wim Van De Putte – Palmki, Your Hand is Your Key

18h45 – Tim Van hamme – The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems

19h15 – Break with food and drinks

19h45 – Roel Peeters – Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)

20h15 – Networking moment

Speakers and Host

Roman Peeters (Host)

Roman is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management and has been a featured speaker at notable events such as Cyberhealth and IdentITee - Driving Customer Experiences.

Wim Van De Putte

Presenting "Palmki, Your Hand is Your Key". Join Wim, General Manager at PerfectID​, as he explores Palmki's pioneering palm vein biometric technology. Discover how this innovative solution can serve as a more secure and unique identifier compared to traditional methods, with real-world applications and business cases.

Tim Van Hamme

"The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems". Tim, a post-doctoral researcher at DistriNet, KU Leuven​, will delve into the critical role machine learning plays in biometric authentication systems and its implications for security.

Roel Peeters

Roel Peeters, PhD in cryptography from KU Leuven and Security Architect at Itsme, talks about "Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)". Roel will discuss the traditional use of Hardware Security Modules (HSMs) in authentication and how modern public key techniques can provide a secure alternative, leading to simpler yet effective security strategies.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.