Tech Talks
The ID Collective Tech Talks represent a vital component of our community-building efforts.
These events offer opportunities to engage with peers, share insights, and listen to presentations on the latest advancements in digital identity.
Tech Talks - Next Gen Authentication
5th of June - Main d'Or Kontich
Relive the first ID Collective Tech Talks. This event focused on ‘Next Gen Authentication,’ spotlighting cutting-edge technologies and methodologies that are redefining security and user experience.
*Can’t see the registration form below? Then register here

Program
17h30 – Reception with appetizers and drinks
18h00 – Word of welcome by host Roman Peeters
18h15 – Wim Van De Putte – Palmki, Your Hand is Your Key
18h45 – Tim Van hamme – The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems
19h15 – Break with food and drinks
19h45 – Roel Peeters – Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)
20h15 – Networking moment
Speakers and Host

Roman Peeters (Host)
Roman is a renowned CIAM Expert at IdentIT. He has an extensive background in customer identity and access management and has been a featured speaker at notable events such as Cyberhealth and IdentITee - Driving Customer Experiences.

Wim Van De Putte
Presenting "Palmki, Your Hand is Your Key". Join Wim, General Manager at PerfectID, as he explores Palmki's pioneering palm vein biometric technology. Discover how this innovative solution can serve as a more secure and unique identifier compared to traditional methods, with real-world applications and business cases.

Tim Van Hamme
"The Biometric Masterkey: Effectively Brute-Forcing Biometric Systems". Tim, a post-doctoral researcher at DistriNet, KU Leuven, will delve into the critical role machine learning plays in biometric authentication systems and its implications for security.

Roel Peeters
Roel Peeters, PhD in cryptography from KU Leuven and Security Architect at Itsme, talks about "Why We Do Not Need HSMs for User Authentication …and Why Most Do (or Should)". Roel will discuss the traditional use of Hardware Security Modules (HSMs) in authentication and how modern public key techniques can provide a secure alternative, leading to simpler yet effective security strategies.