In Evernym's November 2021 webinar, we discussed the current state of decentralized identifiers (DIDs), their role in a more trusted Web, and why three of the four largest browser vendors are trying to stop their approval at the W3C.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
Digital Guardianship in Self-Sovereign IdentityEvernym
Drummond Reed's Nov. 21, 2019 keynote presentation for Secour's Digital Identity & Dementia Summit.
This presentation provides a quick introduction to self-sovereign identity (SSI), a few of the pilots in production today, and how SSI can be designed to work for everyone through a concept called digital guardianship.
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar "Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle". If you can't manage the keys for your DIDs (Decentralized Identifiers), then the SSI engine will never get started. That's why DKMS (Decentralized Key Management System) is one of the core open standards in the DID "stack".
DKMS inverts a core assumption of conventional PKI (public key infrastructure) architecture, namely that public key certificates will be issued by centralized or federated certificate authorities (CAs). With DKMS, the initial "root of trust" for all participants is any blockchain or distributed ledger that supports DIDs. This webinar will explain why we need DKMS, what a DKMS-compatible identity wallet looks like, how DKMS can solve some longstanding problems in wallet backup and recovery, and where DKMS is headed for standardization.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
Digital Guardianship in Self-Sovereign IdentityEvernym
Drummond Reed's Nov. 21, 2019 keynote presentation for Secour's Digital Identity & Dementia Summit.
This presentation provides a quick introduction to self-sovereign identity (SSI), a few of the pilots in production today, and how SSI can be designed to work for everyone through a concept called digital guardianship.
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym and Sovrin Foundation Trustee, features in this Webinar "Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle". If you can't manage the keys for your DIDs (Decentralized Identifiers), then the SSI engine will never get started. That's why DKMS (Decentralized Key Management System) is one of the core open standards in the DID "stack".
DKMS inverts a core assumption of conventional PKI (public key infrastructure) architecture, namely that public key certificates will be issued by centralized or federated certificate authorities (CAs). With DKMS, the initial "root of trust" for all participants is any blockchain or distributed ledger that supports DIDs. This webinar will explain why we need DKMS, what a DKMS-compatible identity wallet looks like, how DKMS can solve some longstanding problems in wallet backup and recovery, and where DKMS is headed for standardization.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Verifiable Credentials for Travel & HospitalityEvernym
In this webinar, Evernym's Jamie Smith and Andrew Tobin discuss how verifiable credentials and digital wallets can reduce fraud, automate workflows, and transform customer experiences across the travel and hospitality industries.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
What are the questions you need to ask yourself before embarking on your self-sovereign identity journey? How can a clear, business-focused strategy help propel your initiative from proof-of-concept to delivery at scale?
In this presentation, we’ll help you evaluate what SSI means for your organization and design a plan that navigates both the technical and business considerations for a successful launch.
Accelerate Self-service Analytics with Universal Semantic Model Denodo
This webinar is part of the Data Virtualization Packed Lunch series: https://goo.gl/W1BeCb
Self-service initiatives are successful when business users’ views of the data are holistic and consistent across distinct business functions as enabled by Universal Semantic Model across multiple analytical/BI tools.
Attend this session to learn how data virtualization:
• Is the best fit technology to enable the Universal Semantic Model
• Accelerates Self-service BI initiatives
• Provides a holistic view of the data
Agenda:
• Data Virtualization for Self-service Analytics
• Product Demonstration
• Summary & Next Steps
• Q&A
Watch this webinar on demand here: https://goo.gl/je1t56
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
Verifiable Credentials for Travel & HospitalityEvernym
In this webinar, Evernym's Jamie Smith and Andrew Tobin discuss how verifiable credentials and digital wallets can reduce fraud, automate workflows, and transform customer experiences across the travel and hospitality industries.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
https://ssimeetup.org/machine-identity-dids-verifiable-credentials-trust-interoperability-iot-webinar-25-mrinal-wadhwa/
Mrinal Wadhwa, CTO of Ockam, will talk about how Decentralized Identifiers, Verifiable Credentials, and Decentralized Key Management enable highly secure and reliable systems of connected devices.
The promise of IoT has been a future where systems of connected machines would work together, using intelligent algorithms, to almost magically improve our lives; Systems in farms and factories that would intelligently sense and control physical processes to optimize yield and reduce waste, homes that would adapt for our comfort and safety, and resilient cities that would pollute less and smartly manage our limited resources. These are the autonomous systems that developers in the Internet of Things community are passionate about. We all want to build this magical future.
The status quo, however, is that most IoT solutions are incredibly difficult to secure and take too long to develop, provision, and integrate. This talk will show how several emerging open standards can be combined to create open developer tools that help you avoid the plumbing required to build trust between connected devices. It will also briefly touch on Ockam’s DID method for devices and their open source Go DID Parser.
What are the questions you need to ask yourself before embarking on your self-sovereign identity journey? How can a clear, business-focused strategy help propel your initiative from proof-of-concept to delivery at scale?
In this presentation, we’ll help you evaluate what SSI means for your organization and design a plan that navigates both the technical and business considerations for a successful launch.
Accelerate Self-service Analytics with Universal Semantic Model Denodo
This webinar is part of the Data Virtualization Packed Lunch series: https://goo.gl/W1BeCb
Self-service initiatives are successful when business users’ views of the data are holistic and consistent across distinct business functions as enabled by Universal Semantic Model across multiple analytical/BI tools.
Attend this session to learn how data virtualization:
• Is the best fit technology to enable the Universal Semantic Model
• Accelerates Self-service BI initiatives
• Provides a holistic view of the data
Agenda:
• Data Virtualization for Self-service Analytics
• Product Demonstration
• Summary & Next Steps
• Q&A
Watch this webinar on demand here: https://goo.gl/je1t56
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
Watch this webinar in full here: https://buff.ly/2MVTKqL
Self-Service BI promises to remove the bottleneck that exists between IT and business users. The truth is, if data is handed over to a wide range of data consumers without proper guardrails in place, it can result in data anarchy.
Attend this session to learn why data virtualization:
• Is a must for implementing the right self-service BI
• Makes self-service BI useful for every business user
• Accelerates any self-service BI initiative
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
Doug Meier, Director of Security and Compliance at Pandora, shares how Pandora defines and handles “shadow IT”, assesses and onboards vendors, all while keeping pace with the company’s must-do business in the cloud. He covers hot topics such as single sign-on, identity management, and active directory integration.
SOA with Data Virtualization (session 4 from Packed Lunch Webinar Series)Denodo
A robust SOA infrastructure is the lifeblood to application and process integration within the organization. However, the SOA stack (ESB, BPM, CEP, and so on) has often not mixed well with the traditional data integration stack – in most cases, data integration has been the ‘poor cousin’ in this relationship. Data Virtualization allows you to easily and quickly create a virtual data services layer to integrate cleanly into your SOA infrastructure – and also support new initiatives, such as mobile and cloud applications
More information and FREE registrations for this webinar: http://goo.gl/apGLPt
Landing page for the entire Packed Lunch webinar series: http://goo.gl/NATMHw .
Attend & get unique insights into:
- How Data Virtualization enables a more agile data architecture that better aligns with your SOA infrastructure.
- How to easily and quickly create data services to expose your data sources in a SOA-friendly way.
- Denodo’s unique linked RESTful data services that simplify building mobile and web applications.
- Case studies that demonstrate how Data Virtualization has enhanced existing SOA and BPM systems.
Achieving Self-Service Analytics with a Governed Data Services LayerDenodo
Watch full webinar here: https://bit.ly/3wvpHPk
We all heard about Self-Service initiatives, or maybe even implementing one. With the evolution of data landscape we have become data driven, when we should be information driven. Data without context lacks meaning. Data meaning is what drives the valuable business insights. We need to drive our consumers to the right information, while providing guided and governed experience across diverse consumer community.
Attend and Learn:
- What it takes to make Self-Service initiatives successful
- How Governed Data Service Layer enables guided data discovery
This webinar is focused on the current state of UDI regulations, the best approaches to medical device UDI Compliance in the cloud and how to gain business benefits by implementing KPIT's UDI Cloud Solution. This is a must-watch session for medical device companies who are preparing for UDI compliance or the ones who have already implemented however looking for a long-term solution.
This presentation from the 2014 IPMA conference is intended to provide a framework for a print center manager to use when adding, upgrading or replacing software for the in-plant print center. Learn the questions to ask yourself, your IT department and your vendors, and ensure smooth implementations by choosing the best solution with minimal risk for your organization. Engage IT early for the best results.
How Personal Cloud Networks Enable New Business Modelsdrummondreed
These are the slides from the first webinar in the Respect Network Personal Cloud Webinar Series. They provide an introduction to personal clouds and personal cloud networks and explain why they will enable new business models based on higher trust in digital relationships.
Webinar presented live on January 10, 2018.
Version 3.0 of Security for Cloud Computing: Ten Steps to Ensure Success has just been released for publication. Read it here: http://www.cloud-council.org/deliverables/security-for-cloud-computing-10-steps-to-ensure-success.htm
As organizations consider a move to cloud computing, it is important to weigh the potential security benefits and risks involved and set realistic expectations with cloud service providers. The aim of this guide to help enterprise information technology (IT) and business decision makers analyze the security implications of cloud computing on their business.
In this webinar, authors of the paper will discuss:
• Security, privacy and data residency challenges relevant to cloud computing
• Considerations that organizations should weigh when migrating data, applications, and infrastructure to a cloud computing environment
• Threats, technology risks, and safeguards for cloud computing environments
• A cloud security assessment to help customers assess the security capabilities of cloud service provide
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
In May 2021, Evernym's Product team hosted a webinar to share:
• An overview of Evernym’s products: Verity, Connect.Me, and the Mobile SDK
• Recent changes and improvements, including Aries Out-Of-Band support and new developer resources
• A first-look at Verity Flow, a new no-code solution for issuing and verifying credentials
• A discussion of our product roadmap, including BBS+ support and a new Connect.Me demo experience
As medicine undergoes a rapid digital transformation, the emergence of large quantities of healthcare related data is inevitable. This has been accelerated by COVID-19, with one example being the use of digital health passes. Consideration around holding, presenting, and accessing the information will be vital in continuing the trust built between patients, clinicians, and organizations.
Check out our April 28, 2021 webinar, where we hosted Dr. Manreet Nijjar, Consultant Physician in Infectious Diseases at Barts Health NHS Trust, NHS England Clinical Entrepreneur fellow, and co-founder of Truu. He shared an insider’s perspective on how providers can benefit from more trusted, user-centric data and what it takes to design for the complex privacy, regulatory, and ethical needs facing healthcare.
We covered:
• Lessons learned from working with self-sovereign identity (SSI) at the NHS, and the needs highlighted when leading the frontline response during COVID-19
• What digital health passes mean for the adoption of SSI
• Applying the four principles of healthcare ethics to verifiable credential technology
• The top use cases for healthcare, including “staff passports” and portable health records
What role will verifiable credentials play in safely bringing back air travel? How can this game-changing technology enable airlines and governments to navigate and comply with evolving health requirements, and at the same time, rebuild passenger confidence in air travel?
On January 12, we hosted our partners, the International Air Transport Association (IATA), to discuss these critical questions and their ‘Travel Pass’ project.
We covered:
• The challenges facing governments and airlines in safely bringing back air travel
• The IATA & Evernym solution: ‘Travel Pass,’ a privacy-preserving and highly secure contactless travel solution for sharing travel documents and test/vaccination results with airlines
• Learnings and insights from previous Evernym pilots at major airports
• Upcoming live pilots involving IATA and several major airlines
• How airlines and test centers can get involved
Digital wallets provide the interface for consumers to manage and share their credentials. They’re key to unlocking mainstream adoption and creating intuitive, trusted, and safe experiences.
In this webinar, we discussed Evernym’s digital wallet app (Connect.Me) and our Mobile SDK that allows anyone to embed digital wallet capabilities into existing apps.
We covered:
- An overview of Connect.Me and our Mobile SDK
- What's new in our Mobile SDK's General Availability release and Connect.Me 1.4
- Lessons in customer experience from powering the world's first live implementations
- Our ongoing efforts to ensure interoperability, security, and trust
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
Open source and open standards have been two pillars of self-sovereign identity since the beginning. Only by breaking down barriers to both development and production can we ensure that SSI works for everyone, everywhere.
Openness is also at the core of how Evernym operates, and our motivation for launching Sovrin, subsequently donating Hyperledger Indy to the world, and more recently, open-sourcing our own products.
In this webinar, we covered:
- The importance of open source software, and why it's needed for self-sovereign identity
- The open source tools available today, from Hyperledger Indy and Aries to Evernym's Verity
- What Evernym's open-sourcing of Verity means for developers
- Getting started with either open source or our free Sandbox plan
The Future of Digital Wallets - Evernym WebinarEvernym
On Oct 27, Evernym hosted a panel of leading identity experts for an interactive discussion on digital wallets and the path to mainstream adoption.
Panelists:
• Nicky Hickman (Trustee at Sovrin Foundation)
• Marta Geater-Piekarska (Director of Ecosystem at Linux Foundation)
• Darrell O’Donnell (Founder at Continuum Loop)
Moderated by:
• Drummond Reed (Chief Trust Officer at Evernym)
Meet Verity, Evernym's Digital Credential PlatformEvernym
In this webinar, James Monaham and Vlad Vujovic from Evernym's product team present a deep-dive on Verity, the world's most advanced digital credential platform.
The webinar covers:
- An overview of Verity and its features
- A live demo of Verity in action
- A sneak peek at our late 2020 and early 2021 product roadmap
- Examples of solutions built on Verity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
In this May 2020 webinar, Evernym's Andy Tobin gives an overview of safe credentials and the five tests to determine whether or not a portable verifiable credential is safe.
Then, we invite panelists from CULedger and Mastercard to share what safe credentials mean for them and their organizations.
Panelists:
- Julie Esser, SVP Marketing & Comms, CULedger
- Bryn Robinson-Morgan, VP Digital Identity, Mastercard
- Daniel Hardman, Chief Architect, Evernym
In a May 2020 webinar, Evernym was joined by Karla McKenna and Christoph Schneider from the Global Legal Entity Identifier Foundation (GLEIF) for a presentation and panel discussion on 'organization credentials.'
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEvernym
In May 2020, Takis Diakoumis (CTO, Digitary) and James Murray-Beckman (COO, Digitary) joined Evernym for a discussion on how universities and other higher education institutions can benefit from verifiable credential technology.
Here’s what was covered:
- An overview of what self-sovereign identity (SSI) means for higher education, and how it gives control and mobility to students
- How (micro-)credentials can help students instantly prove their educational achievements to prospective employers, financial institutions, and other universities
- The effects of COVID-19 on higher education, and SSI's role in building a trusted online learning infrastructure
- A first-look at Digitary's new credential issuing platform
Category
On an April 1, 2020 webinar, Evernym's Chief Trust Officer, Drummond Reed, and Chief Architect, Daniel Hardman, provided an expert overview of Trust over IP (ToIP), a new framework for ensuring trusted digital interactions and universal interoperability for SSI solutions.
They covered:
- The core concepts of the trust triangle, verifiable credentials, and decentralized identifiers
- The needs for both algorithmic and human trust
- The four layers of the ToIP stack
On March 19, 2020, Evernym's product team gave a webinar introducing several new features for Verity and Connect.Me and unveiling our embedded wallet SDK for the very first time.
Here are the slides.
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarEvernym
What does it take to move self-sovereign identity (SSI) out of the lab and into production? How should practitioners think about pilots, trust frameworks, and implementation plans?
Our February 12, 2020 webinar walks you through adopting an SSI mindset, with a focus on use cases and trust frameworks within the higher education sector—although the content will be applicable to any industry.
Tune in for:
- An introduction to SSI
- Leading SSI use cases in higher education
- Practical steps for starting your SSI journey
Evernym's Chief Architect Daniel Hardman and Chief Trust Officer Drummond Reed discuss the important role of guardianship in making self-sovereign identity work for everyone, everywhere.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
When stars align: studies in data quality, knowledge graphs, and machine lear...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, and Mozilla Disagree
1. Why The Web Needs
Decentralized Identifiers (DIDs)
—Even if Google, Apple, and Mozilla Disagree
November 3, 2021
@evernym | www.evernym.com
2. Andy Tobin
Managing Director, Europe,
Evernym
Drummond Reed
Chief Trust Officer,
Evernym
Co-Editor, DID Spec
Today’s presenters
James Monaghan
VP Product,
Evernym
3. On the agenda
The controversy at the W3C
Why the future of the Web is at stake
What are DIDs, and why do we need them?
The DID Spec 1.0 and the W3C’s DID Working Group
The path to becoming a W3C standard
Our response to the formal objections made by
Google, Apple, and Mozilla
Q&A
4. First, what is the controversy at the
World Wide Web Consortium (W3C)?
6. SSI & Decentralized Identifiers:
Reclaiming the soul of the web
Credit to Nick Price, Decentralized Identity Foundation
TCP / IP
HTTP /
Browser
GSM /
Mobile
Decentralization /
P2P
1974 - 1982 1989 - 1997 1993 - 2007 2018 -
7. You
You
DIDs put you in the center of your digital world
centralized decentralized
8. Why is the future of the Web at stake?
In a nutshell, it’s all about control:
● How much control will you have over your digital life?
● Your digital wallet?
● Your digital credentials?
● Your secure communications?
● Your privacy?
● Your personal data?
● Your ability to use the hardware and software of your choice?
10. Decentralized
Identifiers (DIDs)
A new type of globally unique
identifier (URI) that does not
require a centralized registration
authority because control of the
identifier can be proved using
cryptography.
For a more technical introduction to
DIDs, view our previous webinar:
https://vimeo.com/363406397
11. “DIDs are the atomic building
block of decentralized digital
trust infrastructure.”
Chapter 8:
Decentralized Identifiers
https://www.manning.com/books/self-sovereign-identity
17. The “cryptographic triangle” behind all DIDs
DID
Public
Key
Private
Key
Control point
This never needs
to change
Even when these
need to change
(“key rotation”)
19. With DIDs, you can:
Login without usernames and passwords
Digitally sign documents or transactions
Create persistent communications channels
Send encrypted private messages
Transfer value or assets
Authorize delegates or guardians
20. Consumer benefits:
● Control your data and online communications
● Create DIDs yourself; you don’t need to rely on anyone else and nobody can take
your DIDs away from you
● Have as many DIDs as you want to maintain your privacy
● Use your DIDs anywhere you want—they are fully portable
● Use your DIDs on your own terms—not anyone else's
● Choose which information your share with your DIDs
● All of this without surveillance or middlemen
21. Business benefits:
● Provide simple, secure, universal login for all your customers
● Digitally sign verifiable credentials that can be verified by anyone
● Create lifetime private channels with all your customers
● Make it nearly impossible for a phisher to spoof your business
● Prove the authenticity of your data, devices, people, & products
● Automate both internal and external business processes that require trust
● Benefit from entirely new business models, rooted in trusted data
● Connect and interact with your customers in a whole new way
22. What role do DIDs play in SSI,
and how are they being used today?
23. DIDs and VCs are the
twin pillars of self-sovereign identity
24. A global movement
>350 member organizations
Funding DID-based verifiable credentials
for use in supply chain verification
DID-based ‘staff passports’ for the world’s
third-largest employer
DID-based travel and health credentials,
in trial with 70+ major airlines
DID-based verifiable LEIs for businesses
and their representatives
DID-based KYC credentials for the
financial industry
DID-based portable patient records and
healthcare credentials
with production use
25. A (very) brief history of the ‘DID Spec’
A (very) brief history of the
‘DID Spec’
26. W3C Decentralized Identifiers (DIDs) 1.0
● Required syntax for all DIDs
● Required data model for all DID documents
● Required operations for all DID methods
● Security & Privacy Considerations
W3C DID Specification Registries
● Registry for DID methods, DID document
properties, key types, service types
● 112 DID methods currently registered
W3C DID Method Rubric 1.0
● Specifies suggested criteria and processes
for market evaluation of DID methods
W3C DID Implementation Guide
DID Spec 1.0
27. History of the DID spec prior to the
W3C Working Group
2015 2016 2017 2018 2019
Spring IIW: First
blockchain identity
discussions
W3C VCTF: A
Decentralized Hash
Table for the Web
Fall IIW: Decision to
begin blockchain ID
projects
DHS: Awards 1st
blockchain Identity
R&D contracts
IIW+RWOT: DID Spec
work fully underway
IIW+RWOT: First DID
Spec nearly complete
DHS: First DID Spec
published & contract
complete
DHS:
DKMS contract
awarded; work
begins
W3C CCG: DID Spec
contributed
DHS:
DKMS Design &
Architecture V3
published
W3C CCG: Second
draft of DID Spec
W3C CCG: Work on
DID WG Charter
begins
DHS:
DKMS Design &
Architecture V4
published
W3C CCG:
Community Final
Draft of DID Spec
W3C:
DID WG Charter
approved
W3C DID Working Group
begins Sept 2019
Work on DIDs
begins
28. The two-year path to becoming a W3C
standard (“REC”)
July 2021
May 2021
(CR2)
Nov 2020
(CR1)
Nov 2019
(FPWD)
May 2020
(Feature freeze)
August 2021
3 formal
objectors
30. Our Response:
Objection #1:
No practical
interoperability
of DID methods
1. It misses the point that the DID spec
establishes a baseline of interoperability
across ALL DID methods
○ It doesn’t matter how many DID methods
there are—they all produce the same result
2. Our WG Charter explicitly prohibited us
from specifying any DID methods
○ That is not our job—that is the job of each DID
method specification author
3. Each DID method spec establishes its
own interoperability requirements
○ Any DID method can and should have
multiple interoperable implementations
31. Objection #2:
Encourages
divergence
rather than
convergence of
DID methods
Our Response:
1. For the second time, this misses the
point of the DID spec: it specifies
interoperability for all DID methods
○ They all use a DID resolver to take a DID as
input and return a DID document as output
2. The market should determine the
success of DID methods—just as it has
with URI schemes and URN namespaces
○ There are 345 URI schemes and 70 URN
namespaces registered with IANA
3. URI schemes and URN namespaces are
all based on federated registries
○ DIDs are decentralized — each DID method
is a cryptographic solution to the DID triangle
32. Objection #3:
Centralized DID
methods are not
prohibited
Our Response:
1. “Decentralization” means “innovation at
the edges”
○ It would be a travesty if a centralized registry
controlled all innovation in DID methods
2. It is not the DID Working Group’s job—or
the W3C’s job—to judge DID methods
○ It is the market’s job—a job the market can do
much more efficiently and effectively
3. The whole purpose of the DID Method
Rubric is to facilitate market evaluations
○ It is a registry of recommended criteria and
processes for performing evaluations
33. Objection #4:
DID methods
using
proof-of-work
blockchains are
harmful for
environmental
sustainability
Our Response:
1. DID method implementations are
out-of-scope for the DID 1.0 spec
○ Each method makes its own choices about
how to implement a Verifiable Data Registry
2. Environmental sustainability is a perfect
example of a DID Method Rubric criteria
○ The Rubric is constantly being improved with
evaluation criteria for this and other factors
3. This is one more example of why the
market should choose DID methods
○ The DID 1.0 spec was explicitly designed to
encourage decentralized market competition
35. DIDs are inevitable
● Don’t panic — a lot of people are working really hard to get the DID spec approved
○ Very few W3C formal objections are sustained — it just takes some time to resolve
● The governmental, commercial, and social progress of DIDs is already unstoppable
○ The genie is not going back in the bottle
● This has no effect on Evernym’s products or customers
○ We are charging ahead with innovations in DID-based products and services
● The real lesson here is that decentralization means a shift in control
○ From large tech vendors (the “center”) to users (the “edges”)
● This is a strong signal that this shift is finally happening—for real
36. DIDs are the innovation that
democratizes cryptography so
that everyone can use it.
37. Thanks for joining us today!
For more content on decentralized identifiers and verifiable
credentials, please visit www.evernym.com/webinars/
November 3, 2021
@evernym | www.evernym.com