Richard
Stiennon
CYBERSYMPOSIUMS
&
Michael Cichon
Chief Marketing Officer
1Kosmos

Frederic R.
Information Security Officer
A Fortune 500 Retailer

Paul Riddle
Principal Cloud Security Engineer
Gusto

Rajesh Ganesan
Vice President of Products
ManageEngine

Ashish Jain
Chief Information Security Officer (CISO)
Mindtree

Arshad Noor
CTO & CISO
StrongKey

Julien Cassignol
Head of Cybersecurity and Digital Trust
Orange

Learn how reusable digital identity wallets transform authentication by storing verifiable credentials, enabling selective disclosure and stronger privacy while simplifying online transactions. Panelists map international approaches (EU, UK, US), standards and interoperability challenges, security and geopolitical risks and practical gaps—resilience, offline use, recovery and delegation—so organizations can adopt wallets safely and earn user trust.
Join Richard Stiennon as he interviews Derek Hanson, Field CTO of Yubico, to explore the innovative journey of the company that revolutionized online identity security. Discover how Yubico’s portable YubiKey provides phishing-resistant authentication solutions, enabling organizations to protect their users while simplifying secure access. Learn about Yubico’s commitment to open standards and how they empower enterprises to eliminate password vulnerabilities effectively.
Join Rishi Bhargava, co-founder of Descope, for an insightful demo of their customer identity and access management platform. Discover how Descope simplifies secure login experiences with a variety of authentication methods, including passwordless options, while offering robust user management and authorization capabilities. Experience the ease of implementing Descope’s innovative flows and widgets, designed to enhance both B2B and B2C authentication processes.
Join Richard Stiennon as he speaks with Rishi Bhargava, Co-Founder of Descope, a rapidly growing Cyber150 company focused on eliminating password-related security challenges. Discover how Descope empowers application developers to create seamless, passwordless experiences through its innovative visual workflow designer, enabling businesses to enhance user security while simplifying implementation. Learn how this approach is transforming identity management across various industries.
Organizations choosing between buying a vendor solution or building in-house often underestimate maintenance, risks, and missed opportunities. Purchasing a vendor product that prioritizes UX, brand, and security—and provides open standards, APIs, SDKs, and headless widgets—significantly accelerates time-to-market, reduces development costs and long-term overheads, and lets internal teams focus on core application features.
Explore how AI will reshape authentication—from adaptive, risk‑based brokers and continuous evaluation to user‑agent and agent‑agent trust—while confronting legacy passwords, deepfakes and social engineering. Panelists debate practical tools (behavioral signals, biometrics, verifiable credentials) and the governance, auditability and accountability needed to balance security, privacy and convenience as organizations protect AI agents and scale authorization safely.