Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 90
1-30 of 90
Filter
Heini Ilmarinen
DevOps Consultant at Polar Squad
access control, active directory, application software, authentication, authenticator, cloud computing, computer file, cosmos db, database, https, infrastructure as code, kerberos (protocol), microsoft 365, microsoft azure, mobile app, multi-factor authentication, password, powershell, server (computing), signature, sql, superuser, text messaging, user (computing), web portal
Kara de la Marck
Ecosystem Advocate at Continuous Delivery Foundation
application lifecycle management, authenticator, authorization, cloud computing, computer file, credential, cryptography , encryption, http cookie, identity management, infrastructure as code, key (cryptography), kubernetes , password, pointer (computer programming), privacy, public-key cryptography, record linkage, software , software development, software repository, symmetric-key algorithm, world wide web
Kalyan Krishna
Sr. Program Manager at Microsoft
active directory, api, authentication, authenticator, authorization, breakout session, brk234, build, build zero trust ready applications starting with the microsoft identity platform | brk234, c1x9, cloud computing, computer network, credential, email, encryption, end-to-end encryption, facebook, google, identity management, information privacy, jean-marc prieur, jeff sakowicz, jenny ferries, kalyan krishna, kyle marsh, microsoft, microsoft azure, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, namyoon han, passwordless authentication, saeed akhter, sahil malik, security, security token, single sign-on, threat model, web api, web application, web portal
Saeed Akhter
Principal Lead Program Manager at Microsoft
active directory, api, authentication, authenticator, authorization, breakout session, brk234, build, build zero trust ready applications starting with the microsoft identity platform | brk234, c1x9, cloud computing, computer network, credential, email, encryption, end-to-end encryption, facebook, google, identity management, information privacy, jean-marc prieur, jeff sakowicz, jenny ferries, kalyan krishna, kyle marsh, microsoft, microsoft azure, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, namyoon han, passwordless authentication, saeed akhter, sahil malik, security, security token, single sign-on, threat model, web api, web application, web portal
Jas Suri
IAM Senior Program Manager at Microsoft
apple id, apple inc., authentication, authenticator, blockchain, build, build secure b2c applications​ with azure ad external identities | od500, c1x9, christer ljung, digicert, domain name system, email, email address, gayan randeny, jas suri, login, macos, microsoft, microsoft account, microsoft build, microsoft build 2021, microsoft developer, mobile app, msft build, msft build 2021, multi-factor authentication, od500, on-demand, password, qr code, security, security token, skype, steam (service), transport layer security, user (computing), web browser, web portal, world wide web
Matthijs Hoekstra
Senior Program Manager Azure Identity at Microsoft
active directory, ankur patel, authentication, authenticator, background check, build, business, c1x9, credential, domain name system, down with sign-ups just sign-in! | od491, general data protection regulation, identity document, internet, internet privacy, matthijs hoekstra, microsoft, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, od491, on-demand, password, personal identification number, privacy, public key infrastructure, public-key cryptography, qr code, security, twitter, url redirection, user (computing), verifiable credentials, world wide web, youtube
Ankur Patel
Principal Program Manager at Microsoft
active directory, ankur patel, authentication, authenticator, background check, build, business, c1x9, credential, domain name system, down with sign-ups just sign-in! | od491, general data protection regulation, identity document, internet, internet privacy, matthijs hoekstra, microsoft, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, od491, on-demand, password, personal identification number, privacy, public key infrastructure, public-key cryptography, qr code, security, twitter, url redirection, user (computing), verifiable credentials, world wide web, youtube
Stephen Sailor
Technical Architect at CleanSlate
adobe inc., alexa, amazon alexa, amazon echo, amazon echo show, amazon elastic compute cloud, amazon web services, apple inc., authenticator, automation, autoscaling, aws, cache (computing), certificate authority, chatbot, cloud, cloud computing, cloud conference, cloudfront, cname record, command-line interface, computer file, cortana, debugging, denial-of-service attack, domain name system, dynamic web page, google authenticator, google nest (smart speakers), hardware, home automation, hotspot (wi-fi), http cookie, hypertext transfer protocol, iot, load balancing (computing), media server, mobile app, one-time password, password, public key certificate, siri, six feet up, sixfeetup, slack (software), smart speaker, smart tv, speech synthesis, speech synthesis markup language, spotify, streaming media, subroutine, time to live, transport layer security, virtual, virtual conference, web hosting service, web traffic, website, world wide web
Christiaan Brand
Product Manager: Identity and Security at Google
android (operating system), authentication, authenticator, biometrics, bluetooth, gmail, google account, google search, internet, internet security, keychain, login, malware, mobile app, near-field communication, password, personal identification number, phishing, public-key cryptography, security token, smart card, user agent, web browser, webauthn 201, website, world wide web
Heather Adkins
Senior Director of Information Security at Google
2019 tech picks, aaron levie, active directory, alex stamos, antivirus software, apache http server, api, ashton kutcher, authentication, authenticator, brand new tech, bring your own device, chromebook, cloud computing, command-line interface, computer network, database, dennis crowley, devops, facebook, gadgets, gmail, google, google docs, hacker, hitrecord, home network, hottest gadgets 2019, hottest technology, hypertext transfer protocol, internet, ios, joseph-gordon levitt, lamp (software bundle), linux, load balancing (computing), marc benioff, metadata, multi-factor authentication, newest technology, password, penetration test, php, privacy, public key certificate, reliable systems, security token, shame, software bug, tc disrupt 2019, tcdisrupt, tech, techcrunch, techcrunch disrupt, technology, technology gadgets, telecommuting, top-down and bottom-up design, transport layer security, user-generated content, virtual private network, web application, wi-fi, will smith, world wide web, zoombombing
John Strand
Owner at Black Hills Information Security
antivirus software, apple inc., authentication, authenticator, blacklist (computing), computer file, computer security, cybersecurity, directory (computing), information, information security, infosec, internet, keyboard technology, login, microsoft windows, multi-factor authentication, password, password strength, proxy server, red team, rsa, rsac, rsaconference, security, sms, threat intelligence, user (computing), vulnerability (computing), whitelisting, windows 10, world wide web
Eduardo Rios
GM of Digital Assets & Blockchain at Bitso
abstraction, apple inc., authentication, authenticator, bitcoin, blockchain, caller id spoofing, communication protocol, concept, crypto, cryptocurrency, design & security, design thinking, ecosystem, email, face id, financial transaction, internet, investment, leverage (finance), market, mass adoption, millennials, mobile app, multi-factor authentication, password, product design, qr code, sim card, stock, tech, visa inc.
Raul Velázquez
Lead Product Design at Bitso
abstraction, apple inc., authentication, authenticator, bitcoin, blockchain, caller id spoofing, communication protocol, concept, crypto, cryptocurrency, design & security, design thinking, ecosystem, email, face id, financial transaction, internet, investment, leverage (finance), market, mass adoption, millennials, mobile app, multi-factor authentication, password, product design, qr code, sim card, stock, tech, visa inc.
Oriol Caudevilla Parellada
Management Consultant at AirHelp
abstraction, apple inc., authentication, authenticator, bitcoin, blockchain, caller id spoofing, communication protocol, concept, crypto, cryptocurrency, design & security, design thinking, ecosystem, email, face id, financial transaction, internet, investment, leverage (finance), market, mass adoption, millennials, mobile app, multi-factor authentication, password, product design, qr code, sim card, stock, tech, visa inc.
Lisa Loud
GM of digital assets & Blockchain at ZYTARA
aave, abstraction, apple inc., armor finance, art market, authentication, authenticator, bank, bitcoin, blockchain, caller id spoofing, communication protocol, competition (economics), concept, convertible bond, credit, crypto, cryptocurrency, debt, decentralized finance, defi, design & security, design thinking, ecosystem, email, entrepreneurship, face id, finance, financial capital, financial transaction, interest, interest rate, internet, investment, leverage (finance), loan, market, market (economics), market liquidity, mass adoption, millennials, mobile app, multi-factor authentication, nfts, non-fungible token, option (finance), password, product design, qr code, real economy, real estate appraisal, sim card, stablecoin, stock, tech, trade, underwriting, visa inc., zytara
Josh Long
‎Spring Developer Advocate at VMware
alibaba group, amazon (company), anonymous function, apache cassandra, apache groovy, apache maven, apache tomcat, api, apple inc., application software, asynchronous i/o, authentication, authenticator, c sharp (programming language), c++, class (computer programming), client (computing), command-line interface, communication protocol, computer file, constructor (object-oriented programming), couchbase server, cut, copy, and paste, database, datasource, ebay, ecosystem, elasticsearch, embedded database, entry point, for loop, github, grails (framework), greed, groundbreakers, guitar, hash function, hibernate (framework), html, html5, hypertext transfer protocol, immutable object, in-memory database, input/output, insert (sql), integrated development environment, interface (computing), jakarta persistence, java (programming language), java management extensions, java virtual machine, javascript, jeeconf, jetbrains, knowledge, kotlin (programming language), library (computing), load balancing (computing), macro (computer science), message queue, method (computer programming), microservices, microsoft, modular programming, mongodb, mysql, netbeans, netflix, network socket, object (computer science), oracle cloud, oracle developers, orchestration, parameter, parameter (computer programming), password, php, postgresql, proxy server, reactive, reason, redis, search engine, search engine indexing, security token, server (computing), software , software framework, specification (technical standard), spring, spring boot, spring framework, sql, streaming media, string (computer science), subroutine, summit, template (c++), thread (computing), twitter, unit testing, user (computing), variable (computer science), von neumann architecture, web application, web server, web template system, websocket, world wide web, xml, zoombombing
George Connolly
President at OneLedger Technology Inc
apple inc., authentication, authenticator, bitcoin, blockchain, business, email, epidemiology, general data protection regulation, innovation, mobile app, mobile phone, multi-factor authentication, personal data, privacy, risk, science, security token, single source of truth, smartphone, sms, usability, utility, vaccine
Luke Stokes
Managing Director at FIO - Foundation for Interwallet Operability
amazon (company), android (operating system), api, asset, authenticator, bitcoin, bitcoin network, blockchain, communication protocol, cryptocurrency, debits and credits, decentralization, domain name, domain name registrar, domain name registry, domain name system, encryption, ethereum, financial transaction, godaddy, google chrome, governance, hope, hypertext transfer protocol, innovation, interest, internet, internet protocol, internet protocol suite, ip address, loan, market (economics), market liquidity, mathematics, mobile app, mobile operating system, money market, name server, nature, nft, nftnyc, nonprofit organization, operating system, ownership, password, peer-to-peer, privacy and blockchain, proof of work, property, reason, search engine, smart contract, social capital, speculation, tesla, inc., usability, venmo, verisign, web browser, wikipedia, world wide web, yield farming
Danny Taniwan
Co-Founder at CryptoWatch
android (operating system), authenticator, bitcoin, blockchain, cryptocurrency, domain name system, encryption, google chrome, hypertext transfer protocol, interest, internet, loan, market liquidity, mobile app, mobile operating system, money market, operating system, password, smart contract, speculation, usability, venmo, web browser, world wide web, yield farming
Danny Baskara
Founder at Vexanium Blockchain
android (operating system), authenticator, bitcoin, blockchain, cryptocurrency, domain name system, encryption, google chrome, hypertext transfer protocol, interest, internet, loan, market liquidity, mobile app, mobile operating system, money market, operating system, password, smart contract, speculation, usability, venmo, web browser, world wide web, yield farming
Viktor Radchenko
Founder at Trust Wallet
android (operating system), authenticator, bitcoin, blockchain, cryptocurrency, domain name system, encryption, google chrome, hypertext transfer protocol, interest, internet, loan, market liquidity, mobile app, mobile operating system, money market, operating system, password, smart contract, speculation, usability, venmo, web browser, world wide web, yield farming
Sten Laureyssens
Co-Founder & Chairman at Adara.io
android (operating system), authenticator, bitcoin, blockchain, bond (finance), capital market, cryptocurrency, current account (balance of payments), derivative (finance), dividend, domain name system, economic equilibrium, encryption, equity (finance), euro, financial crisis, futures contract, futures exchange, google chrome, government bond, government budget balance, hypertext transfer protocol, incentive, inflationism, interest, internet, loan, market liquidity, mobile app, mobile operating system, money market, operating system, option (finance), password, rate of return, silver as an investment, smart contract, speculation, supply and demand, swap (finance), tax, usability, venmo, volatility (finance), web browser, world wide web, yield farming
Joselito Lizarondo
Founder & CEO at Swipe
android (operating system), authenticator, backup, barcode, bitcoin, blockchain, bond (finance), capital market, cryptocurrency, current account (balance of payments), dark pool, derivative (finance), dividend, domain name system, economic equilibrium, email, encryption, equity (finance), ethereum, euro, finance, financial crisis, financial technology, futures contract, futures exchange, google chrome, government bond, government budget balance, hedge (finance), hypertext transfer protocol, incentive, inflation, inflationism, interest, internet, loan, login, market liquidity, market maker, mind, mobile app, mobile operating system, money market, news, operating system, option (finance), password, privacy, rate of return, silver as an investment, smart contract, speculation, stablecoin, supply and demand, swap (finance), tax, usability, venmo, volatility (finance), web browser, world wide web, yield farming, yubikey
Matthew Soldo
Product Manager at Google
apache maven, application software, authenticator, binary file, cloud computing, continuous integration, css , entry point, environment variable, google, html, java (programming language), java virtual machine, javascript, kubernetes , open-source software, roof, ruby (programming language), runtime system, salesforce, serverless computing, source code, stack (abstract data type), type: conference talk (full production);, web browser, world wide web
Bimal Gandhi
Chief Executive Officer at Uniken Inc.
authentication, authenticator, blockchain, brand, business model, consumer protection, cryptocurrency, customer experience, digital identity, general data protection regulation, infidelity, motivation, omnichannel, password, personal data, privacy, privacy and blockchain, privacy by design, privacy policy, proxy server, right to know, trust (social science), twitter, understanding
Travis Jarae
CEO at One World Identity
authentication, authenticator, blockchain, brand, business model, consumer protection, cryptocurrency, customer experience, digital identity, general data protection regulation, infidelity, motivation, omnichannel, password, personal data, privacy, privacy and blockchain, privacy by design, privacy policy, proxy server, right to know, trust (social science), twitter, understanding
Joseph Cutler
Partner at Perkins Coie
authentication, authenticator, blockchain, brand, business model, consumer protection, cryptocurrency, customer experience, digital identity, general data protection regulation, infidelity, motivation, omnichannel, password, personal data, privacy, privacy and blockchain, privacy by design, privacy policy, proxy server, right to know, trust (social science), twitter, understanding
Rob Wisniewski
Chief Technology Officer at CLEAR
authentication, authenticator, blockchain, brand, business model, consumer protection, cryptocurrency, customer experience, digital identity, general data protection regulation, infidelity, motivation, omnichannel, password, personal data, privacy, privacy and blockchain, privacy by design, privacy policy, proxy server, right to know, trust (social science), twitter, understanding
Irina Nechaeva
Senior Marketing Director at Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
Andrew Conway
General Manager Security Marketing at Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
1 2 3
1-30 of 90