{"id":781,"date":"2006-07-05T00:00:00","date_gmt":"2006-07-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/05\/identity-to-become-the-key-technology-focus\/"},"modified":"2021-12-30T11:38:10","modified_gmt":"2021-12-30T11:38:10","slug":"identity-to-become-the-key-technology-focus","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/05\/identity-to-become-the-key-technology-focus\/","title":{"rendered":"Identity to Become the Key Technology Focus"},"content":{"rendered":"<p>Following their European e-Identity Conference, eema, an independent association for IT professionals, businesses and governments, has predicted that by 2020 digital identities will have a significant impact on the daily lives of the world&#8217;s population and that this is already the case in the more technologically-advanced, Internet-ready societies.  At the two-day conference in Barcelona, where delegates from 20 countries across Europe, North America and the Far East met to debate the key issues surrounding the realities of digital identity today, it was asserted that businesses and governments are waking up to the fact that their future success will depend on the effective and ethical management of a complex network of digital identity relationships with their employees, partners and customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chairman David Goodman declared on day one that the role of identity-related trust &#8211; at both a personal and corporate level &#8211; was dramatically changing Internet-based transactions.<\/p>\n<p>In the first keynote address, Stijn Bijnens, SVP of Identity Management at Cybertrust, stated that the main drivers of identity are security, integration of physical and logical access control, flexibility, productivity, compliance and customer satisfaction.  On the drivers behind national identity programmes, Bijnens also recognised the need for more efficient e-government, both regionally and across-borders, as well as new applications such as e-tickets on public transport and physical access to public buildings.<\/p>\n<p>During the morning&#8217;s panel debate, Chief Security Officer at Corestreet, Bob Dulude, echoed Bijnens&#8217; sentiments, claiming that e-ID cards must be technically interoperable to support multiple applications, with the caveat that security and privacy could be more easily compromised when there is a vast amount of data on a single smartcard.  &#8220;It united senior IT, marketing and management personnel from some of the biggest players in the industry to share their valued opinions.&#8221;<\/p>\n<p>http:\/\/www.it-observer.com\/news\/6564\/identity_become_key_technology_focus\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-781","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=781"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/781\/revisions"}],"predecessor-version":[{"id":3268,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/781\/revisions\/3268"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}