Download PDF version Contact company
The Alliance has launched two workgroups and has already published some key reports including one jointly conducted by the SIA and The Boston Consulting Group (BCG)
The Alliance is also hosting a special breakfast meeting with participation from government/public organisations

The Secure Identity Alliance announces its official support and participation in the National eID & ePassport Conference 6th Edition at the Intercontinental Hotel Budapest, Hungary, on 13 and 14 October 2014.

On behalf of The Federal Ministry of the Interior (BMI) Germany, the Federal Office for Information Security (BSI) represented by Dr. Dennis Kügler and The Security Identity Alliance represented by Frederic Trojani, Chairman of the Board, will be chairing a Workshop on eIDAS on Monday 13 October at 16:15.

With the eIDAS Regulation coming into force this year and directly applicable across the EU, the workshop will look at where and how a European Model of implementation can be achieved that can bring more value to Member States, companies and citizens alike and improve Europe's position.

 What are the key usages for digital identity in Europe?

The workshop will do a quick review of key stakes: eGovernment, health, education, transport, bank, telecoms, energy, social support and other key economic applications for digital identity and how digital identities are central to the future of economic and social intermediation in Europe.

 Why advocating an European model?

The workshop will consider relative advantages to adopt a common model (against not doing it) in key fields such as security, privacy, interoperability, legal consent and others. How can eIDAS be implemented in order to best reflect this European model?

 What recommendations for the identity infrastructure in Europe?

The Alliance counts seven member companies to date, including the leaders in security technology and two Government Observers, EIDA (UAE) and BMI (Germany)

Through a synoptic look of different states implementation (Estonia, Sweden, Germany, UK), the workshop will look at key aspects of the technical, legal interoperability aspects through trust levels, standards, and secure technology.

From infrastructure to architecture: building interfaces and interoperability for long term preservation

What are the key architecture recommendations to improve interoperability within a European model through Identities, credentials, signature, PKI and crypto for long term validation.

The Alliance is also hosting a special breakfast meeting - welcoming participation from government/public organisations interested to foster international collaboration on Digital ID challenges and the issues of data security, citizen privacy, identity, authentication – and more.

In its first year, the Alliance has laid the foundation for scaling up in years to come. The Alliance counts seven member companies to date, including the leaders in security technology and two Government Observers, EIDA (UAE) and BMI (Germany).

The Alliance has launched two workgroups and has already published some key reports including one jointly conducted by the Secure Identity Alliance and The Boston Consulting Group (BCG) confirming explosive growth of eServices based on Trusted Identity.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...