Decentralized identity, verifiable credentials, and zero trust represent a new paradigm for trust and verification online—lessons from business.

Heather Dahl, CEO, Indicio.tech
Mike Vesey, CEO, IdRamp

With decentralized identity and communication and cryptographic protocols, we have the means to create a layer for digital life and to encode digital information with uniqueness. We also have a new conceptual approach to managing security online, Zero Trust. Together, they transform identity and access management and provide a way to minimize vulnerability and maximize trust in online interaction. —-

Introduction

Advances in digital technologies are redefining opportunities around the world to develop new economic value, to govern and serve within more accessible societies, and to empower individuals. Legal recognition of identity, the ability to establish trust in who we are, is a foundational component of society, a powerful tool that confirms access to life-sustaining resources and services, alongside evolving opportunities: It is enshrined in the Universal Declaration of Human Rights.

Digital innovations in identity bring new opportunities to create transparency, fairness, and better-governed services. They also create the potential to distribute and interpret significant amounts of information about people and their communities.

The Turing’s work in trustworthy data systems is advancing applied research for data science, artificial intelligence, and privacy-enhancing encryption that is delivering significant impact in the fields of healthcare, national security, finance, and criminal justice. Our trustworthy digital infrastructure for identity systems project is further developing this impact with a transformative opportunity to mature collective appreciation for the design and development opportunities to be had, and the policy choices to be made in upholding trust as a systemic imperative for identity systems.

Sign up to our trustworthy digital identity newsletter

About the event
This conference brings together prominent academics and key players in the field of digital identity from government and industry sectors to focus on opportunities in the assessment and development of trustworthy digital identity systems.

Outlined themes and key questions cover the driving influences, alongside the characteristics that can attest to whether these systems are deserving of trust. They also seek to reflect the social impact, cultural, societal and behavioural conventions that have a role to play in anticipating vulnerabilities for the people these systems are being set up to serve.

Add comment

Your email address will not be published. Required fields are marked *

Categories

All Topics