SlideShare ist ein Scribd-Unternehmen logo
1 von 16
@evernym | May 2020
A Conversation On
Safe Credentials
Architecting digital credentials to maximize security,
privacy, flexibility, portability, and interoperability.
On the agenda
What are safe credentials?
How can we determine whether credentials are safe?
Fireside chat with experts from Mastercard, CULedger, and
Evernym
Audience Q&A
MODERATOR
Andrew Tobin
Managing Director, EMEA,
Evernym
Today’s panel
PANELIST
Julie Esser
SVP, Marketing & Comms,
CULedger
PANELIST
Bryn Robinson-Morgan
VP, Digital Identity,
Mastercard
PANELIST
Daniel Hardman
Chief Architect,
Evernym
If you have questions….
Please enter them in the Zoom Q&A, and
we’ll cover them after the presentation.
Please note, this webinar is being recorded and will be
available at www.evernym.com/webinars.
Introducing
Safe Credentials
Digital credentials in a nutshell
For more, see Evernym’s previous webinar,
‘An Introduction to Verifiable Credentials,’
at www.evernym.com/webinars.
HolderIssuer Verifier
Digitally
Verifiable
Credential
Proof
Quick Terminology Check
Wallet
Watch Out...
Not all digital credentials are created equal.
How do you know if things are
being done properly?
Safeness can be determined through
five tests
1. Are you preventing
correlation by decoupling
issuers and verifiers?
If the verifier has to “phone home” and contact
the issuer, they are not decoupled. The issuer
can track what you do online.
With safe credentials, verifiers can check a
credential’s authenticity, validity, and
revocation status without ever having to contact
the credential issuer.
E.T., Universal Pictures
2. Are you using safe
signatures to prevent
correlation?
If your implementation reveals the issuer’s
signature to every verifier, that signature
becomes a correlation super-cookie.
With safe credentials, you only share a proof
that the issuer has signed the credential. You
don’t share the issuer’s correlatable signature.
3. Are you ensuring
portability and
interoperability?
If proprietary solutions keep our data locked up
and siloed, user experiences will suffer.
With safe credentials, individuals will be able to
use credentials anywhere (just like they do with
their paper equivalents) and organizations will
be able to realize the full benefits of portability.
4. Are you enabling
flexibility and data
minimization?
If you have to reveal every data attribute when
you use a credential, you are sharing too much.
With safe credentials, holders can extract and
selectively share individual attributes from a
credential, or even just share proof about an
attribute without sharing its actual value.
They can also combine individual data attributes
from different credentials and different issuers
into a single proof.
Stephen Edmonds, Flickr, CC-BY 2.0
5. Are you ensuring trust
goes both ways?
If only enterprises can verify credentials, then
individuals will be left at a disadvantage.
With safe credentials, anyone can issue
credentials, and anyone can verify credentials.
Establishing mutual trust means that an
individual can verify the authenticity of an
organization, and vice versa.
For more on safe credentials and the
five tests:
https://www.evernym.com/blog/verifiable-credentials-minus-
choice-equals-train-wreck/
https://www.evernym.com/blog/introducing-safe-credentials/
Now on to our main event...
If you have questions for our panelists, please drop them into the Q&A facility.
MODERATOR
Andrew Tobin
Managing Director, EMEA,
Evernym
PANELIST
Julie Esser
SVP, Marketing & Comms,
CULedger
PANELIST
Bryn Robinson-Morgan
VP, Digital Identity,
Mastercard
PANELIST
Daniel Hardman
Chief Architect,
Evernym

Weitere ähnliche Inhalte

Was ist angesagt?

Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?
101 Blockchains
 
A Complete Guide On Diem Blockchain
A Complete Guide On Diem BlockchainA Complete Guide On Diem Blockchain
A Complete Guide On Diem Blockchain
101 Blockchains
 

Was ist angesagt? (20)

Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?
 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscape
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
A Complete Guide On Diem Blockchain
A Complete Guide On Diem BlockchainA Complete Guide On Diem Blockchain
A Complete Guide On Diem Blockchain
 

Ähnlich wie An Expert Panel on Safe Credentials

PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 

Ähnlich wie An Expert Panel on Safe Credentials (20)

Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 

Mehr von Evernym

Mehr von Evernym (15)

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

An Expert Panel on Safe Credentials

  • 1. @evernym | May 2020 A Conversation On Safe Credentials Architecting digital credentials to maximize security, privacy, flexibility, portability, and interoperability.
  • 2. On the agenda What are safe credentials? How can we determine whether credentials are safe? Fireside chat with experts from Mastercard, CULedger, and Evernym Audience Q&A
  • 3. MODERATOR Andrew Tobin Managing Director, EMEA, Evernym Today’s panel PANELIST Julie Esser SVP, Marketing & Comms, CULedger PANELIST Bryn Robinson-Morgan VP, Digital Identity, Mastercard PANELIST Daniel Hardman Chief Architect, Evernym
  • 4. If you have questions…. Please enter them in the Zoom Q&A, and we’ll cover them after the presentation. Please note, this webinar is being recorded and will be available at www.evernym.com/webinars.
  • 6. Digital credentials in a nutshell For more, see Evernym’s previous webinar, ‘An Introduction to Verifiable Credentials,’ at www.evernym.com/webinars.
  • 8. Watch Out... Not all digital credentials are created equal. How do you know if things are being done properly?
  • 9. Safeness can be determined through five tests
  • 10. 1. Are you preventing correlation by decoupling issuers and verifiers? If the verifier has to “phone home” and contact the issuer, they are not decoupled. The issuer can track what you do online. With safe credentials, verifiers can check a credential’s authenticity, validity, and revocation status without ever having to contact the credential issuer. E.T., Universal Pictures
  • 11. 2. Are you using safe signatures to prevent correlation? If your implementation reveals the issuer’s signature to every verifier, that signature becomes a correlation super-cookie. With safe credentials, you only share a proof that the issuer has signed the credential. You don’t share the issuer’s correlatable signature.
  • 12. 3. Are you ensuring portability and interoperability? If proprietary solutions keep our data locked up and siloed, user experiences will suffer. With safe credentials, individuals will be able to use credentials anywhere (just like they do with their paper equivalents) and organizations will be able to realize the full benefits of portability.
  • 13. 4. Are you enabling flexibility and data minimization? If you have to reveal every data attribute when you use a credential, you are sharing too much. With safe credentials, holders can extract and selectively share individual attributes from a credential, or even just share proof about an attribute without sharing its actual value. They can also combine individual data attributes from different credentials and different issuers into a single proof. Stephen Edmonds, Flickr, CC-BY 2.0
  • 14. 5. Are you ensuring trust goes both ways? If only enterprises can verify credentials, then individuals will be left at a disadvantage. With safe credentials, anyone can issue credentials, and anyone can verify credentials. Establishing mutual trust means that an individual can verify the authenticity of an organization, and vice versa.
  • 15. For more on safe credentials and the five tests: https://www.evernym.com/blog/verifiable-credentials-minus- choice-equals-train-wreck/ https://www.evernym.com/blog/introducing-safe-credentials/
  • 16. Now on to our main event... If you have questions for our panelists, please drop them into the Q&A facility. MODERATOR Andrew Tobin Managing Director, EMEA, Evernym PANELIST Julie Esser SVP, Marketing & Comms, CULedger PANELIST Bryn Robinson-Morgan VP, Digital Identity, Mastercard PANELIST Daniel Hardman Chief Architect, Evernym