‘We’ll Always Have Paris’: Key Takeaways from ISSE Conference 2016 on Digital Identity
The 17th annual ISSE Conference 2016 took place in the heart of Paris, drawing cybersecurity professionals from across the globe. This year’s event zeroed in on digital identity as the central theme, with speakers and attendees dissecting its growing influence on internet security, interconnected systems, and everyday life. Over two packed days, the conference delivered a mix of technical deep dives, strategic debates, and forward-looking insights that continue to resonate today.
If you missed the action, don’t worry—we’ve captured the most memorable moments and actionable ideas from the event. From the silent revolution of the Internet of Things (IoT) to the unique challenges faced by security teams, here’s what stood out.
Why Digital Identity Dominated the Agenda
Jon Shamah, chairman of EEMA, set the tone early in his welcome message: “This is the Year of Identity and Security, and ISSE has never been more relevant.” He argued that digital identity has moved from a niche concern to a center-stage issue for organizations worldwide. This claim was backed by sessions exploring how digital identity shapes online trust, impacts interconnected relationships, and introduces new vulnerabilities.
One particularly engaging panel examined the ripple effects of ever-increasing identities—from social media profiles to corporate access credentials. The consensus was clear: as identities multiply, so do the risks of fraud, impersonation, and data breaches. Yet, the conference also highlighted opportunities, such as machine-based learning technology that can automate identity verification and threat detection.
For a deeper look at how identity management is evolving, check out our guide on digital identity best practices for modern enterprises.
Security Team Challenges: Scaling Without Burning Out
Mohit Kalra, senior manager of secure software engineering at Adobe, delivered a standout presentation on the hurdles security teams face today. He identified three primary obstacles: scaling security work within small teams, managing diverse and growing product portfolios, and balancing business-critical products against legacy applications.
However, Kalra didn’t stop at problems—he offered a three-step solution. First, establish a minimum security bar with baseline tasks for every team. Second, treat security as a shared responsibility across the organization, not just the security department. Third, set up product teams for success by embedding security practices early in development cycles.
“Security is about making choices,” Kalra emphasized. “You don’t fix everything in one day. The real question is: who do we engage with the most, and how do we prioritize that time?” This practical advice resonates especially for startups and mid-sized firms struggling with limited resources. For more on building resilient security teams, read our article on cybersecurity team building strategies.
The Silent Revolution of the IoT
Andreas Ebert, Microsoft’s regional technology officer for Western Europe, described the IoT revolution as “almost a silent one.” He explained that most IoT activity happens beneath the surface—embedded in everyday objects like smart thermostats, wearable devices, and industrial sensors. The scale of this shift is unprecedented, driven largely by falling device costs that make IoT accessible to more consumers and businesses.
Yet, with scale comes risk. Ebert highlighted security challenges including insecure design, disclosure of personal information, and limited update capabilities. These issues must be addressed, he argued, to unlock the full benefits of IoT—such as improved threat identification, better decision-making, and enhanced availability of services.
Building on this, a later session explored how machine learning can help mitigate IoT risks by detecting anomalies in real-time. This combination of innovation and caution was a recurring theme throughout the ISSE Conference 2016.
Spies, Fake Identities, and Digital Credibility
Dave Birch, director of innovation at Consult Hyperion, took a refreshingly unconventional approach. He challenged digital identity experts to consider a thorny question: how do you build an identity system that accommodates legitimate fake identities—for spies, undercover agents, or people in witness protection?
Birch noted that while it’s “easy to make a fake passport,” creating a convincing fake Facebook profile without detection is extremely difficult. In today’s world, credibility is often verified through social media, LinkedIn accounts, and other digital footprints. But what about individuals who have genuine reasons to hide their true identity?
“Spies are perfectly legitimate,” Birch said. “If you’re going to come up with a plan for the future of digital identity, your plan has got to fix both problems—protecting fake identities for legitimate users while preventing fraud by ordinary people.” His talk sparked lively debate about the ethical boundaries of identity systems.
Data Protection Failures and Rising Enforcement Trends
Jacqueline Zoest, a barrister at Campbell Miller, closed the conference with a sobering look at data protection failures. She referenced high-profile breaches at TalkTalk and Sony Pictures, noting that monetary penalties for data breaches are on the rise. “They do seem to be increasing,” Zoest observed, adding that complementary audits are becoming more prominent as a result.
One key factor influencing fine amounts is an organization’s behavior after a breach. “An aggravating factor that would increase the fine is a lack of cooperation between the organization and the ICO,” she explained. This includes refusing voluntary audits. Zoest suggested a growing trend toward collaboration between regulators and companies, aimed at changing behaviors to prevent future breaches and avoid hefty fines.
For organizations looking to stay ahead of enforcement trends, our resource on data breach response planning offers practical steps to mitigate legal and financial risks.
Looking Ahead: What ISSE 2016 Taught Us
The ISSE Conference 2016 in Paris was more than just a gathering—it was a snapshot of an industry in transition. Digital identity is no longer a back-office concern; it’s a strategic priority that touches every aspect of cybersecurity. The event underscored the need for collaboration, whether between security teams and product developers, regulators and organizations, or even identity systems and spies.
As we reflect on these highlights, one thing is clear: the conversations started in Paris are far from over. They continue to shape how we approach identity, security, and trust in an increasingly connected world.