<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ciam Archives - IDPro</title>
	<atom:link href="https://idpro.org/tag/ciam/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/tag/ciam/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Tue, 25 Nov 2025 15:15:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>ciam Archives - IDPro</title>
	<link>https://idpro.org/tag/ciam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Driving CIAM Success Without Funding Control</title>
		<link>https://idpro.org/driving-ciam-success-without-funding-control/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 21:40:45 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ciam]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2895</guid>

					<description><![CDATA[<p>Introduction: Setting the Scene Every identity professional knows this story: the IAM team is the guardian of security, yet often [&#8230;]</p>
<p>The post <a href="https://idpro.org/driving-ciam-success-without-funding-control/">Driving CIAM Success Without Funding Control</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction: Setting the Scene</h2>



<p>Every identity professional knows this story: the IAM team is the guardian of security, yet often the last in line when it comes to funding. Budgets are locked to “security outcomes,” and anything that strays into “customer experience” or “digital enablement” is out of scope. You’re expected to protect millions of customer accounts, deliver seamless experiences, and stay ahead of threats—while working with a budget focused solely on security. That’s exactly the challenge we face when trying to evolve our Customer Identity and Access Management (CIAM) platform.</p>



<h2 class="wp-block-heading">The IAM Team Context and Funding Challenges</h2>



<p>In most enterprises, the IAM team’s funding comes from the security bucket. Consequently, budget allocations are directed toward risk mitigation, compliance, and protection, rather than initiatives focused on improving customer experience or encouraging innovation. When your team might see an opportunity to deliver a capability like User managed access (as an example), there’s often no clear financial pathway.&nbsp; The result? Good ideas stall, and security alone becomes the narrow lens for investment.</p>



<h2 class="wp-block-heading">Platforms and Historical Practices</h2>



<p>Our journey began with a heavily customised, on-premises CIAM platform. Every upgrade was a major event. Adding new features, like 2FA or social login, involved coordination between multiple teams and—inevitably—long delays. The platform renewal cycle was budgeted based on the current needs, not customer needs.&nbsp;</p>



<p>Efforts to speed up feature rollouts or enhance the customer journey were consistently blocked by numerous dependencies between teams. Even when the value was clear, the process felt like a lost battle. The IAM team’s own funding couldn’t stretch to cover the broader investments required, and other business units had their own priorities.</p>



<h2 class="wp-block-heading">Challenging the Status Quo</h2>



<p>Faced with mounting frustration, our team decided to challenge the historical approach. Instead of waiting for the next renewal cycle or hoping for a change in budget structure, we asked a simple question: “Why are we still doing things this way?” That question, as it turned out, was the spark we needed.</p>



<p>We proposed a small-scale proof of concept (PoC). Using modern CIAM tools, we demonstrated how quickly using out of the box capabilities (OOTB) we could enable modern features, like passwordless login and adaptive authentication, without massive infrastructure changes—just enough to show what was possible. The first step was to present it to the end-to-end architects for initial feedback. It is important to acknowledge and be upfront that with OOTB capabilities, you do loose the control over customisation. With their blessings, we moved onto the next step.</p>



<h2 class="wp-block-heading">Discovering Broader Value</h2>



<p>While we understood that the capability is feasible and can be rolled out, we still lacked the business value. Any business will make an investment when there is something in return. It is hard to quantify the reduction in hours to deliver a capability since it is tied to full time employee (FTE) reduction and every team in organisation is stretched. We started interacting with Fraud and found some savings but that would have not accounted for making the business case.&nbsp;</p>



<p>While we were interacting with various sections of the business, we met with our frontline support lead (Consumer Channels team) and they had customers calling in with longer wait times to verify themselves. They mentioned that – it is something which was presented to the leadership and are planning to build a custom solution.&nbsp;</p>



<p>A detailed meeting gave us the following problem statement:</p>



<p><em>It takes anywhere from one to four minutes to verify a customer when they call our support centre. Every call. Reducing this to 90 seconds or less through automation prior to the call connecting with our team could result in a $900k p.a. saving in the call centre alone.</em></p>



<h2 class="wp-block-heading">Building the Business Case</h2>



<p>That particular statement carried multiple implications. What followed were a series of meetings to unpack and understand the real problem. Newer start-ups might not have these problems but when you work in a telco where mergers and acquisitions and brand change happened historically, you could develop solutions in siloes just not because you don’t want to collaborate, because – you just did not know.&nbsp;</p>



<p>What started as a journey to reduce development cycle became a full-fledged program which touches, consumer channels, digital experience, fraud reduction and of course improving the security posture. A project where security also becomes a valuable customer experience.</p>



<h2 class="wp-block-heading">Lessons Learned</h2>



<p>Looking back, several lessons stand out. <strong>First</strong>, it’s vital to challenge historical practices—even those that seem set in stone. <strong>Second</strong>, a well-run PoC can be the conversation starter as it makes the concept real. It break down silos and create new alliances. <strong>Third</strong>, Don’t be fixated on the PoC and the problem statement you started off. Success comes from speaking the language of the business, not just security. By being open to broader problems and looking for opportunities to deliver value, IAM teams can drive lasting change—even when they don’t hold the purse strings.</p>



<p>Most importantly, collaboration is the key. No team succeeds in isolation. By involving other departments, sharing ownership of outcomes, and being transparent about challenges, it’s possible to turn CIAM from a cost centre into a business enabler.</p>



<h2 class="wp-block-heading">Conclusion: Encouragement for the Journey</h2>



<p>For IAM leaders and architects facing similar challenges, know this: you don’t need to control the budget to control your destiny. Start with curiosity, challenge the status quo, and focus on broader business value. Build relationships, share success, and invite others to the table. CIAM success is a team sport—and with the right approach, you can lead the change your enterprise needs.</p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<h2 class="wp-block-heading">Author Bio:</h2>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="267" height="345" src="https://idpro.org/wp-content/uploads/2025/11/image-1.png" alt="" class="wp-image-2897" srcset="https://idpro.org/wp-content/uploads/2025/11/image-1.png 267w, https://idpro.org/wp-content/uploads/2025/11/image-1-232x300.png 232w" sizes="(max-width: 267px) 100vw, 267px" /></figure>



<p>Abhi Bandopadhyay: I manage the outcomes for identity and access management across various workstreams, including workforce, customer and IoT identities in Spark NZ. My primary responsibility is to enable business to understand the complexities of digital identity and make informed decisions</p>
</div>



<p>My core competencies are IAM strategy, leadership, security, and delivery. I am responsible for defining the IAM vision and roadmap for Spark NZ, I also champion the principles of modern IAM, security by design, and zero trust mindset, and empower internal teams to leverage the platform for their needs. My mission is to enable Spark NZ to provide secure and seamless digital experiences for its customers and employees.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="600" height="600" data-id="2436" src="https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member.png" alt="" class="wp-image-2436" srcset="https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member.png 600w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-320x320.png 320w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="(max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/driving-ciam-success-without-funding-control/">Driving CIAM Success Without Funding Control</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CIAM and decentralized identities</title>
		<link>https://idpro.org/ciam-and-decentralized-identities/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Thu, 24 Mar 2022 21:33:22 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[ciam]]></category>
		<category><![CDATA[consumers]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[iam]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[idpro]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[social data]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=1560</guid>

					<description><![CDATA[<p>by Martin Sandren If you have been working in the IAM space for a while it is quite interesting to [&#8230;]</p>
<p>The post <a href="https://idpro.org/ciam-and-decentralized-identities/">CIAM and decentralized identities</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>by Martin Sandren</p>



<p>If you have been working in the IAM space for a while it is quite interesting to see how some trends are born, gather momentum, and break through to the mainstream, while other trends fizzle out at some point in their lifecycle.&nbsp;</p>



<p>Back in 2015 one strong emerging trend was social registration and login. The basic concept was to make it easier for potential customers to sign up for your product by leveraging the fact that the customers already had provided key info to their social network of choice. Instead of typing the same info into your interface the customer could simply share the already provided information. The customer could also leverage their social network to facilitate the login through social logins which meant that they did not have to remember a separate password. The most important social data providers varied in different markets but Google, Facebook, and Twitter were important in most European markets.</p>



<p>In 2015, many enterprises bought entire CIAM platforms whose core functionality was social registration and social login. The conventional CIAM players struggled to incorporate social features in their products to compete with the newer platforms and there were even projects where social logins were built as custom additions to conventional CIAM platforms by professional services teams.</p>



<p>A few years later, the lure of social login and registration was significantly diminished. Consumers are less interested in sharing information between different platforms and in many markets, such as in Germany, the business may feel that sharing information with the American <a href="https://www.investopedia.com/terms/f/faang-stocks.asp">FAANGS</a> may have dangerous privacy implications.</p>



<p>Meanwhile, there has been a budding movement for self sovereign data where the individual consumer has control of their own data in some form of a data wallet on their smartphone. The consumer makes the choice of what data they want to share with whom through consent flows.</p>



<p>This movement did not really take off due to the simple chicken and egg challenge that in order to make it attractive for providers to support the setup you needed a significant consumer population, and in order to make it attractive for consumers to bother with installing and populating the wallet you needed a significant service catalogue.&nbsp;</p>



<p>In some markets there were digital identity solutions that were successful i.e. the BankID solution in Sweden and Norway and the DigID solution in the Netherlands. These solutions managed to create a significant penetration into the consumer market and achieve critical mass amongst the service providers.</p>



<p>Over the last couple of years the self sovereign identity movement has morphed into the decentralized identity approach and has gotten support from a number of important regional and global players. One example of an important regional player is Datakeeper from Rabobank in the Netherlands and the strongest global proponent is probably Microsoft. The European Union is also a strong proponent of an interoperable European Digital ID.</p>



<p>Over the next year we will see if the decentralized approach manages to reach critical mass in any significant markets and become an interesting proposition for consumers, and therefore a must have integration for service providers and CIAM vendors.</p>



<div class="wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile" style="grid-template-columns:auto 21%"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="334" height="341" src="https://idpro.org/wp-content/uploads/2021/12/image.png" alt="" class="wp-image-1435 size-full" srcset="https://idpro.org/wp-content/uploads/2021/12/image.png 334w, https://idpro.org/wp-content/uploads/2021/12/image-294x300.png 294w" sizes="auto, (max-width: 334px) 100vw, 334px" /></figure><div class="wp-block-media-text__content">
<h2 class="wp-block-heading">                                                 <strong><em>Martin Sandren</em></strong></h2>



<p>                                                    <em>Domain Architect IAM, AholdDelhaize</em></p>
</div></div>



<p>Martin Sandren is a security architect and delivery lead with over twenty years of experience of various information security related roles. Primarily focused on security architecture and digital identity including global scale customer, privileged and employee IAM systems using Microsoft Azure Active Directory, Sailpoint, Saviynt, Forgerock, IBM and Oracle security stacks.</p>



<p>Experience includes architect, onshore and offshore team lead as well as individual developer. Wide international experience gained through having lived and worked in Sweden, Germany, UK, USA and the Netherlands. Martin is a frequent speaker at international conferences such as Consumer Identity World, MyData and European Identity and Cloud Conference.</p>



<p>In my role as IAM engineering manager I lead our global team of IAM engineers and BAs who continuously strives to provide quality IAM services to our 750 000 associates in 20+ opcos.</p>



<p>Martin Sandren is a board member of the IdNext foundation, founder of the Digital Identity Amsterdam meetup and active within IDPro.</p>



<p>Learn more and sign up at:<a href="https://www.meetup.com/Amsterdam-Digital-Identity-Meetup-Group/"> https://www.meetup.com/Amsterdam-Digital-Identity-Meetup-Group/</a></p>



<div class="wp-block-image"><figure class="alignright size-full"><img loading="lazy" decoding="async" width="455" height="323" src="https://idpro.org/wp-content/uploads/2022/03/MartinBadges.png" alt="" class="wp-image-1561" srcset="https://idpro.org/wp-content/uploads/2022/03/MartinBadges.png 455w, https://idpro.org/wp-content/uploads/2022/03/MartinBadges-300x213.png 300w" sizes="auto, (max-width: 455px) 100vw, 455px" /></figure></div>
<p>The post <a href="https://idpro.org/ciam-and-decentralized-identities/">CIAM and decentralized identities</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identiverse® 2022</title>
		<link>https://idpro.org/identiverse-2022/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 19:22:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[auth&#039;n]]></category>
		<category><![CDATA[auth&#039;z]]></category>
		<category><![CDATA[call for presentations]]></category>
		<category><![CDATA[ciam]]></category>
		<category><![CDATA[conferences]]></category>
		<category><![CDATA[devops]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[engineering]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[iam]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[identiverse]]></category>
		<category><![CDATA[identiverse expo]]></category>
		<category><![CDATA[idpro]]></category>
		<category><![CDATA[IGA]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[OED]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[self-sovereign]]></category>
		<category><![CDATA[trust]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=1383</guid>

					<description><![CDATA[<p>Identiverse 2022 is slated for June 21-24 in Denver, Colorado, and is anticipated to operate as a mainly in-person event.&#160; [&#8230;]</p>
<p>The post <a href="https://idpro.org/identiverse-2022/">Identiverse® 2022</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://identiverse.com/">Identiverse 2022</a> is slated for June 21-24 in Denver, Colorado, and is anticipated to operate as a mainly in-person event.&nbsp; As with every year, the bulk of the agenda will be put together from proposals received through the open and public Call for Presentations (CFP), which will open for submissions in early December, and run until early January.&nbsp; The content committee will then review submissions, and proposers will be notified of decisions in February 2022.</p>



<p>The conference this year will have a particular focus on Trust, which the Oxford English Dictionary primarily defines as a “Firm belief in the reliability, truth, or ability of someone or something; confidence or faith in a person or thing, or in an attribute of a person or thing.”</p>



<p>Questions of trust lie at the very foundation of our identity systems.&nbsp; We trust standards bodies to develop protocols that will be useful, practical and secure.&nbsp; We trust developers and vendors to build products, solutions and services that will implement those standards in performant, scalable and extensible ways.&nbsp; We trust providers to deliver robust services that we and our customers can rely on. &nbsp; We trust executives to listen and to support and fund the crucial work that we do.&nbsp; And, of course, we develop and implement mitigations in case our trust is misplaced.</p>



<p>But trust is broader than this; and trust goes both ways.&nbsp; As consumers and as citizens, we would like to trust that organisations won’t collect information they don’t need; that they will handle that data safely and properly; that they will keep pace with rapidly evolving best-practices in identity, security and privacy.&nbsp; A world in which that trust is not assured is an uncomfortable world at best; and many people today live, work or interact in circumstances which are not inherently trustworthy.&nbsp;</p>



<p>The OED has a secondary definition of Trust.&nbsp; “To take on (also upon) trust (formerly also †to take up in (also upon) trust&nbsp; †to receive in trust and variants): to believe or accept a statement, story, etc., <strong>without seeking verification or evidence for it.</strong>” (Emphasis added).&nbsp;&nbsp;</p>



<p>Over the past 24 months, we’ve seen an explosion in digital identity assurance and verification programs.&nbsp; Mobile drivers’ licenses, COVID and other healthcare passes and certificates, digital boarding cards, facial recognition for age verification and in-store check-out… the list is long, and it is growing.&nbsp; As a result, we’re also seeing an explosion of interest in governance and interoperability within and between use-cases and sectors: trust frameworks, attribute mapping and matching, account linking and more besides.</p>



<p>These advances hold great promise to make our lives more efficient and connected; to reduce friction, and fraud, and risk.&nbsp; But a balance is needed, too.&nbsp; Trust is a fragile thing—hard to gain, easy to lose, difficult to rebuild.&nbsp; Organisations and institutions must take care not to overstep the bounds of our trust, lest they lose our engagement and, in the end, our support.</p>



<p>Trust is an important topic, but it’s certainly not the only issue of note in the industry!&nbsp; The topic focus each year for Identiverse infuses but does not dictate the agenda and the event.&nbsp; New and emerging standards and architectures; deployment stories and leading practices; identity for connected devices; new approaches to privacy, security, devops, engineering; sector-specific identity practices in healthcare, manufacturing, government, education, financial services and more; and specific identity-related disciplines like CIAM, auth’n, auth’z, self-sovereign, IGA…. That list barely scratches the surface: and your proposals on these and many other topics will inform and contribute to the agenda.</p>



<p>This year’s content committee and I look forward to seeing your proposals; and I trust that we’ll be able to get together in person in Denver in June.</p>



<div class="wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:auto 19%"><figure class="wp-block-media-text__media"><img decoding="async" src="https://lh5.googleusercontent.com/TH3k9JPXg2pOhoYOOhcFtcLL3G7ilYWtW2JV2RjdMyFnXNbBOXIpSsr79LUJm0xnuOuRuEgZtc-O_j5CoeBOL2NKlhVeKFvv3CE56e-Hxwd2jZabM2gFvJU-rK8M6wvhJE2Vk2ow" alt=""/></figure><div class="wp-block-media-text__content">
<h3 class="has-text-align-right wp-block-heading"><strong><em>Andrew Hindle</em></strong></h3>



<h4 class="has-text-align-right wp-block-heading"><strong><em>Independent Consultant, Board Member IDPro</em></strong></h4>
</div></div>



<p>Andrew is an independent consultant specialising in digital identity, cyber security and privacy. He is a founding member, and Chair of the Board, of IDPro; he participates as a voting member of the User Managed Access Working Group at Kantara; and he is an active member of the Open Identity Foundation (OIDF).  Since 2015, he has been Content Chair for Identiverse®. Andrew has over 20 years experience in the software industry in a range of technical sales, pre-sales, product marketing and business development roles. He maintains CIPP/E, CIPM and CIPT privacy certifications with the IAPP; a CIDPRO certification from IDPro; and holds a BA in Oriental Studies (Japanese) from Oxford University and an advanced professional diploma in corporate governance. Outside of the world of identity, Andrew is Chair of Trustees for his local scouting group, rides regularly with a local road cycling group, and plays keyboard, guitar and bassoon (not at the same time) with more enthusiasm than skill, and for an audience of one. Andrew is based in the UK.</p>



<figure class="wp-block-gallery columns-3 wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-5.png" alt="" data-id="1389" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-5.png" data-link="https://idpro.org/?attachment_id=1389" class="wp-image-1389"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-6.png" alt="" data-id="1390" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-6.png" data-link="https://idpro.org/?attachment_id=1390" class="wp-image-1390"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-4.png" alt="" data-id="1388" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-4.png" data-link="https://idpro.org/?attachment_id=1388" class="wp-image-1388"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-3.png" alt="" data-id="1387" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-3.png" data-link="https://idpro.org/?attachment_id=1387" class="wp-image-1387"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-2.png" alt="" data-id="1386" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-2.png" data-link="https://idpro.org/?attachment_id=1386" class="wp-image-1386"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-1.png" alt="" data-id="1385" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-1.png" data-link="https://idpro.org/?attachment_id=1385" class="wp-image-1385"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image.png" alt="" data-id="1384" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image.png" data-link="https://idpro.org/?attachment_id=1384" class="wp-image-1384"/></figure></li></ul></figure>
<p>The post <a href="https://idpro.org/identiverse-2022/">Identiverse® 2022</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-26 01:48:50 by W3 Total Cache
-->