Join the community of professionals from Payments, Identification and Security in Cannes!
TRUSTECH is the international event dedicated to Payments, Identification and Security. The event was first held over thirty years ago under the name «CARTES Secure Connexions» to promote the newborn technology of smartcards. In 2016, it was re-named TRUSTECH to better reflect the way the industry is evolving towards trust-based technologies.
A popular mix of trade show and conference, TRUSTECH showcases the latest hardware and technologies involved in the markets related to Payments, Identification and Security.
A global marketplace, the show floor features a comprehensive panel of international exhibitors, sponsors and startups presenting their latest innovations, product launches and solutions on their stand, or through lively pitch sessions on the innovation stage located at the heart of the event.
TRUSTECH offers you 3 intensive days of business in a friendly and relaxed atmosphere at the heart of the French Rivera. Entry to the event is free covering both the visit of the exhibition and attendance to the conferences.
A Conference cycle focusing on 3 main themes aligned with the TRUSTECH key exhibition offering: Payments, Identification and Security
What are the challenges of digital identity, online payment and security?
There are three sectors of technology that TRUSTECH conferences explore, question and hypothesize about what lies ahead for consumers, companies and organizations. Those components are identity, security and payment.
What are the developments in payments?
digital identity of users and respecting European privacy regulations. This issue is heavily influenced by the development of physical transactions, as well as taking into consideration the growing empire of e-commerce.
Online payment is seeing exponential growth from year to year. Much of this trend can be attributed to its speed, comfort and safety presented with the online commerce experience. However, there is also a significant emergence of new technologies such as instant transfers, or P2P. In this context, identification and authentication play a lead role in both digital and physical security requirements.
By September 2019, new standards will be set in the EU for even stronger client authentication procedures. For businesses and governments to properly adapt to these changes, a strong understanding of the current biometric practices is paramount.
How does identity impact organizations?
Digitization brings into question how the use of physical official documents will be used in the future. It also implies there will be new innovations in regards to how physical identity will be managed.
In terms of identification, governments have begun shifting away from physical official documents such as: social security cards, passports, driver licenses, visas and more. These uses of biometric tools have increased on an exponential level. Most commonly known for its mobile scale of facial recognition, the digital identity authentication service reaches over to transport, border control, banking, healthcare and cloud services thanks to AFIS and ABIS.
The evolution of migration fluctuations also imposes new challenges on authenticating physical identities. Border patrol centers now must verify whether the official title holders are the legitimate owners.
Digital disruptors do not only concern governments, but extend to every business sector, and continue to develop using new technological innovations that shape the authentication of digital identity. This includes health insurance, retail, transportation, banking and communication. Big companies integrate blockchain to develop links between IoT, organizations and humans.
AI, IoT and blockchain technologies are industry disruptor organizations that take digital identity authentication to new standards.
The same thing goes for biometric authentication and facial recognition: these markets continue to keep growing. With artificial intelligence algorithms, these technologies are true security opportunities for many domains, including the cloud, insurance, banks as well as public transportation.
What are the evolutions in security?
Identity management and access are paramount to secure organizations. Currently, data analysis technicians, biometrics and digital identity are combined to calculate and predict risks, evaluate behaviors and expand social credit systems.
Along with cybersecurity’s purpose to ensure the viability of online transactions, it also protects the identity of users and secures their privacy. There is a high demand for these security measures due to the sensitivity of the content that can be accessed digitally.
With the increased use of process technology, access management systems and Cloud services, cybersecurity is now evolving to become cyber resilience, which creates a more global, holistic approach than before. In order to efficiently protect sensitive data and digital identity, security increasingly requires an intricate set of technological layers to ensure users and companies that they have the necessary protection for their information.
For governments, biometrics is a good way to bring more security on authentication. It consists of comparing one’s attributes to a model saved on a card for example. Along with biometrics, there are other ways to make physical documents safer, such as holographic, printed or forensic elements.
The security solutions for physical identity documents must be considered with social norms and new international rules about privacy and data protection. Physical identity, digital identity, cybersecurity, privacy, client consent management, as well as physical and online payment are important points of inquiry that must be considered by companies and governments.
For companies, product-tracking and fraud (or counterfeiting) are an ongoing battle. Because of this demand for protection, digital trust technologies have been developed to prevent counterfeit or fraudulent practices. With the implementation of RFID and NFC tags, holograms, codes and embedded signatures, it has become more difficult to infringe upon the rights and intellectual property of companies.
As far as they’re concerned, governments and border control services must guide the growing needs for authentication. Digital and physical changes of official papers imply to integrate multiple levels or security.
Biometric authentication compares one’s attributes to their biometric model in order to define a level of resemblance. This model can be seen in a chip card or many other mobile security elements. The process of biometric identification allows for a process to capture biometric attributes. That’s the reason why biometrics are paramount in matters of security for official documents.
Governments face a lot of challenges to improve their citizens’ security. That’s why they must question the advantages and inconveniences of physical or digital documents management.
All of these TRUSTECH conferences ask the questions that we need to be asking for the future. Protection policy standards are continuing to evolve. In order for companies to learn how best to make themselves competitive and more accessible in the digital and physical commerce world, an understanding of what consumers’ user experience is, as well as the potential risks that accompany the innovative world of commerce is important. That is why companies should educate themselves on data protection with the TRUSTECH conferences.
With the TRUSTECH conferences, companies have a platform to discuss their digital presence, identity issues, online or physical transactions and more. It’s a medium to learn as well as teach in hopes to achieve the most safe and progressive practices possible.
Products and services at TRUSTECH include:
- Authentification, tokenisation, data protection
- Secure documents and egovernment
- Secure identities and access control
- Identification and biometrics
- Machine to Machine, Internet of Things, Wearables
- Test measurement and monitoring equipment
- Personalization printing and other machines
- POS, card readers and payments terminals
- Mobile security (TEE, SE, SIM, HCE)
- Software, API
- Solutions for alternative payment (wallet, prepaid, transfers, P2P, digital currencies)
- Ebanking and mbanking solutions
- Ecommerce and mcommerce solutions
- Contactless technologies NFC RFID