Steve Hutchinson

Board Member & Principal Cybersecurity Architect; IDPro & GE Digital
Steve “Hutch” Hutchinson is the Principal Cybersecurity Architect for GE Digital. After cutting his teeth in C/C++ software development and network engineering, Hutch spent a decade as an enterprise architect in the healthcare sector focused on security and network technologies. In his current role at GE, he is responsible for strategy of one of the largest corporate identity infrastructures in the world and oversees its evolution to provide the next generation of identity services required for GE’s “Industrial Internet.” Hutch is a founding member of IDPro and is honored to sit on the inaugural Board focused on community development which has always been one of his passions. If you’re ever in Richmond, VA on a Wednesday night, drop him a note for an invite to his biweekly backyard get-together.

Steve's Sessions


Thursday, June 27
5:00 - 5:25 pm
Ballroom
Harness Your Identity Analytics to Deliver Contextual Authentication
Identity Analytics (IdA) has experienced tremendous growth within the cybersecurity community. Most of the work has focused on data mining to analyze existing user rights to reduce over-provisioning and improve privileged access management systems. But what about authentication systems that must make decisions using dynamic data that is created in real-time? Steve “Hutch” Hutchinson, GE’s Principal Cybersecurity Architect, will show how you can leverage your own hidden identity analytics to create a risk engine for real-time risk-based authentication decisions. The session will demonstrate where to find data in your system silos as well as techniques to properly tag and label those attributes for efficient processing. Steve will also exhibit exciting new Machine Learning and Artificial Intelligence tools being provided in the cloud that can be used not only to enhance authentication security, but also to shine a light on risks and issues that remain hidden within mountains of data.

Tuesday, June 25
8:15 - 9:05 am
Jefferson
Introduction to Identity - Part 1
(Part 1) The importance of Digital Identity and Access Management continues to grow in the field of cybersecurity. IAM still ensures “the right access to the right people at the right time for the right reasons,” but other issues like new regulations, cyber-espionage, insider threats, IoT, and privacy concerns have made IAM one of the fastest growing segments of IT. Unfortunately, it can also be one of the most confusing to understand. New technology and new use cases bring with them new terminology and new practices. For identity practitioners who are early in their career, security leaders and executives responsible for identity systems, it can be difficult to even figure out where to start. Every explanation seems to reference a multitude of other practices and dozens of confusing acronyms. Even seasoned professionals can loose track of what's new, especially if it's outside of their immediate area of focus. This workshop -- provided by IDPro -- will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations. Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.

Tuesday, June 25
9:15 - 10:05 am
Jefferson
Introduction to Identity - Part 2
(Part 2) The importance of Digital Identity and Access Management continues to grow in the field of cybersecurity. IAM still ensures “the right access to the right people at the right time for the right reasons,” but other issues like new regulations, cyber-espionage, insider threats, IoT, and privacy concerns have made IAM one of the fastest growing segments of IT. Unfortunately, it can also be one of the most confusing to understand. New technology and new use cases bring with them new terminology and new practices. For identity practitioners who are early in their career, security leaders and executives responsible for identity systems, it can be difficult to even figure out where to start. Every explanation seems to reference a multitude of other practices and dozens of confusing acronyms. Even seasoned professionals can loose track of what's new, especially if it's outside of their immediate area of focus. This workshop -- provided by IDPro -- will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations. Part 1 of this 2-part class covered the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In this second Part, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.

Enter your details to receive email updates from Identiverse