Gluu Blog

Follow us:
Back to Blog

Gluu SXSW 2015 Interactive Picks

Michael Schwartz August 11, 2014

SXSW 2015 Panel Picker Picks

Voting for SXSW 2015 interactive sessions is NOW CLOSED!

Sessions have been announced. View our list of recommended 2015 SXSW Interactive sessions.

Approximately every day until voting ends we’ll highlight a new proposal that seems worthy of inclusion in SXSWi 2015, with a bias towards security and web related topics.

Click on any session title below to access the voting page.


  1. NEW TODAY! My biometric data for your bitcoin?
    What is your data worth to you? Would you trade it for bit coin? – See more at:
    By: Eddie Garcia, Information Security Architect at Cloudera and David Tishgart, Director of Partner Marketing at Cloudera
  2. Biometrics & Identity: Beyond Wearable
    What are the implications of using personal biometric data as the virtual keys that unlock our very real lives? How should we feel about using such sensitive, personal data as a means of self-identification?
    By: Heather Schlegel, ; John C. Havens, The H(app)athon Project; Leslie Saxon, USC Center for Body Computing
  3. Security of Things: Who will save us?
    IOT Security: how we got here, where we’re heading, why the hacking community plays a pivotal role, and how to protect yourself when the lines between public and private blur.
    By: Nicholas Percoco, Rapid7
  4. Securing the New Wearable World
    With the mass adoption of wearable devices comes a new data ecosystem that must be protected. By effectively addressing the security vulnerabilities, privacy concerns and regulation issues that come with the evolving wearable industry, this brave new world can be enjoyed by all.
    By: Gary Davis, McAfee
  5. Bringing smarts to the old social security card
    This session will cover how smart card technology can be used to modernized the Social Security card, transforming it from a piece of paper to a durable plastic card with a chip that can store citizen SSNs in a highly secure and private manner.
    By: Neville Pattinson, Gemalto
  6. IoT and Personal Privacy: Can They Co-Exist?
    How far are consumers willing to push the boundaries of privacy to live in a truly connected world? From the co-founder of an app that tracks your friends and family, this discussion weighs the privacy challenges of living in a connected world against the benefits that this new world brings.
    By: Chris Hulls, Founder and CEO of Life360 and Arthur Orduña, Chief Innovation Officer at ADT Security
  7. Design for Security & Usability in the age of IoT
    A discussion on the interplay between security & design for connected devices, wearables, the automated home, and Internet of Things products with a company that is making wearable wifi connected boards.
    By: Karen Robinson, Founder of Get the Quill, and
    Laura Kassovic, CEO and Co-Founder, Mbient Lab
  8. Screw Privacy, Just give me value for my data
    A discussion on the issue of data literacy and the data value exchange between shoppers and brands.
    By: Lisa Pearson, Bazaarvoice CMO, and Lee Maicon, Senior Vice President of Strategy at 360i
  9. Calling for a Nation of Makers Learn how the country is supporting the maker movement; how maker tools are becoming more accessible to consumers; and the effects of this widespread entrepreneurial spirit on the future.
    By: Mark Hatch, TechShop, and Thomas Kalil, The White House Office of Science and Technology Policy
  10. How API access control = monetization + freedom Gluu CEO Mike Schwartz will provide a history of access management and a deep dive into the concepts, patterns, and tools needed to enable mobile and API developers to put new OAuth2 standards to use today.
    By: Mike Schwartz, CEO Gluu
  11. Accelerate your web development with Yeogurt Stop worrying about configuration and focus on what you do best: building websites. Kickstart your next web project with Yeogurt and start building better websites, faster.
    By: Jake Larson, Acquity Group, part of Accenture Interactive
  12. Rapid On-Boarding; Building Password-less Apps This session addresses the modern obstacles created by requiring passwords during on-boarding and during later service or app engagement.
    By: Derek Labian & Tom Langridge, MediaFire
  13. Enhance network security: Change your perspective With the digital age in full swing and technology expanding at astonishing rates, computer security is more important than ever. By changing our vantage point, we are able to mine and correlate rich metadata which can be used to assist network intrusion detection and identify corporate network breaches.
    By: Ryan Holeman & Josh Applebaum, Ziften
  14. The Nexus of National Security and Silicon Valley How can we build a lasting and dynamic culture of innovation within and across the US military? What culture do (or should) Fighter Pilots, Navy SEALs and the most successful tech entrepreneurs have in common?
    By: Benjamin Kohlmann, US Navy; Brian Ferguson, US Navy
  15. Your House Has Eyes – Security Issues in IoT Privacy in the connected home is a complicated issue and one the market will face on the road to widespread connected device adoption.
    By: Seth Rosenblatt, CNET News Senior Writer on Google and security; Michael Yang, Healthcare and IoT Investor with Comcast Ventures; Letha Mclaren VP Product Development at Icontrol Networks; Kev Dunn, Technical VP at
  16. A Walk Through the Identity Ecosystem in 3D Take a 3D tour of the modern digital identity eco-system and learn how persons, organizations, and devices provide the new foundation for defining and mitigating identity threats. Glasses included.
    By: Suzanne Barber, UT Center for Identity
  17. Prototyping Tools and Techniques for UX Designers UX design prototyping has come a long way in recent years. Learn about cutting edge tools, techniques, and various ways to incorporate interactive design prototyping along with user testing into your overall process.
    By: John Goff, Ebay
  18. Digital Identity and the New Consumer The evolution of consumer digital identity, how it changes the brand conversation, empowers consumers and most importantly, creates real opportunities for authentic brand engagement.
    By: Reggie Wideman, Janrain
  19. Care and Feeding of Human & Device Relationships This session discusses the developing laws of relationships between people, entities, and things and provides an innovative view of the landscape from the Identity Relationship Management Open Work Group.
    By: Eve Maler, ForgeRock, Joni Brennan, Kantara, Ian Glazer, SalesForce & Michelle Waugh, CA
  20. OAuth2 – The Swiss-Army Framework This session will focus on the myriad of ways OAuth2 can be used to protect APIs, and how OpenID Connect is replacing SAML as the developer friendly way to handle SSO and federated logins.
    By: Brent Shaffer, Adobe
  21. Death to passwords – mobile security done right What techniques exist to offer a more mobile friendly person-identification flow. Highlighting authorization and authentication techniques like OAuth, OpenID Connect and even hardware features like Bluetooth Low Energy this talk will be interesting for anyone who’s facing a situation where creating and storing user accounts matters.
    By: Tim Messerschmidt, Paypal
  22. Secrets to Powerful APIs What’s new in API development from some of today’s most popular APIs including GitHub, SoundCloud, Stripe, and Dropbox. Topics will include designing RESTful APIs, user authentication, APIs for media, developing SDKs, and APIs for mobile.
    By: Leah Culver, Developer Advocate at Dropbox, Greg Brockman,CTO Stripe, Erik Michaels-Ober, Developer Soundcloud, Wynn Netherland Developer at Github
  23. Fingerprints are Usernames, not Passwords What are the implications of biometric sensors in consumer devices, and how we might want to change our thinking and approach to protect privacy and increase security.
    By: Dustin Kirkalnd, Canoncial
  24. Passwords are broken. Time for alternatives! What is the current state of passwords, and what are the options for web developers to avoid the dreaded username/password SQL table.
    By: David Ochel, Secuilibrium
  25. Rethinking Privacy in the Internet of Things With the mass boom in online profiles, companies will very soon be dealing with millions to billions of potential ID challenges. This brings security issues and usage problems to the forefront that nobody is talking about quite yet.
    By: Steve Shoaff, CEO at UnboundID


If you plan to be in Austin for SXSW, please let us know!

Be sure to subscibe to
our RSS Feed

Mike Schwartz

Mike has been an entrepreneur and identity specialist for more than two decades. He is the technical and business visionary behind Gluu. Mike is an application security expert and has been a featured speaker at RSA Conference, Gartner Catalyst, Cloud Identity Summity (now "Identiverse") and many other security conferences around the world.