Deutsche Telekom Security GmbH

Aldo Izard Gosch

Lead Portfolio & Partner Strategie für Identity Security | Deutsche Telekom Security GmbH

Aldo Izard Gosch is an international thought leader and strategic expert for digital identity, trust services, and cybersecurity at Deutsche Telekom Security. He drives the global positioning of sovereign identity and signature solutions at the intersection of technology, regulation, and market strategy. His expertise spans IAM, PKI, electronic signatures and securing digital business models in the age of AI. Aldo advises enterprises and public institutions worldwide on building scalable, trustworthy digital strategies.

Follow me
Focus Topics

The Focus Topics form the thematic core of the DIGITAL X– with a clear view of the opportunities and relevant challenges for companies. The speaker's focus is:

Security

Experience my sessions live.

Discover my sessions, join us live, and don't miss a single presentation at DIGITAL X!

Masterclass Security

Magenta Mobile ID – die Identität der Zukunft ist mobil, sicher und magenta

14:15-14:45
Raum A
German
Advanced

Magenta Security Mobile ID turns the smartphone into a high-security digital identity anchor. In this masterclass, we show how organizations can secure identities in a mobile, sovereign and hardware-based way – from access control and qualified signatures to AI authenticity. Learn how to combine trust, compliance and user experience while turning identity into a strategic advantage.

Masterclass Security

Identity & Access Management – das Herzstück der digitalen Sicherheit: Kontrolle, Vertrauen, Zero Trust

15:45-16:15
Raum B
German
Basic

Identity & Access Management (IAM) has become the core control layer of modern cybersecurity and the foundation of Zero Trust. In this masterclass, Tilman Dreyer explains why identities are the new security perimeter, highlights common IAM pitfalls, and shows how IAM enables control, compliance, and trust at scale. Using real-world examples, participants learn how to design resilient access models and future-ready security architectures.