Last updated: 2026-02-23 18:39:01 UTC
Day 1 (April, 22nd)
| Start | End | Session | Room | Speaker | Tag | Topic | Coverage | Interest |
|---|---|---|---|---|---|---|---|---|
| 8AM – 9AM: BREAKFAST | ||||||||
| 9:00 am | 10:00 am | Plenary | UVU Room 402 |
Samuel M. Smith
|
ADV | State of the KERISuite and its adoption | The KERISuite’s inventor’s view on the state of the art and roadmap. At the end of this talk, break-out sessions might get some introduction. | |
| 10:00 am | 10:40 am | Plenary | UVU Room 402 |
FEATURED FEATURED
|
ADV | Root of Trust: Infrastructure | How to build ecosystems’ roots-of-trust, design principles behind them. Want to adopt KERI in a new ecosystem. Learn how to create the root of trust for that ecosystem | Getting to know GLEIF’s Repository |
| 10:45AM – 11:00AM: COFFEE AND TEA BREAK | ||||||||
| 11:00 am | 11:40 am | Plenary | UVU Room 402 |
Phil Feairheller
|
ADV | Infrastructure for security: witnesses and watchers, at scale signing | How the core infrastructure pieces enable fault-tolerant security and how fault-tolerance secures trust. | |
| 11:45 am | 12:30 pm | Plenary | UVU Room 402 |
Thomas Mayfield
|
REF | KERI and ACDC Infrastructure | An overview of KERI/ACDC Infrastructure presented using the 5 W’s (Wallet, Witness, Watcher, Web, and Wizard) | |
| 12:30PM – 1:30PM: LUNCH | ||||||||
| 2:15 pm | 3:00 pm | Break-out | Digital Trust Foundry Room 430 |
PLACEHOLDER PLACEHOLDER
|
REF | PAC Theorem | Explain the trade space of the PAC Theorem | |
| 2:15 pm | 3:00 pm | Break-out | Platinum Room 141 |
Cole Davis
|
ASE | Technical implications of KERISuite adoption: Switchchord-Did:webs | Why Switchchord has chosen for the KERISuite, why via did:webs and how this is unique in the their Industry | |
| 2:15 pm | 3:00 pm | Break-out | 3GR Room 111 |
FEATURED FEATURED
|
ADV | KERIpy-1 | Deep dive into the leading code of the KERISuite | Hands-on programming skills, do’s and don’ts |
| 3:00PM – 3:15PM: COFFEE AND TEA BREAK | ||||||||
| 3:15 pm | 4:00 pm | Break-out | Digital Trust Foundry Room 430 |
FEATURED FEATURED
|
ADV | KERIpy-2 | Deep dive into the leading code of the KERISuite | |
| 3:15 pm | 4:00 pm | Break-out | Platinum Room 141 |
PLACEHOLDER PLACEHOLDER
|
ASE | Architectural Guidance | How to set up a KERISuite technical and governance stack | Gaining fundamental knowledge |
| 3:15 pm | 4:00 pm | Break-out | Platinino Room 143 |
FEATURED FEATURED
|
REF | IT Automation with the KERI Suite | Topic CHANGED | Topic CHANGED |
| 4:00 pm | 4:45 pm | Break-out | Digital Trust Foundry Room 430 |
Samuel M. Smith
|
ADV | SPAC/TSP1 | ||
| 4:00 pm | 4:45 pm | Break-out | Platinum Room 141 |
FEATURED FEATURED
|
ADV | Keria | ||
| 4:00 pm | 4:45 pm | Break-out | Platinino Room 143 |
FEATURED FEATURED
|
ADV | Agentic AI in KERI with {Tool} | Deep Dive into {Solution} IT automation with {Tool}. Installation processes secured by KERI. | See how KERI folks use AI the right way to secure the results with KERI. |
| 5:00 pm | 5:30 pm | Plenary | UVU Room 402 |
FEATURED FEATURED
|
AVO | Conclusions, feedback and outlook | Conclusion, tips, feedback, requests and planning of repeating break-out session (held today) | Resonate with what others say, get a rebound for a missed break-out session. |
| Dinner | ||||||||
Day 2 (April, 23rd)
| Start | End | Session | Room | Speaker | Tag | Topic | Coverage | Interest |
|---|---|---|---|---|---|---|---|---|
| 8AM – 9AM: BREAKFAST | ||||||||
| 9:00 am | 10:00 am | Plenary | UVU Room 402 |
Samuel M. Smith
|
ADV | Future potential of the KERI world | All Privacy – and DKP adepts violate the NIST SP 800-57 practise for keymanagement: Adaptive cryptoperiods. | Loss of valuables, you just violated the decades-old rule of proper key management. Never ever forget to work with the lifespan of a key. |
| 10:00 am | 10:40 am | Plenary | UVU Room 402 |
Phil Feairheller
|
REF | Using ACDCs as authorization (EVAC; edge verifiable access control) | How to use ACDCs as a truly secure access control mechanism (EVAC; edge verifiable access control) | All attacks on access control nowadays are edge attacks. EVAC; edge verifiable access control is resistant to edge attacks. It’s never done before: being resistant against Recursive Privileged Escalation Attacks. |
| 10:45AM – 11:00AM: COFFEE AND TEA BREAK | ||||||||
| 11:00 am | 11:40 am | Plenary | UVU Room 402 |
Alan Davies
|
ADV | Tool for creating ACDCs for enterprises, VC issuance | What they’ve implemented: a registrar or an observer using a sparse Merkle tree | |
| 11:45 am | 12:30 pm | Plenary | UVU Room 402 |
FEATURED FEATURED
|
ASE | PLACEHOLDER | ||
| 12:30PM – 1:30PM: LUNCH | ||||||||
| 1:30 pm | 2:10 pm | Break-out | Digital Trust Foundry Room 430 |
Samuel M. Smith
|
ADV | SPAC/TSP2 | Usage of the working code of SPAC/TSP | Red-handed coder explains… |
| 1:30 pm | 2:10 pm | Break-out | Platinum Room 141 |
Jonathan Rayback
|
REF | DID:WEBS KERI bridge to the DID world, DID:SCID etc. | Why DID:WEBS stands out compared to the other DID methods. | |
| 1:30 pm | 2:10 pm | Break-out | Platinino Room 143 |
FEATURED FEATURED
|
ASE | ISO Path | How the KERISuite gets ISO standardization, current status how and why it became aToIP standard | The importance of ISO as a standards body adopting and recommending our specs |
| 2:15 pm | 3:00 pm | Break-out | Digital Trust Foundry Room 430 |
Ari Argoud
|
ADV | KERI’s Request Authentication Mechanism | Implementation of… | Leading by example |
| 2:15 pm | 3:00 pm | Break-out | Platinum Room 141 |
FEATURED FEATURED
|
REF | {Organisation} pilot | Blogposts introduced / pilot | Everybody cares about finally fixing {Device} spam |
| 2:15 pm | 3:00 pm | Break-out | Platinino Room 143 |
FEATURED FEATURED
|
REF | Root of Trust: identity assurance | State-based root-of-trust explained | Many jurisdictions will follow the footsteps of Utah as a trailblazer; know how to set up and maintain a state-based root-of-trust |
| 3:00PM – 3:15PM: COFFEE AND TEA BREAK | ||||||||
| 3:15 pm | 4:00 pm | Break-out | Digital Trust Foundry Room 430 |
George McEwan
|
REF | The landscape of SEDI | In this session, we will explore the framework of SEDI, and the roll out plans across the State of Utah. | |
| 3:15 pm | 4:00 pm | Break-out | Platinum Room 141 |
FEATURED FEATURED
|
AVO | Learnings from Stewarding the KERI Investment Ecosystem | A series of investments in certain verticals and related technical implementations | Pitfalls, feedback , make a foew shortcut |
| 3:15 pm | 4:00 pm | Break-out | Platinino Room 143 |
Kent Bull
|
REF | KERIA tutorial | Step-by-step workshop | If you’re hands-on working on KERI identifiers, you get this irresistible urge to continue |
| 4:00 pm | 4:45 pm | Break-out | Digital Trust Foundry Room 430 |
SPEAKER_FN LastN
|
AVO | Apache2 RUST library | The RUST library that matches the KERISuite software license | Why it’s crucial to have matching licenses in the end |
| 4:00 pm | 4:45 pm | Break-out | Platinum Room 141 |
Ned Smith
|
REF | Secure Asset Transfer Protocol (satp) | ||
| 4:00 pm | 4:45 pm | Break-out | Platinino Room 143 |
Daniel Hardman
|
ADV | applying KERI to general evidence problems | KERI+ACDC has always supported the assembly of arbitrary pieces of evidence into a rich graph — e.g., to snapshot artifacts in a complex application, to summarize careful research, to unify credentials in a package, or to track the artifacts in a formal legal case. It even has a ready answer about how to build bridges with other evidence formats like W3C VCs, ISO mDL, docusigned PDFs, and more. However, we have lacked certain conventions about how relationships among the pieces of evidence and the people who assemble this evidence are related. The dossier spec covers issues like these and is an exciting new tool for anyone working in KERI. | |
| 5:00 pm | 5:30 pm | Plenary | UVU Room 402 |
FEATURED FEATURED
|
AVO | Conclusions, feedback and outlook | Conclusion, tips, feedback, recordings and follow-up | Resonate with what other say, and wrapping up the conference |
- Keynote Session: Highlighted in the schedule – major presentations in the Main Auditorium
- Break-out Sessions: Interactive, hands-on learning sessions with limited seating
- Panels: Moderated discussions with multiple experts
- Lightning Talks: Quick 5-minute presentations showcasing innovations
Note: Schedule is subject to change. Please check back regularly for updates.
