Program Wed/Thu April 22 & 23

Last updated: 2026-02-23 18:39:01 UTC


Day 1 (April, 22nd)

Start End Session Room Speaker Tag Topic Coverage Interest
8AM – 9AM: BREAKFAST
9:00 am 10:00 am Plenary UVU Room 402 Samuel M. Smith
Samuel M. Smith
ADV State of the KERISuite and its adoption The KERISuite’s inventor’s view on the state of the art and roadmap. At the end of this talk, break-out sessions might get some introduction.
10:00 am 10:40 am Plenary UVU Room 402 FEATURED FEATURED
FEATURED FEATURED
ADV Root of Trust: Infrastructure How to build ecosystems’ roots-of-trust, design principles behind them. Want to adopt KERI in a new ecosystem. Learn how to create the root of trust for that ecosystem Getting to know GLEIF’s Repository
10:45AM – 11:00AM: COFFEE AND TEA BREAK
11:00 am 11:40 am Plenary UVU Room 402 Phil Feairheller
Phil Feairheller
ADV Infrastructure for security: witnesses and watchers, at scale signing How the core infrastructure pieces enable fault-tolerant security and how fault-tolerance secures trust.
11:45 am 12:30 pm Plenary UVU Room 402 Thomas Mayfield
Thomas Mayfield
REF KERI and ACDC Infrastructure An overview of KERI/ACDC Infrastructure presented using the 5 W’s (Wallet, Witness, Watcher, Web, and Wizard)
12:30PM – 1:30PM: LUNCH
2:15 pm 3:00 pm Break-out Digital Trust Foundry Room 430 PLACEHOLDER PLACEHOLDER
PLACEHOLDER PLACEHOLDER
REF PAC Theorem Explain the trade space of the PAC Theorem
2:15 pm 3:00 pm Break-out Platinum Room 141 Cole Davis
Cole Davis
ASE Technical implications of KERISuite adoption: Switchchord-Did:webs Why Switchchord has chosen for the KERISuite, why via did:webs and how this is unique in the their Industry
2:15 pm 3:00 pm Break-out 3GR Room 111 FEATURED FEATURED
FEATURED FEATURED
ADV KERIpy-1 Deep dive into the leading code of the KERISuite Hands-on programming skills, do’s and don’ts
3:00PM – 3:15PM: COFFEE AND TEA BREAK
3:15 pm 4:00 pm Break-out Digital Trust Foundry Room 430 FEATURED FEATURED
FEATURED FEATURED
ADV KERIpy-2 Deep dive into the leading code of the KERISuite
3:15 pm 4:00 pm Break-out Platinum Room 141 PLACEHOLDER PLACEHOLDER
PLACEHOLDER PLACEHOLDER
ASE Architectural Guidance How to set up a KERISuite technical and governance stack Gaining fundamental knowledge
3:15 pm 4:00 pm Break-out Platinino Room 143 FEATURED FEATURED
FEATURED FEATURED
REF IT Automation with the KERI Suite Topic CHANGED Topic CHANGED
4:00 pm 4:45 pm Break-out Digital Trust Foundry Room 430 Samuel M. Smith
Samuel M. Smith
ADV SPAC/TSP1
4:00 pm 4:45 pm Break-out Platinum Room 141 FEATURED FEATURED
FEATURED FEATURED
ADV Keria
4:00 pm 4:45 pm Break-out Platinino Room 143 FEATURED FEATURED
FEATURED FEATURED
ADV Agentic AI in KERI with {Tool} Deep Dive into {Solution} IT automation with {Tool}. Installation processes secured by KERI. See how KERI folks use AI the right way to secure the results with KERI.
5:00 pm 5:30 pm Plenary UVU Room 402 FEATURED FEATURED
FEATURED FEATURED
AVO Conclusions, feedback and outlook Conclusion, tips, feedback, requests and planning of repeating break-out session (held today) Resonate with what others say, get a rebound for a missed break-out session.
Dinner

Day 2 (April, 23rd)

Start End Session Room Speaker Tag Topic Coverage Interest
8AM – 9AM: BREAKFAST
9:00 am 10:00 am Plenary UVU Room 402 Samuel M. Smith
Samuel M. Smith
ADV Future potential of the KERI world All Privacy – and DKP adepts violate the NIST SP 800-57 practise for keymanagement: Adaptive cryptoperiods. Loss of valuables, you just violated the decades-old rule of proper key management. Never ever forget to work with the lifespan of a key.
10:00 am 10:40 am Plenary UVU Room 402 Phil Feairheller
Phil Feairheller
REF Using ACDCs as authorization (EVAC; edge verifiable access control) How to use ACDCs as a truly secure access control mechanism (EVAC; edge verifiable access control) All attacks on access control nowadays are edge attacks. EVAC; edge verifiable access control is resistant to edge attacks. It’s never done before: being resistant against Recursive Privileged Escalation Attacks.
10:45AM – 11:00AM: COFFEE AND TEA BREAK
11:00 am 11:40 am Plenary UVU Room 402 Alan Davies
Alan Davies
ADV Tool for creating ACDCs for enterprises, VC issuance What they’ve implemented: a registrar or an observer using a sparse Merkle tree
11:45 am 12:30 pm Plenary UVU Room 402 FEATURED FEATURED
FEATURED FEATURED
ASE PLACEHOLDER
12:30PM – 1:30PM: LUNCH
1:30 pm 2:10 pm Break-out Digital Trust Foundry Room 430 Samuel M. Smith
Samuel M. Smith
ADV SPAC/TSP2 Usage of the working code of SPAC/TSP Red-handed coder explains…
1:30 pm 2:10 pm Break-out Platinum Room 141 Jonathan Rayback
Jonathan Rayback
REF DID:WEBS KERI bridge to the DID world, DID:SCID etc. Why DID:WEBS stands out compared to the other DID methods.
1:30 pm 2:10 pm Break-out Platinino Room 143 FEATURED FEATURED
FEATURED FEATURED
ASE ISO Path How the KERISuite gets ISO standardization, current status how and why it became aToIP standard The importance of ISO as a standards body adopting and recommending our specs
2:15 pm 3:00 pm Break-out Digital Trust Foundry Room 430 Ari Argoud
Ari Argoud
ADV KERI’s Request Authentication Mechanism Implementation of… Leading by example
2:15 pm 3:00 pm Break-out Platinum Room 141 FEATURED FEATURED
FEATURED FEATURED
REF {Organisation} pilot Blogposts introduced / pilot Everybody cares about finally fixing {Device} spam
2:15 pm 3:00 pm Break-out Platinino Room 143 FEATURED FEATURED
FEATURED FEATURED
REF Root of Trust: identity assurance State-based root-of-trust explained Many jurisdictions will follow the footsteps of Utah as a trailblazer; know how to set up and maintain a state-based root-of-trust
3:00PM – 3:15PM: COFFEE AND TEA BREAK
3:15 pm 4:00 pm Break-out Digital Trust Foundry Room 430 George McEwan
George McEwan
REF The landscape of SEDI In this session, we will explore the framework of SEDI, and the roll out plans across the State of Utah.
3:15 pm 4:00 pm Break-out Platinum Room 141 FEATURED FEATURED
FEATURED FEATURED
AVO Learnings from Stewarding the KERI Investment Ecosystem A series of investments in certain verticals and related technical implementations Pitfalls, feedback , make a foew shortcut
3:15 pm 4:00 pm Break-out Platinino Room 143 Kent Bull
Kent Bull
REF KERIA tutorial Step-by-step workshop If you’re hands-on working on KERI identifiers, you get this irresistible urge to continue
4:00 pm 4:45 pm Break-out Digital Trust Foundry Room 430 SPEAKER_FN LastN
SPEAKER_FN LastN
AVO Apache2 RUST library The RUST library that matches the KERISuite software license Why it’s crucial to have matching licenses in the end
4:00 pm 4:45 pm Break-out Platinum Room 141 Ned Smith
Ned Smith
REF Secure Asset Transfer Protocol (satp)
4:00 pm 4:45 pm Break-out Platinino Room 143 Daniel Hardman
Daniel Hardman
ADV applying KERI to general evidence problems KERI+ACDC has always supported the assembly of arbitrary pieces of evidence into a rich graph — e.g., to snapshot artifacts in a complex application, to summarize careful research, to unify credentials in a package, or to track the artifacts in a formal legal case. It even has a ready answer about how to build bridges with other evidence formats like W3C VCs, ISO mDL, docusigned PDFs, and more. However, we have lacked certain conventions about how relationships among the pieces of evidence and the people who assemble this evidence are related. The dossier spec covers issues like these and is an exciting new tool for anyone working in KERI.
5:00 pm 5:30 pm Plenary UVU Room 402 FEATURED FEATURED
FEATURED FEATURED
AVO Conclusions, feedback and outlook Conclusion, tips, feedback, recordings and follow-up Resonate with what other say, and wrapping up the conference
  • Keynote Session: Highlighted in the schedule – major presentations in the Main Auditorium
  • Break-out Sessions: Interactive, hands-on learning sessions with limited seating
  • Panels: Moderated discussions with multiple experts
  • Lightning Talks: Quick 5-minute presentations showcasing innovations

Note: Schedule is subject to change. Please check back regularly for updates.