Convergence of Digital Identity, Secure Payments, and Emerging Technologies
Executive Summary
The 2026 Identity & Payments Summit represents a pivotal moment in the evolution of digital commerce and secure authentication. Hosted by the Secure Technology Alliance, this three-day conference brings together industry leaders from technology giants, financial institutions, and security providers to address the most pressing challenges facing the digital identity and payments ecosystem.
This case study examines the summit’s comprehensive agenda, exploring how the convergence of artificial intelligence, quantum computing, mobile credentials, and biometric authentication is reshaping the landscape of trust, security, and commerce in the digital age.
Background and Context
The Challenge
The digital economy faces an unprecedented convergence of opportunities and threats. As transactions increasingly move online and authentication becomes more complex, organizations must navigate a rapidly evolving landscape characterized by:
Advanced persistent threats including AI-powered deepfakes that bypass traditional security measures and undermine human trust. These sophisticated attacks can impersonate executives, manipulate hiring processes, and compromise identity verification systems.
Regulatory complexity across jurisdictions, particularly with European Union digital identification requirements that have implications for global operations. Organizations must balance compliance with user experience while maintaining security standards.
The quantum computing threat to current cryptographic systems, which will render many existing security protocols obsolete. Organizations need to prepare for post-quantum transitions while managing existing cryptographic sprawl.
The need to reduce friction in authentication while simultaneously strengthening security, a paradox that requires innovative solutions balancing user experience with robust identity assurance.
Event Overview
| Event | 2026 Identity & Payments Summit |
| Host | Secure Technology Alliance |
| Dates | March 2-4, 2026 |
| Location | Westin Galleria, Houston, Texas |
| Key Speakers | Representatives from Google, Airbnb, Giesecke+Devrient, Bank of America, HID, Verifone, and other industry leaders |
Meeting Structure and Agenda
The summit is structured across three days, each with distinct focus areas that build upon one another to create a comprehensive understanding of the identity and payments ecosystem.
Day One: Foundation and Ecosystem Collaboration (March 2)
The opening day serves as a pre-conference foundation, featuring two parallel streams designed to establish baseline understanding and foster cross-industry collaboration.
Mobile Driver’s License Technology Showcase
This hands-on showcase demonstrates the practical implementation of mobile driver’s licenses across various use cases. Participants engage directly with mDL technology through live demonstrations including online bank onboarding, point-of-sale age verification, TSA identity verification, and reusable identity verification for remote proofing. The showcase brings together the entire value chain: manufacturers who develop the technology, issuers who distribute credentials, and relying parties who accept them. This comprehensive approach ensures all stakeholders understand both the technical capabilities and real-world applications of mDL technology.
U.S. Payments Forum Spring Member Meeting
Running concurrently, this member meeting addresses critical payment infrastructure topics. Sessions cover token lifecycle management, examining how payment tokens are generated, distributed, updated, and retired securely. The forum explores agentic commerce, where artificial intelligence agents make purchasing decisions on behalf of users, creating new security and authentication challenges. Members also receive practical guidance on implementing digital identity credentials within payment systems. The day concludes with Merchant and Issuer Special Interest Group meetings and Working Committee breakout sessions, facilitating deep collaboration among key stakeholders.
Day Two: Core Challenges and Solution Frameworks (March 3)
Day two marks the official summit opening with a keynote address followed by three specialized tracks that run throughout the day.
Opening Keynote: Building Trust with Strangers
Michael Schweiger, Chief Compliance Officer for Payments in the European Economic Area at Airbnb, delivers the opening keynote. His presentation examines identity’s crucial role in creating safe payment ecosystems, particularly within the peer-to-peer economy. Drawing from Airbnb’s extensive experience implementing digital identification systems across multiple European jurisdictions, Schweiger shares lessons learned and provides insights into regulatory compliance challenges. His perspective bridges the gap between European regulatory requirements and American market conditions, offering valuable guidance for organizations preparing for similar requirements in the United States.
Identity & Access Track
Sponsored by Socure, this track focuses on authentication and access control challenges. Sessions explore privacy-by-design strategies essential for accelerating mDL adoption, ensuring that user privacy protections are built into systems from inception rather than added retrospectively. The track confronts the deepfake threat head-on, examining how sophisticated AI-generated content bypasses human trust and what layered defense strategies can effectively counter these attacks. Biometric identity verification receives detailed attention, with discussions on how to mitigate enterprise identity fraud while maintaining user experience. A key theme throughout is strengthening identity assurance while simultaneously reducing friction, addressing the fundamental tension between security and usability.
Payments Track
Sponsored by Discover Network, the payments track examines next-generation transaction technologies. Biometrics-initiated transactions represent a significant evolution in payment methods, and sessions explore what infrastructure, standards, and partnerships are necessary to scale this technology effectively. EMVCo’s work on advancing digital identity and payments receives detailed examination, including the role of passkeys and digital credentials in creating more secure payment experiences. Agentic commerce emerges as a critical topic, with panels discussing merchant, issuer, processor, and network perspectives on AI agents making autonomous purchase decisions. The track concludes with discussions on identity-centric security as the new foundation for next-generation payments risk management.
Emerging & Converging Technology Track
Sponsored by Bank of America, this track addresses cutting-edge technological developments. Sessions examine modern authentication methods that eliminate friction while maintaining security, exploring how organizations can implement passwordless authentication at scale. The convergence of mobile technology, artificial intelligence, and authentication creates new opportunities and challenges that require careful navigation. Quantum key distribution and post-quantum cryptography receive significant attention, with discussions on how to prepare for quantum computing threats through unhackable-by-design cryptography concepts. Managing cryptographic sprawl becomes essential as organizations prepare for post-quantum transitions while maintaining current security protocols.
Day Three: Future Directions and Implementation (March 4)
The summit concludes with forward-looking sessions that translate insights into actionable strategies.
Identity & Access Track – Advanced Topics
Final day sessions provide concrete data on the mDL ecosystem’s current state, examining adoption trends, user behavior patterns, and strategies to accelerate deployment. The track explores how digital identity can modernize transit benefits, improving equitable mobility for underserved communities. Building a global trust network for digital identity becomes a central theme, with discussions on cross-border interoperability and the standards necessary to enable seamless international identity verification. The track concludes by reimagining professional identity in the AI era, addressing how to establish authenticity, uniqueness, and credibility when artificial intelligence can generate convincing personas.
Payments Track – Innovation and Risk
Sessions examine secure tap-free payments and new ultra-wideband opportunities for transit and commerce, exploring how spatial awareness technology can enable more secure and convenient payment experiences. Concierge payments emerge as a differentiator in fintech, with discussions on how human-centered service can compete in an increasingly automated landscape. Payments automation receives balanced treatment, examining where it delivers genuine value and where it may introduce new risks. The intersection of transit systems with payments and identity provides a concrete use case for exploring how these technologies converge in public infrastructure.
Emerging & Converging Technology Track – Trust in the AI Era
Final sessions address trust frameworks for the AI age. The evolution from Know Your Customer to Know Your Agent examines how to build trust when artificial intelligence agents conduct commerce on behalf of humans. Deepfakes in hiring and AI-enabled insider threats receive attention, exploring how organizations can verify human identity in recruitment and prevent malicious AI from compromising security. A new framework for distinguishing humans from AI through behavioral dynamics offers practical approaches to maintaining human agency in automated systems. The track concludes with comprehensive trust frameworks for resilient identity-payments ecosystems in the generative AI era, synthesizing all themes into actionable guidance.
Strategic Outlook and Future Directions
The summit agenda reveals several critical trends shaping the future of digital identity and payments.
Convergence of Identity and Payments
Identity and payments are no longer separate domains but intrinsically linked components of a unified trust infrastructure. Every payment is fundamentally an identity assertion, and every identity verification has payment implications. This convergence requires organizations to adopt holistic strategies that address both domains simultaneously. The summit’s structure reflects this reality, with sessions frequently bridging both topics and emphasizing their interdependence.
Artificial Intelligence as Both Threat and Solution
AI emerges as a central theme throughout the summit, but with nuanced treatment that recognizes both its risks and potential benefits. Deepfake technology threatens fundamental trust mechanisms, enabling sophisticated impersonation attacks that bypass traditional security controls. However, AI also provides powerful tools for fraud detection, behavioral analysis, and anomaly detection. Organizations must develop dual strategies that defend against AI-powered attacks while leveraging AI capabilities for enhanced security. The summit provides frameworks for navigating this duality, helping organizations identify where AI strengthens security and where it introduces new vulnerabilities.
Quantum Computing Imperative
The quantum computing threat to current cryptographic systems creates an urgent need for action. Organizations cannot wait until quantum computers are widely available before beginning post-quantum transitions. The summit emphasizes practical approaches to managing cryptographic sprawl while implementing quantum-resistant algorithms. This includes inventory of current cryptographic systems, prioritization of critical assets, and phased migration strategies that maintain security during the transition period. Early preparation is essential, as the transition to post-quantum cryptography will take years and require coordination across entire ecosystems.
Privacy and Security Balance
Privacy-by-design principles receive consistent emphasis throughout the summit. As identity verification becomes more pervasive, protecting user privacy becomes increasingly critical. Mobile driver’s licenses and other digital credentials offer opportunities to implement selective disclosure, where users share only the minimum information necessary for a given transaction. This approach strengthens both privacy and security, reducing the attack surface by limiting data exposure. Organizations must embed privacy protections into systems from inception, rather than treating privacy as a compliance checkbox or afterthought.
Global Interoperability Challenges
Cross-border digital identity and payments require coordinated standards and trust frameworks. The summit addresses these challenges through examination of European regulatory experiences and discussions of global trust networks. Building interoperable systems requires technical standards, legal frameworks, and governance structures that enable identity credentials issued in one jurisdiction to be verified and accepted in another. This work is essential for enabling seamless global commerce while maintaining security and privacy protections appropriate to each jurisdiction.
Solutions and Innovations Presented
The summit showcases multiple solution frameworks and innovative approaches to address the challenges facing the industry.
Mobile Driver’s License Technology
Mobile driver’s licenses represent a significant advancement in digital identity, offering secure, privacy-preserving, and user-controlled credentials. Unlike traditional physical credentials, mDLs enable selective disclosure, allowing users to prove specific attributes without revealing unnecessary information. For example, a user can prove they are over 21 for age verification without disclosing their exact date of birth or address. The technology leverages secure element hardware in mobile devices, cryptographic protocols, and standardized data formats to create credentials that are difficult to counterfeit and easy to verify. The summit’s technology showcase provides hands-on experience with real-world implementations, demonstrating how mDLs work across diverse use cases from TSA checkpoints to online banking.
Layered Defense Against Deepfakes
Combating deepfakes requires multiple defensive layers rather than reliance on any single technology. Solutions presented include liveness detection during biometric capture, analyzing micro-movements and behavioral patterns that are difficult for AI to replicate perfectly. Digital watermarking and provenance tracking help establish the authenticity of media content, creating verifiable chains of custody. Multi-factor authentication combining biometrics with other factors reduces reliance on any single verification method that could be spoofed. Behavioral analysis examines patterns across multiple interactions, identifying inconsistencies that suggest manipulation. Organizations must implement these defenses in combination, creating resilient systems that remain effective even as deepfake technology advances.
Biometrics-Initiated Transactions
Next-generation payment systems leverage biometric authentication as the primary transaction initiator, eliminating the need for cards, passwords, or other traditional payment instruments. These systems authenticate users through fingerprint, facial recognition, or other biometric modalities, then initiate payments directly from linked accounts. Scaling these systems requires standardized protocols, robust security frameworks, and ecosystem collaboration among device manufacturers, financial institutions, and merchants. The summit explores practical approaches to deployment, including how to handle biometric authentication failures, manage revocation of compromised biometric data, and ensure accessibility for users who cannot provide standard biometric inputs.
Quantum-Resistant Cryptography
Post-quantum cryptographic algorithms provide protection against quantum computing attacks. These algorithms rely on mathematical problems that remain difficult even for quantum computers, such as lattice-based cryptography, hash-based signatures, and code-based encryption. The summit presents practical implementation strategies, including hybrid approaches that combine classical and post-quantum algorithms during the transition period. Organizations learn how to prioritize cryptographic upgrades, focusing first on long-lived data and high-value assets. Implementation guidance covers performance considerations, key management, and interoperability challenges that arise when deploying new cryptographic algorithms across complex systems.
Agentic Commerce Frameworks
As AI agents increasingly make purchasing decisions on behalf of users, new frameworks for trust and accountability become essential. Solutions address how to authenticate agents, verify their authority to act, and audit their decisions. Token-based authorization systems enable granular control over agent capabilities, limiting what purchases they can make and under what conditions. Audit trails provide visibility into agent behavior, enabling users and organizations to review decisions and identify anomalies. Liability frameworks establish clear accountability when agents make incorrect or unauthorized purchases. The summit explores these challenges from merchant, issuer, processor, and network perspectives, recognizing that effective solutions require ecosystem-wide collaboration.
Behavioral Dynamics for Human Verification
Distinguishing humans from AI requires analysis of behavioral patterns rather than reliance on challenge-response tests that AI can increasingly pass. Behavioral dynamics examine subtle patterns in how users interact with systems, including typing rhythms, mouse movements, navigation patterns, and timing variations that reflect human cognitive processes. These patterns are difficult for AI to replicate perfectly because they reflect unconscious human behaviors developed over years of interaction with digital systems. Organizations can implement behavioral analysis as a continuous authentication mechanism, monitoring for anomalies that suggest automated rather than human interaction. This approach provides security without adding friction to user experience.
Expected Impact and Outcomes
The summit is positioned to deliver significant impact across multiple dimensions of the digital identity and payments ecosystem.
Accelerated Technology Adoption
By bringing together manufacturers, issuers, relying parties, and other stakeholders, the summit accelerates the adoption of emerging technologies. The mobile driver’s license showcase provides hands-on experience that demystifies the technology and demonstrates practical applications. Collaboration sessions enable stakeholders to address interoperability challenges, align on standards, and coordinate deployment strategies. This collaborative approach reduces adoption barriers and accelerates the timeline for widespread implementation.
Enhanced Security Posture
Organizations attending the summit gain concrete guidance on strengthening security against emerging threats. Sessions on deepfake defense, quantum-resistant cryptography, and behavioral analysis provide practical tools for improving security posture. The emphasis on layered defense strategies helps organizations build resilient systems that remain effective as threats evolve. By sharing threat intelligence and defensive strategies across the ecosystem, the summit strengthens collective security.
Improved User Experience
A central theme throughout the summit is reducing friction while maintaining security. Solutions presented demonstrate how to eliminate passwords through biometric authentication, streamline verification through selective disclosure, and enable faster transactions through tap-free payments. These improvements enhance user experience while maintaining or improving security, addressing the false dichotomy between security and convenience.
Regulatory Preparedness
The keynote address and regulatory-focused sessions help organizations prepare for evolving compliance requirements. By learning from European implementation experiences, U.S. organizations can anticipate regulatory directions and prepare accordingly. This proactive approach reduces compliance costs and enables organizations to view regulatory requirements as opportunities for competitive differentiation rather than burdens.
Cross-Industry Collaboration
The summit facilitates collaboration among organizations that don’t typically interact. Financial institutions, technology companies, government agencies, and service providers come together to address shared challenges. This cross-pollination of ideas and expertise leads to innovative solutions that no single organization could develop in isolation. Working groups and breakout sessions provide structured forums for ongoing collaboration beyond the summit itself.
Standardization Progress
Many sessions address standardization efforts, including EMVCo’s work on digital identity and payments, mDL interoperability standards, and post-quantum cryptography protocols. The summit provides a forum for stakeholders to align on standards, resolve ambiguities, and coordinate implementation. This standardization work is essential for achieving interoperability and enabling ecosystem-wide deployment of new technologies.
Key Takeaways for Organizations
Organizations attending the summit or reviewing its outcomes should focus on several critical action items.
Begin Post-Quantum Preparation Now
The quantum computing threat is not a distant future concern but a present-day imperative. Organizations must inventory their cryptographic systems, identify vulnerable assets, and begin planning migration to quantum-resistant algorithms. This preparation includes testing post-quantum algorithms, evaluating performance impacts, and developing phased migration strategies. Starting now ensures organizations complete transitions before quantum computers become capable of breaking current cryptography.
Implement Layered Deepfake Defenses
Single-point deepfake detection is insufficient. Organizations need multiple defensive layers including liveness detection, behavioral analysis, digital watermarking, and multi-factor authentication. These defenses should work in concert, with failures in one layer triggering additional verification through other layers. Regular testing and updates are essential as deepfake technology continues advancing.
Adopt Privacy-by-Design Principles
Privacy protections must be embedded into systems from inception. This includes implementing selective disclosure capabilities, minimizing data collection, providing user control over information sharing, and ensuring transparent data handling. Organizations that build privacy protections into foundational architecture gain competitive advantages while reducing compliance risks.
Prepare for Agentic Commerce
AI agents will increasingly conduct commerce on behalf of users. Organizations must develop frameworks for authenticating agents, verifying their authority, auditing their decisions, and establishing liability. This preparation includes technical infrastructure for agent authentication, business processes for handling agent-initiated transactions, and legal frameworks for accountability. Early adoption provides competitive advantages as agentic commerce grows.
Invest in Digital Identity Infrastructure
Mobile driver’s licenses and other digital credentials represent the future of identity verification. Organizations should invest in infrastructure to accept digital credentials, train staff on verification procedures, and integrate digital identity into existing workflows. Early adoption enables organizations to influence standards development and gain experience before widespread deployment makes digital identity mandatory.
Build Cross-Functional Teams
The convergence of identity, payments, and emerging technologies requires collaboration across traditionally separate organizational functions. Security teams, payment operations, legal departments, and customer experience groups must work together to develop holistic strategies. Organizations should establish cross-functional teams empowered to make decisions spanning multiple domains, ensuring coordinated approaches to complex challenges.
Conclusion
The 2026 Identity & Payments Summit addresses the most critical challenges facing digital commerce and secure authentication. By bringing together diverse stakeholders from across the ecosystem, the summit facilitates the collaboration necessary to develop comprehensive solutions to complex, interconnected problems.
The convergence of artificial intelligence, quantum computing, mobile credentials, and biometric authentication creates both unprecedented threats and remarkable opportunities. Organizations that proactively address these challenges will be positioned to thrive in an increasingly digital economy, while those that delay risk being left behind by rapidly evolving technology and regulations.
The summit’s comprehensive agenda demonstrates that effective solutions require technical innovation, regulatory alignment, privacy protections, and user experience optimization simultaneously. No single organization can address these challenges in isolation; ecosystem-wide collaboration is essential.
As digital identity and payments become increasingly intertwined with every aspect of commerce and daily life, the stakes continue rising. The frameworks, solutions, and collaborations developed through events like this summit will shape the digital economy for years to come, determining how effectively we balance security, privacy, convenience, and innovation in an age of rapid technological change.
Organizations are encouraged to engage with the Secure Technology Alliance, participate in working groups, and contribute to standards development efforts. The future of digital trust will be built through collective action, and every stakeholder has a role to play in creating secure, privacy-preserving, and user-friendly systems that enable the digital economy to flourish.
About the Secure Technology Alliance
The Secure Technology Alliance is the digital security industry’s premier association. Through its U.S. Payments Forum, Identity and Access Forum, and collaborative working groups, the Alliance fosters open dialogue among industry stakeholders to explore and develop secure technology innovations in the payments, identity, and access markets.
By collaborating on education and guidance, the Alliance helps enable efficient, timely, and effective implementation of large-scale, disruptive technologies.
For More Information:
Summit Website: https://www.stasummit.com
Training Information: https://www.stasummit.com/on-site-training/
Follow on LinkedIn: Secure Technology Alliance
Event Hashtag: #IdentityPaymentsSummitDocument prep