English   Deutsch

Speaker details

Mike Small     Mike Small
Information Security Management Advisor, Fellow Analyst

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.

With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.

Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.


European Identity & Cloud Conference 2014
05/14/2014 14:30-15:30 Social & Mobile Login
Evaluating the Risks of Social Login
How to Enable Social and Mobile Login – and Beyond
05/15/2014 12:00-13:00 Software Defined Infrastructures - Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
05/15/2014 14:30-15:30 Cloud Identity
Cloud Identity & Access Management Leadership Compass
One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
05/16/2014 09:00-12:30 Negotiating the Cloud Standards and Advice Jungle
05/16/2014 13:30-16:00 Internet of Everything and Big Data: Benefits and how to Manage Risk
Cloud Provider Assurance Workshop
05/17/2013 09:00-10:30 Introduction to cloud services
05/17/2013 11:00-12:30 Cloud Provider Selection
05/17/2013 13:30-14:30 Cloud Provider Assurance
European Identity & Cloud Conference 2013
05/14/2013 09:00-13:00 EIC Warm-Up
Getting Started: How to Find your Best Path through EIC 2013
05/16/2013 10:30-11:30 Big Data Opportunities and Risk
Big Data – the Need, the Opportunities
Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level.
05/16/2013 11:30-12:30 Smart Data
Information Stewardship: What does it mean for Big Data?
Big Data – Small Privacy?
05/16/2013 16:30-17:30 Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
05/17/2013 09:00-12:30 Understanding the Role of Cloud Computing for your Business - and Selecting the Appropriate Provider
05/17/2013 13:30-16:00 Cloud Provider Assurance - Get what you Pay for
European Identity & Cloud Conference 2012
04/17/2012 09:00-13:00 OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
04/19/2012 10:30-11:30 Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
04/19/2012 14:00-15:00 Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Secure Online Identity with Cloud Identity and Privacy Services
04/19/2012 16:30-17:30 Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
Cloud Security Depends on Effective Key Management
European Identity Conference 2011
05/11/2011 14:00-15:00 Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer?
Cloud Standardization: From Open Systems to Closed Clouds?
05/11/2011 15:00-16:00 Cloud Provider Assurance Metrics
Combating Online Fraud – BT’s Managed Fraud Reduction Service
05/12/2011 10:30-11:30 Cloud Governance Primer
Finding the Right Approach to Cloud Governance
Governance as a Cloud Service – Will that Work?
05/13/2011 09:00-12:00 Information Security in the Cloud
European Identity Conference 2010
05/04/2010 09:00-13:00 Cloud Computing - Answers to 10 Security Questions you Should Ask
05/05/2010 14:00-15:00 Cloud Computing – Identity and Security Smog?
What the Identity Industry Should do to Improve Security for the Cloud
05/06/2010 10:30-11:30 Virtualization Trends and Strategies – from Hype to Reality
Identity Issues of Virtualization
European Identity Conference 2009
05/06/2009 08:30-09:00 Risk, Reward and Compliance in Challenging Times
05/06/2009 15:00-16:00 Lessons that GRC and IAM could learn from ITIL - and where ITIL helps in defining IAM
Is the IAM Focus of Today’s GRC Platforms Sufficient?
2nd European Identity Conference
04/23/2008 16:30-17:30 Vendor Panel: Picking the Right Federation Software
04/23/2008 18:00-18:30 Security, Privacy and Trust – Mission Impossible?
04/24/2008 16:30-17:30 Application Security Infrastructures
Security by Design – Externalizing Authentication and Authorization


European Identity & Cloud Conference 2014
IAM Infrastructure Trends & Concepts MORE 
Mobile Security MORE 
Secure Cloud MORE 
European Identity & Cloud Conference 2013
Cloud Governance MORE 
Cloud Provider Assurance Workshop MORE 
Managing Identities and Access to Information for Cloud, Mobile and Social Computing MORE 
European Identity & Cloud Conference 2012
Cloud Identity & Access MORE 
Cloud Security MORE 
Cloud Security MORE 
European Identity Conference 2011
Cloud Security MORE 
Cloud Standards Adoption MORE 
Directories & Federation MORE 
European Identity Conference 2010
Cloud Computing: Compliance & Security MORE 
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
KuppingerCole Analyst Services
In the networked economy of the 21st century, digital identities play a key role in establishing trust, achieving security, lowering costs and making business processes more efficient. Things like Identity and Access Management (IAM) or...
KuppingerCole Vendor Services
The market for Identity and Access Management (IAM), governance, risk management, and compliance (GRC) and cloud computing is expanding by leaps and bounds. In fact, no other segment of the IT market can boast such dynamic growth rates. At the...
KuppingerCole Briefings
KuppingerCole welcomes the opportunity to hear from IT companies when they launch a new product or service or have other interesting progress to announce. Please fill in the request form , and we will contact you shortly. 
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole