English   Deutsch   Русский   中文    

Speaker details

Mike Small     Mike Small
Information Security Management Advisor, Fellow Analyst
KuppingerCole

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.

With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.

Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.

Sessions

Managing Risk and Reward from Cloud, and the Internet of Everything and Everyone
01/29/2015 09:30-12:30 Part 1 – Managing Risk and Reward in the Cloud
More 
01/29/2015 13:30-16:30 Part 2 - Managing Risk and Reward in the Internet of Everything and Everyone
More 
01/29/2015 16:30-17:00 Final interactive discussion and wrap up
More 
European Identity & Cloud Conference 2014
05/14/2014 14:30-15:30 Social & Mobile Login
Evaluating the Risks of Social Login
How to Enable Social and Mobile Login – and Beyond
More 
05/15/2014 12:00-13:00 Software Defined Infrastructures - Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
More 
05/15/2014 14:30-15:30 Cloud Identity
Cloud Identity & Access Management: Defining the Market
One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
More 
05/15/2014 15:30-16:30 Cloud Encryption
Searching over Encrypted Data in Cloud Database as a Service Environments
Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
More 
05/16/2014 09:00-12:30 Negotiating the Cloud Standards and Advice Jungle
More 
05/16/2014 13:30-16:00 Internet of Everything and Big Data: Benefits and how to Manage Risk
More 
Cloud Provider Assurance Workshop
05/17/2013 09:00-10:30 Introduction to cloud services
More 
05/17/2013 11:00-12:30 Cloud Provider Selection
More 
05/17/2013 13:30-14:30 Cloud Provider Assurance
More 
European Identity & Cloud Conference 2013
05/14/2013 09:00-13:00 EIC Warm-Up
Getting Started: How to Find your Best Path through EIC 2013
More 
05/16/2013 10:30-11:30 Big Data Opportunities and Risk
Big Data – the Need, the Opportunities
Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level.
More 
05/16/2013 11:30-12:30 Smart Data
Information Stewardship: What does it mean for Big Data?
Big Data – Small Privacy?
More 
05/16/2013 16:30-17:30 Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
More 
05/17/2013 09:00-12:30 Understanding the Role of Cloud Computing for your Business - and Selecting the Appropriate Provider
More 
05/17/2013 13:30-16:00 Cloud Provider Assurance - Get what you Pay for
More 
European Identity & Cloud Conference 2012
04/17/2012 09:00-13:00 OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
More 
04/19/2012 10:30-11:30 Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
More 
04/19/2012 14:00-15:00 Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Secure Online Identity with Cloud Identity and Privacy Services
More 
04/19/2012 16:30-17:30 Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
Cloud Security Depends on Effective Key Management
More 
European Identity Conference 2011
05/11/2011 14:00-15:00 Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer?
Cloud Standardization: From Open Systems to Closed Clouds?
More 
05/11/2011 15:00-16:00 Cloud Provider Assurance Metrics
Combating Online Fraud – BT’s Managed Fraud Reduction Service
More 
05/12/2011 10:30-11:30 Cloud Governance Primer
Finding the Right Approach to Cloud Governance
Governance as a Cloud Service – Will that Work?
More 
05/13/2011 09:00-12:00 Information Security in the Cloud
More 
European Identity Conference 2010
05/04/2010 09:00-13:00 Cloud Computing - Answers to 10 Security Questions you Should Ask
More 
05/05/2010 14:00-15:00 Cloud Computing – Identity and Security Smog?
What the Identity Industry Should do to Improve Security for the Cloud
More 
05/06/2010 10:30-11:30 Virtualization Trends and Strategies – from Hype to Reality
Identity Issues of Virtualization
More 
European Identity Conference 2009
05/06/2009 08:30-09:00 Risk, Reward and Compliance in Challenging Times
More 
05/06/2009 15:00-16:00 Lessons that GRC and IAM could learn from ITIL - and where ITIL helps in defining IAM
Is the IAM Focus of Today’s GRC Platforms Sufficient?
More 
2nd European Identity Conference
04/23/2008 16:30-17:30 Vendor Panel: Picking the Right Federation Software
More 
04/23/2008 18:00-18:30 Security, Privacy and Trust – Mission Impossible?
More 
04/24/2008 16:30-17:30 Application Security Infrastructures
Security by Design – Externalizing Authentication and Authorization
More 

Moderation

European Identity & Cloud Conference 2014
IAM Infrastructure Trends & Concepts More 
Mobile Security More 
Secure Cloud More 
European Identity & Cloud Conference 2013
Cloud Governance More 
Cloud Provider Assurance Workshop More 
Managing Identities and Access to Information for Cloud, Mobile and Social Computing More 
European Identity & Cloud Conference 2012
Cloud Identity & Access More 
Cloud Security More 
Cloud Security More 
European Identity Conference 2011
Cloud Security More 
Cloud Standards Adoption More 
Directories & Federation More 
European Identity Conference 2010
Cloud Computing: Compliance & Security More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Connected Enterprise
The digitalization of businesses has created an imperative for change that cannot be resisted. IT has to support fundamental organizational change. IT must become a business enabler, rather than obstructing change. The new ABC is simple: Agile Businesses – Connected to their customers, partners and associates.
Business Agility and Information Security for your Extended Enterprise
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole