Speaker details

Shlomi Dinoor VP Emerging Technologies

Cyber-Ark Software

Shlomi Dinoor serves as VP Emerging Technologies at Cyber-Ark, tasked to research, identify and propose future growth engines based on innovative technologies all with the goal of expanding company's long term offering. Shlomi spearheads Cyber-Ark Labs, Cyber-Ark's innovation center, with mission to design ways to introduce novel solutions to new high value markets and enhance Cyber-Ark's market leadership.

Shlomi brings over 12 years of experience delivering enterprise software solutions to market. Before joining Cyber-Ark, he was Director of Engineering at Verdasys, the leading provider of Enterprise Information Protection solutions, where he worked on strategic initiatives.

Prior to Verdasys Shlomi was Director of Development at CA Inc (NASDAQ: CA). While effectively managing a global team of professional software engineers, he directed strategy, product development, and program management for CA Identity Manager, one of CA's top selling products. Shlomi joined CA through the acquisition of Netegrity, a leader in Identity and Access Management, where he led all development activities and product release for Netegrity's IdentityMinder integrated product. Shlomi has also held senior R&D positions at Business Layers (acquired by Netegrity).

Shlomi holds an MBA from the University Of Massachusetts and a B.Sc. in Engineering (cum laude) from Technion, Israel Institute of Technology.

 Sessions

Date Title

European Identity Conference 2010

May 05, 2010
16:30‑17:30
Panel: Managing Privileged Identities in the Cloud
Session Details
May 06, 2010
15:00‑16:00
Panel: Business/Cloud portability
Session Details

Information

Congress

European Identity Conference 2010

Language:
English
Registration fee:
€1980.00 $2376.00 S$3168.00
Mastercard Visa PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 04 - 07, 2010 Munich

Key Topics

  • Business / IT Alignment

  • Rising Maturity: Expansion & Replacement Best Practices

  • Extending Identity based Information Security into the Cloud

  • Solving the Identity Issues of Virtualization

  • Safely Managing Privileged Identities

  • Controlling access and ensuring information and system security

  • Role Based & Attribute Based Access Control

  • Privacy & Regulation

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00