European Identity & Cloud Conference 2012 Key Topics

  • Making Information Security a Strategic Priority

  • Planning, Managing & Governing IAM & Cloud

  • How to Efficiently Protect Critical Infrastructures

  • Service Focused IT in the Age of Cloud Computing

  • Cloud Governance

  • How to Audit Cloud Services

  • How to Select the Best Cloud Provider

  • (Cloud) Access Governance Strategies

  • What to Focus on for Future-Proof Identity & Access Management  

  • Evaluating and Reducing the Risks of Cyber Crime

  • Mobile Privacy and Security

  • Cloud Computing Contracts & Law

  • Data Protection and Privacy: How to Prepare for the New European Privacy Legislation  

  • How to Run a Compliant Cloud Business

  • Future Growth Opportunities in Telco, Technology and Media

  • Personal Data  Storage

  • Device Security & BYOD (Bring your own device)

  • Enable onboarding of partners and customer interaction through federation

  • Compliance Access Management, Governance, and Intelligence

  • Manage secure access of all to everything – employees, partners, and customers – for on-premise and the cloud

Quick Links

Key Topics

  • Making Information Security a Strategic Priority

  • Planning, Managing & Governing IAM & Cloud

  • How to Efficiently Protect Critical Infrastructures

  • Service-focused IT in the Age of Cloud Computing

  • Cloud Provider Assessment, Governance and Audit

  • Evaluating and Reducing the Risks of Cyber Crime

  • Mobile Privacy and Security

  • Cloud Computing Contracts & Law

  • Data Protection and Privacy

News

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00