European Identity & Cloud Conference 2015 Agenda

Switch to Detailed View

Please note that presentations and other event materials are only available to registered participants.
You need to log in to be able to download them.

Monday, May 04, 2015
14:00-18:00 Complimentary Seminar
FIDO Alliance Update
Alexei Czeskis, Software Engineer, Google
Dr. Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs
Donal O'Shea, FIDO Alliance
Tuesday, May 05, 2015
08:00-18:00 Check-in & Registration
Room: COUNTER EXPO AREA
09:00-13:00
Forum Systems Workshop: API Security

 

The Foundations of API Security and API Gateway Technology

 

Alexei Balaganski, KuppingerCole
Dr. Dirk Krafzig, SOAPARK
Jason Macy, Forum Systems
Mamoon Yunus, Forum Systems

 

 

OpenID Foundation Workshop

 

Early Insight on Latest Innovations in Online Identity Standards

 

John Bradley, OpenID Foundation, Kantara
Jörg Connotte, Deutsche Telekom AG
Pamela Dingle, Ping Identity
Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Eve Maler, ForgeRock
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation

 

 

Kantara Workshop

 

Access Management 2.0 - Consent, Context, and User Engagement

 

Victor Ake, ForgeRock
Andre Boysen, DIACC / SecureKey Technologies
Joni Brennan, Kantara Initiative
Ingo Friese, Deutsche Telekom AG
Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Ian Glazer, Salesforce
Mark Lizar, SmartSpecies
Dr. Maciej Machulak, Cloud Identity Limited
Eve Maler, ForgeRock
Andrea Servida, European Commission
Michelle Waugh, CA Technologies
Robin Wilton, Internet Society

 

 

Balabit Workshop: Contextual Security Intelligence

 

Getting Smart With Security in the Age of Digital: Moving from Control to Monitoring

 

Csaba Krasznay, PhD in Cybersecurity, Balabit
Martin Grauel, Balabit
Peter Gyongyosi, One Identity
Martin Kuppinger, KuppingerCole

 

 

 
Room: AMMERSEE I
Room: CHIEMSEE
Room: ALPSEE
Room: AMMERSEE II
13:00-14:00 Lunch & Networking
Room: EXPO AREA
14:00-14:40 Identity, Access, Security: The Fundaments for Digital Risk Mitigation in the Age of Transformation
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
14:40-15:00 Moving the Security Perimeter: What Needs to be Done Before the Internet Firewalls are Removed?
Dr. Ravindar Bindra, Head IT Security Architecture, Engineering and Design, Pharmaceutical Company
Room: AUDITORIUM
15:00-15:20 Digital Transformation: New Dimensions of Risk and Risk Mitigation
Dr. Scott David, LL.M., Fellow Analyst, KuppingerCole
Room: AUDITORIUM
15:20-15:40 Digital Risk & the Analog World
Hanns Proenen, Chief Information Security Officer Europe, GE Europe
Room: AUDITORIUM
15:40-16:00 Boosting Trust in the Digital Market: the Role of eIDAS Regulation
Andrea Servida, Head of the Unit "eGovernment and Trust", European Commission
Room: AUDITORIUM
16:00-17:00 Coffee & Networking
Room: EXPO AREA
17:00-17:20 How to Manage Authorizations in Cloud Services: Getting a Grip on Both Microsoft Azure and Amazon AWS
Patrick Parker, Founder and CEO, EmpowerID
Room: AUDITORIUM
17:20-17:40 The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value
Jackson Shaw, Senior Director of Product Management, One Identity
Room: AUDITORIUM
17:40-18:00 Identity Services 2020
Kim Cameron, Chief Architect of Identity, Microsoft
Room: AUDITORIUM
18:00-18:20 User-Managed Identity and Access for the Digitally Transformative Enterprise
Eve Maler, VP Innovation & Emerging Technology, ForgeRock
Room: AUDITORIUM
18:20-18:40 Stop Treating your Customers like your Employees
Ian Glazer, VP, Identity Product Management, Salesforce
Room: AUDITORIUM
18:40-19:00 I Am a Black Swan
Howard Mannella, Managing Principal, Alternative Resiliency Services Corp
Room: AUDITORIUM
19:00-19:20 The Good, the Bad and the Ugly of IAM: An Enterprise View
Nick Tuffs, Principal Delivery Manager, Vodafone
Room: AUDITORIUM
19:30-21:00 Snacks, Drinks & Networking / Evening Reception
Room: EXPO AREA
Wednesday, May 06, 2015
08:00-18:00 Check-in & Registration
Room: COUNTER EXPO AREA
08:30-08:50 Cryptography for the People
Dr. Jan Camenisch, Scientist, IBM Research
Room: AUDITORIUM
08:50-09:10 A smarter, More Secure Internet of Things?
David Mount, Solutions Consulting Director, NetIQ
Room: AUDITORIUM
09:10-09:30 Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems
Yariv Lenchner, Senior Product Manager, Operational Technologies, Cyber-Ark Software
Room: AUDITORIUM
09:30-09:50 Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM
Louis-Marie Fouchard, IAM Products Director, Atos Cybersecurity
Room: AUDITORIUM
09:50-10:10 The EU Draft General Data Protection Regulation: Where are we and what can we expect?
Kuan Hon, Research Consultant, Queen Mary University of London
Dr. Karsten Kinast, Fellow Analyst, KuppingerCole
Room: AUDITORIUM
10:00-11:00 Coffee & Networking
The New Risk Landscape: IT, Operational Technology and IoT
Moderator:
Dr. Scott David, LL.M., KuppingerCole
Dr. Karsten Kinast, KuppingerCole
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
Mario Hoffmann, Fraunhofer AISEC
Room: AUDITORIUM
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
11:00-12:00
Mapping the Changes in Data and Identity Risk Landscapes

 

From Security to Information Security to Digital Risk

 

Hanns Proenen, GE Europe

 

 

Mapping the Changes in Data and Identity Risk Landscapes - From Physical Security to Information Security to Digital Security to Interaction Security

 

Dr. Scott David, LL.M., KuppingerCole
Dr. Karsten Kinast, KuppingerCole

 

 

Security for the Digital Business

 

What are the Requirements for your Future IAM to Enable Digital Security?

 

Martin Kuppinger, KuppingerCole

 

 

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom

 

Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint

 

 


The Role of IAM in Hack Prevention

 

Patrick Parker, EmpowerID
Matthias Reinwarth, KuppingerCole

 

 

Cloud Identity & Security

 

Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact

 

Amar Singh, KuppingerCole
Mike Small, KuppingerCole

 

 

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?

 

Marc Bütikofer, Ergon Informatik AG
Ralf Knöringer, Atos
Robert Levine, Aurionpro
James Litton, Identity Automation
Max Waldherr, Dell Software

 

User Empowerment - The Building Blocks

 

Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols

 

Mario Hoffmann, Fraunhofer AISEC

 

Extending the Power of Consent with User-Managed Access and OpenUMA

 

Eve Maler, ForgeRock

 

 


Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise

 

Robert Lapes, Capgemini

 

 

12:00-13:00
Preconceptions of Risk

 

Flushing Away Preconceptions of Risk

 

Thom Langford, Sapient

 

 

Negotiating the Risk of Privacy - Understanding Privacy and its Risks

 

Prof. Dr. Rüdiger Grimm, University Koblenz-Landau, Faculty of Informatics

 

 

IRM & the Business Side

 

No Person is an Island: How Relationships Make the IT World More Manageable

 

Ian Glazer, Salesforce

 

 

The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization

 

Troy Moreland, Identity Automation
Matthias Reinwarth, KuppingerCole
Jackson Shaw, One Identity
Markus Weber, ForgeRock
Rudolf Wildgruber, Atos IT Solutions and Services GmbH

 

Next Generation (Mobile) Cloud

 

Enterprise Mobility Management: Best Practices & Lessons Learned

 

Pavlos Makridakis, Aurionpro Solutions plc
Christian Patrascu, Oracle Corp.
Dominic Schmidt-Rieche, AirWatch by VMware

 

What’s Next in Cloud IAM – Moving Beyond Single Sign-On

 

Pamela Dingle, Ping Identity
Dr. Martin Kuhlmann, Omada
Daniel Raskin, ForgeRock
Richard Walters, Intermedia

 

Internet Scale Encryption, Authentication, Authorization

 

Idemix: Secure, Attribute-Based Authentication

 

Dr. Jan Camenisch, IBM Research

 

 

uProve: The Pricipal of Minimal Disclosure at Work

 

Ronny Bjones, Microsoft

 


Qiy Scheme: Trusted Exchange of Personal Information

 

Marcel van Galen, Qiy Foundation

 

13:00-14:30 Lunch & Networking
Room: EXPO AREA
Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Moderator:
Dr. Scott David, LL.M., KuppingerCole
John Hermans, KPMG
Dr. Karsten Kinast, KuppingerCole
The Future of Identity & Access Management
Moderator:
Matthias Reinwarth, KuppingerCole
Graham Williamson, KuppingerCole
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Dr. David Goodman, KuppingerCole
Room: AUDITORIUM
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
14:30-15:30
Digital Risk Officer & Chief Digital Officer

 

It Takes a Community to Reduce Risk

 

Amar Singh, KuppingerCole

 

 

Recruiting Customers, Suppliers and Even Competitors to Help Reduce Risk

 

Dr. Ravindar Bindra, Pharmaceutical Company
Thom Langford, Sapient
Dr. Adriana Nugter, Independent Senior Consultant
Arieh Shalem, Orange
Amar Singh, KuppingerCole

 

 


One Step Closer to the Unhackable Enterprise: Applying an Effective Information Security Strategy

 

Stefan van Gansbeke, CM/MC Health Insurance Fund Belgium

 

 

Best Practice

 

Identity @ The Guardian - SSO at Web Scale

 

Mark Butler, The Guardian

 

Rethinking Digital Identity: The Australian Government Story

 

Ben Bildstein, Department of Industry and Science (Australian Government)

 

 

Cloud Encryption; Securing IaaS

 

Customer-Managed Encryption Keys: Controlling Your Data’s Privacy in the Cloud

 

Richard Anstey, Intralinks
Dan Plastina, Microsoft

 

 

Best Practice: From Zero to Secure in 1 Minute

 

Nir Valtman, NCR Corporation

 

 

Standards & Protocols

 

Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform

 

Pamela Dingle, Ping Identity

 

 

OpenID Connect Certification

 

Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Dr. Michael B. Jones, Microsoft

 

 


The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0

 

Dominick Baier, Thinktecture

 

 

15:30-16:30
Cloud Risk Assessment

 

Assessing and Mitigating Cloud Risks

 

John Hermans, KPMG
Mario Hoffmann, Fraunhofer AISEC
Olga Kulikova, KPMG
Mike Small, KuppingerCole

 

 

Dynamic Control Selection Framework for Onboarding Cloud Solutions

 

Olga Kulikova, KPMG

 

 


Dynamic Certification of Cloud Ecosystems

 

Mario Hoffmann, Fraunhofer AISEC

 

 


Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.

 

Mike Small, KuppingerCole

 

 

FIDO Alliance: Simplifying User Authentication

 

The Death of the Password - Is It Finally Coming True?

 

Alexei Czeskis, Google
Tord Fransson, Yubico
Dr. Michael B. Jones, Microsoft
Dr. Rolf Lindemann, Nok Nok Labs
Donal O'Shea, FIDO Alliance

 

Hybrid Cloud & Beyond

 

Best Practice: A Hybrid Enterprise in a Cloud First World

 

Brian Puhl, Microsoft

 

Identity-as-a-Service Securing PostNL’s 100% Cloud Strategy

 

Theo Punter, PostNL

 

 

OASIS SAML & XACML for Consumer Identity

 

Securing Sensitive Data While Enhancing Privacy

 

Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Gerry Gebel, Axiomatics
Karyn Higa-Smith, U.S. Department of Homeland Security
Soren Peter Nielsen, NineConsult
Daniel Raskin, ForgeRock
John Tolbert, Queralt

 

 

16:30-17:30 Coffee & Networking
Room: EXPO AREA
17:30-18:30
Think Globally, Act Locally

 

Understanding and Dealing with Macro-Level Risks that Affect your Institution’s Risk Profile

 

Ben Bildstein, Department of Industry and Science (Australian Government)
Karyn Higa-Smith, U.S. Department of Homeland Security
Howard Mannella, Alternative Resiliency Services Corp
Robin Wilton, Internet Society

 

 

Privilege Management

 

Privilege Management Use Cases

 

Jason Currill, ObserveIT
Christian Götz, CyberArk
Amar Singh, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic

 

The Snowden Effect: Why seeing is believing

 

Chris Pace, Wallix
Wolfgang Roesch, Tesis Sysware
Michael Yaffe, BeyondTrust

 

Business-Critical Infrastructure & Applications

 

The Future of Directory Services: Data Models - Performance - Security

 

Andrew Ferguson, KuppingerCole Asia Pacific
Peter Gietz, DAASI International GmbH
Thorsten Niebuhr, WedaCon

 

Business Critical Application Security

 

Dr. Sridhar Muppidi, IBM Security
Carsten Olt, SECUDE GmbH
Christian Patrascu, Oracle Corp.
Gerhard Unger, Onapsis Inc.

 

Telcos & Innovation

 

Identity Strategy for Innovation

 

Chema Alonso, Eleven Paths, Telefonica

 

Facing The Future: Identity Opportunities for Telco Operators

 

Chema Alonso, Eleven Paths, Telefonica
John Bradley, OpenID Foundation, Kantara
Philippe Clement, Orange
Jörg Connotte, Deutsche Telekom AG
Marco Dütsch, Swisscom
Maarten Louman, Qiy
Dr. Adriana Nugter, Independent Senior Consultant

 

18:30-18:50 RISK is Not a @#$%&! Dirty Word!
Thom Langford, Director Global Security Office, Sapient
Room: AUDITORIUM
18:50-19:10 Connected Identity: Benefits, Risks & Challenges
Prabath Siriwardena, Vice President - Security Architecture, WSO2
Room: AUDITORIUM
19:10-19:30 No Security without Identity
André Durand, Founder & CEO, Ping Identity
Room: AUDITORIUM
19:30-20:15 European Identity Awards Ceremony
Room: AUDITORIUM
20:15-22:00 Award Reception & Dinner
Thursday, May 07, 2015
08:00-18:00 Check-in & Registration
Room: COUNTER EXPO AREA
08:30-08:50 "Guiding" the Management and Supervisory Boards to Choose the Right Investment Priorities for Cyber Risk Mitigation
John Hermans, Partner, KPMG
Room: AUDITORIUM
08:50-09:10 Identity & Access Process Automation: Improving Business Alignment & Reducing Digital Risk
Dirk Venzke, Director, Commerzbank AG
Room: AUDITORIUM
09:10-09:30 Digital Identities = Security Threats. Is your IAM Program Ready?
Ravi Srinivasan, Director, IBM Security Systems
Room: AUDITORIUM
09:30-09:50 Evolution or Revolution: Unlocking The Potential of The New Digital Economy
Luca Martelli, Sr. Director of Identity Management & Security, Oracle EMEA
Christian Patrascu, Director of Product Management, Oracle Corp.
Room: AUDITORIUM
09:50-11:00 Coffee & Networking
Designing, Developing and Deploying Sustainable Distributed Risk Solutions for your Enterprise
Moderator:
Dr. Scott David, LL.M., KuppingerCole
Dr. Karsten Kinast, KuppingerCole
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Secure Information Sharing through Rights Management
Moderator:
Dr. David Goodman, KuppingerCole
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Prof. Dr. Sachar Paulus, KuppingerCole
Room: AUDITORIUM
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
11:00-12:00
EU Privacy Regulation

 

The Proposed New European Union Data Protection Regulation - Status and Implications

 

Rhiannon Davies, DAC Beachcroft LLP
Kuan Hon, Queen Mary University of London
Dr. Karsten Kinast, KuppingerCole

 

 

The Role of Privacy by Design in the New EU Data Protection Regulation

 

Dr. Karsten Kinast, KuppingerCole
André Lutermann, Dell Software

 

 

Access Governance Best Practice

 

One-Click Insight, Lean Recertification, Improved Compliance: Redefining Access Governance for the Digital Business

 

Matthias Reinwarth, KuppingerCole

 

 

Externalized Access Management (ABAC, RBAC) at Talanx Systeme AG for Bancassurance

 

Frank Wittlich, Talanx Systeme AG

 

 


IAM Processes and their Communication Loops

 

Stephanie Jaecks, Bayer BBS

 

 

The Future of Collaboration

 

Digital Rights Management – UBS Case Study

 

Marek Pietrzyk, UBS Switzerland

 

Experiences in getting Rights Management Deployed

 

Andrew Church, Coutts

 

 


Secure Information Sharing - The User Experience

 

Andrew Church, Coutts
Marek Pietrzyk, UBS Switzerland
Amol Sawarkar, International Federation of Red Cross and Red Crescent Societies (IFRC)

 

 

Life Management Best Practice

 

Life Management in Finance & Insurance Industry

 

Frank Cooler, Intrasurance
Marcel van Galen, Qiy Foundation
Ad van Loon, X-media Strategies
Dr. Adriana Nugter, Independent Senior Consultant

 

12:00-13:00
Cloud Contracting Risks

 

Reaching Compliance Across Jurisdictions: Fundamental Considerations Before Signing a Cloud Services Contract

 

John Hermans, KPMG
Dr. Karsten Kinast, KuppingerCole
Edwin Sturrus, KPMG Advisory N.V.

 

 

IAM Standard Processes

 

Roles or no Roles, that’s the Question. Two Different Approaches for Compliant IAM Processes.

 

Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole

 

RBAC & ABAC Hybrid Approaches

 

Frank Böhm, FSP
Thorsten Niebuhr, WedaCon
Patrick Parker, EmpowerID
Frank Wittlich, Talanx Systeme AG

 

Market Maturity

 

Protecting and Tracking Sensitive Data

 

Dr. David Goodman, KuppingerCole
Dan Plastina, Microsoft

 

Information Centric Security; the Way to Go?

 

Rui Melo Biscaia, Watchful Software
John Grillos, Seclore
Henk Van der Heijden, TecHarbor
Eyal Manor, Secure Islands
Scott Masson, TITUS
Dan Plastina, Microsoft
Jose Manuel Rodriguez, Prot-On

 

Bring Your Own Privacy

 

Life Management Use Cases & Business Models

 

Katryna Dow, Meeco

 

 

Empowering the Consumer for Digital Business and the Identity Economy

 

Prof. Dr. Sachar Paulus, KuppingerCole

 

13:00-14:30 Lunch & Networking
Room: EXPO AREA
Managing Digital Risk: Deploying People, Standards, Metrics, and Enforcement
Moderator:
Dr. Scott David, LL.M., KuppingerCole
Dr. Karsten Kinast, KuppingerCole
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Identity Defined Security
Moderator:
Dr. David Goodman, KuppingerCole
Dave Kearns, KuppingerCole
Securing Operational Technology (OT) and the Internet of Things (IoT)
Moderator:
John Sabo, OASIS Idtrust
Mike Small, KuppingerCole
Room: AUDITORIUM
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
14:30-15:30
Software Defined Everything

 

The Role of Policy Management in the Software-Defined Era

 

Tim Grance, NIST
Dr. Michael B. Jones, Microsoft
Andy Land, IBM
Ken Owens, Cisco Systems
Hemma Prafullchandra, HyTrust

 

 

Dynamic Authorization

 

Adaptive Policy-Based Access Management: Beyond ABAC and RBAC

 

Martin Kuppinger, KuppingerCole

 

 

The Future of Authorization

 

Gerry Gebel, Axiomatics
Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint
Markus Weber, ForgeRock
Frank Wittlich, Talanx Systeme AG

 

 

New Security Solutions for the Enterprise

 

What If the Future of Security Means Not Knowing It’s There?

 

Kim Cameron, Microsoft
Nishant Kaushik, CA
Dr. Sridhar Muppidi, IBM Security
Christian Patrascu, Oracle Corp.
Jackson Shaw, One Identity

 

User Discovery: Changing Best Practices and Protocol Convergence

 

Pamela Dingle, Ping Identity

 

IoT/OT Privacy & Security

 

Security and the Internet of Everything and Everyone

 

Mike Small, KuppingerCole

 

 

IoT Privacy Risks, Legislation and Solutions

 

Kuan Hon, Queen Mary University of London
Yariv Lenchner, Cyber-Ark Software
Peter Niblett, IBM
John Sabo, OASIS Idtrust
Erik Sucksdorff, GlobalSign

 

 

15:30-16:30
Risk Metrics

 

What Gets Measured Gets Done – Identifying New Metrics for Distributed Digital System Performance to Evaluate and Mitigate Risk.

 

Robert Lapes, Capgemini
Dr. Roy Lindelauf, Netherlands Defence Academy
Luca Martelli, Oracle EMEA
Nathan Wenzler, Thycotic

 

How to Measure the Real Access Risk?

 

Niels von der Hude, Beta Systems Software
Dr. Sridhar Muppidi, IBM Security
Wolfgang Roesch, Tesis Sysware

 

 

Best Practice

 

IAM/IAG @ Continental AG: Clearing Process as a Basis for Identity Management

 

Theodor Heindl, Continental Corporate Infrastructure

 

Identity Relationship and Access Management and Dynamic Authorisation Management as a Driver for New Business Opportunities

 

Laura Lätti, DNA Finland

 

 

IAM as a Managed Service

 

IAM as a Service Best Practice: B.Braun Melsungen AG

 

Martin Oberlies, B.Braun Melsungen AG

 

Experiences with IAM as a Service and/or IAM Managed Service

 

Martin Oberlies, B.Braun Melsungen AG
Theo Punter, PostNL
Darran Rolls, SailPoint
Maarten Stultjens, iWelcome
Yso Vonk, NXP Semiconductors
Peter Weierich, iC Consult GmbH

 

Identity of Things

 

Putting Identity at the Center of IoT- Kantara IDoT Strategic Review

 

Victor Ake, ForgeRock
Andre Boysen, DIACC / SecureKey Technologies
Ingo Friese, Deutsche Telekom AG
Hannes Tschofenig, ARM

 

Process Control, Production IT and Operational Technology - No Go Areas for IDM?

 

Eleni Richter, EnBW

 

 

16:30-17:00 Coffee & Networking
Room: EXPO AREA
17:00-18:00
Adopting the New Thinking on Digital Risk

 

Bringing it All Together – Distributed Strategy Solutions for Distributed Risk

 

Dr. Scott David, LL.M., KuppingerCole
Dr. Karsten Kinast, KuppingerCole

 

 

Access Intelligence

 

Access Intelligence, User Activity Monitoring, Recertification: What do we Really Need?

 

Ramses Gallego, Dell
Dr. Michael B. Jones, Microsoft
Rainer Knorpp, Devoteam
Thierry Winter, Evidian

 

Next Generation IAM

 

The Anthem Breach and how it could have been Avoided

 

Dave Kearns, KuppingerCole

 

 

Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions

 

Martin Kuppinger, KuppingerCole

 

 

Integration

 

Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT

 

Gershon Janssen, OASIS Open Standards Group
Peter Niblett, IBM
Jeff Stollman, RMTM
Dirk Wahlefeld, ITConcepts
Souheil Ben Yacoub, Verisign

 

 

18:00-18:30 Closing Keynote
Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
Room: AUDITORIUM
Friday, May 08, 2015
08:30-10:00 Check-in & Registration
Room: COUNTER HOTEL
Workshop Stream I
Workshop Stream II
Workshop Stream III
Room: AMMERSEE I
Room: AMMERSEE II
Room: ALPSEE
09:00-12:30

 

Roles, Recertification, Access Governance: The Lean Approach

 

Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole

 

 

 

Cloud Risk Assessment

 

Mike Small, KuppingerCole

 

 

Industry Focus Workshop: Insurance & Financial Services

 

Prepare your Organization for the Digital Transformation: Enable the Agile, Connected Business

 

Martin Kuppinger, KuppingerCole
Wolfgang Rupprath, FSP

 

 

12:30-13:30 Lunch Break
Room: RESTAURANT
13:30-16:00

 

Roles, Recertification, Access Governance: The Lean Approach

 

Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole

 

 

Beyond Your On-Premise IT: Privilege Management Strategies for All Aspects of Your Organization

 

Dave Kearns, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic

 

 

Identity Mixer, uProve, Qiy Trust Framework, UMA: Providing Control to the Individual

 

Ronny Bjones, Microsoft
Joni Brennan, Kantara Initiative
Dr. Maria Dubovitskaya, IBM Research
Marcel van Galen, Qiy Foundation
Bram Neuteboom, Qiy Foundation
Daniel Raskin, ForgeRock

 

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Partners

The European Identity & Cloud Conference 2015 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00