Expert Talks

Identity & Access Management for the Digital Enterprise

The time is ready now to integrate Identity Management with Access Management and Security Monitoring to introduce next-generation Access Governance in modern Enterprise Environments with BYOD, IoT and Industrie 4.0.

Authentication & Access Management beyond passwords - easy usage, high security and... More

Protecting Information at its Source - Concepts & Approach

In the current world of fast-moving organizations with high demands of new services and supporting IT-systems we can no longer deal with the "old" perimeterized way of protecting the organization´s assets. We are in need of a much more focused and efficient approach that will allow us to protect our assets... More

Business Driven Identity Governance: A Demonstration of IBM Security Identity Governance

Do the identity and access management challenges associated with the "identity explosion" and regulatory compliance have you concerned? IBM Security Identity Governance delivers unique value to the enterprises by employing a business-centric approach to gain deeper insight into users and entitlements along with a... More

Identity Management, Acces & Data Governance for SMB - is it that Different to Enterprise Projects?

SMB organizations are required to introduce their company to IAM and Governance initiatives. In the same spot, they are challenged by

• a demand to implement enterprise identical business related procedures and processes,
• less technical systems but enterprise identical complexity,More

From "Old School" SIEM to a Future-Proof Security Management

Companies have been doing a lot to secure the perimeter but today´s threats mainly come from insiders. SIEM solutions try to fill the gap but the sheer mass of events seems to be unmanageable. NetIQ reduces event numbers by using intelligent and enriched events and inject an identity context in realtime.... More

How to Picture a User's Risk

A user's risk in the context of IAM is hard to grasp. Not just elevated IT priviliges are determining this score. Also the business critcality of a user's entitlement and his overall set of access rights must be considered.The presentation is giving an overview on concepts for a risk scoring metrix and... More

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Partners

The European Identity & Cloud Conference 2015 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00