Pre-Conference Events

FIDO Alliance Update

The FIDO Alliance Update Seminar will provide an understanding of where the FIDO Alliance stands in its effort to address online authentication problems — problems best exemplified by the weakness of passwords! Recent announcements by companies including Google and Microsoft have demonstrated that the FIDO Standards are becoming the way to address authentication. More

OpenID Foundation Workshop

This OpenID Foundation Workshop provides early insight and influence on important new online identity standards like the EIC Award-winning OpenID Connect. We will provide updates on the OpenID Connect Self Certification Test Suite and Mobile Profile Working Groups of OpenID Connect as well as other protocols in the pipeline like Account Chooser and Native Applications. Leading technology experts from Microsoft, Google, Ping Identity and others will update developments with these key protocols, review work group progress and discuss how they help meet enterprise business challenges. More

The Foundations of API Security and API Gateway Technology

This workshop will explore API gateway technology. What it is, how it’s applied today, the benefits of API gateway technology, and implementation examples. More

Kantara Workshop

The Kantara Initiative annual EIC workshop will focus on the Kantara Initiative strategy for Connected Life & Access Management 2.0. Organizations of all types are faced with permanent change - in technology, markets, business models, and regulation. This continuously changing environment applies for organizations big and small, as well as local and global. Services that leverage identity and personal data are becoming pervasive and the identity data of people, organisations, applications and devices represents a user’s digital DNA. More

Contextual Security Intelligence

Behaviour-based approaches to detecting intrusions have recently gained importance and momentum as a complementary model to the purely knowledge based approach. Behavioural intrusion detection is based on the assumption, that intrusions regularly create deviations from the normal behaviour, which is defined by reference models. In permanently comparing network activity with the reference model, such deviations can be detected and used to create an alarm. More

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Partners

The European Identity & Cloud Conference 2015 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00