Partner Details

Gold Sponsor    Booth: G8

Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.


 Sponsored Events

Date Title
May 10 ‑ May 13, 2022 Hybrid Event

European Identity and Cloud Conference 2022

After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital.

Dec 07, 2021 Webinar

Lessons From a Journey Into a Real-World Ransomware Attack

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

Sep 13 ‑ Sep 16, 2021 Hybrid Event

European Identity and Cloud Conference 2021

The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.

Apr 28, 2021 Virtual Event

Operationalizing Privileged Access Management

Join this KCLive Event to operationalize privileged access management in your enterprise. Gain expert insights into effective credentials management, best practices, PAM for DevOps and deploying PAM in your organization.

Sep 01, 2020 Webinar

Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation

What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks have evolved?

Aug 20, 2020 Virtual Event

Advanced Privileged Access Management & New Trends

This virtual event is dedicated to advanced methodologies in Privileged Access Management. Expert speakers and panelists will talk about successfully securing and managing privileged access which is a tough task and is only getting harder to solve.

May 12 ‑ May 15, 2020 Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

May 14 ‑ May 17, 2019 Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Nov 12 ‑ Nov 14, 2018 Conference

Cybersecurity Leadership Summit 2018 Europe

Cybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do.

Nov 12 ‑ Nov 14, 2018 Conference

Cyber Access Summit 2018

Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

May 15 ‑ May 18, 2018 Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Dec 15, 2015 Webinar

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

May 05 ‑ May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Apr 28, 2015 Webinar

Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk efficiency without compromising security.

May 13 ‑ May 16, 2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

May 06, 2014 Webinar

How to stop the Insider Threat: Protect yourself from Privileged Users

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.

May 14 ‑ May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

 Reports

Date Title Price
Jan 09, 2018

Executive View: Thycotic Privilege Manager - 70221

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and…

€190.00
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische…

€1295.00
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Jun 04, 2014

Vendor Report: Thycotic - 71112

Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core…

€495.00
Jan 16, 2013

Snapshot: Thycotic Secret Server - 70633

Thycotic Software is one of the vendors in the emerging Privilege Management market. Their core product is called Secret Server and supports managing secrets, especially, but not limited to,…

€190.00

 Videos

Date Language Title
Dec 08, 2021

Lessons From a Journey Into a Real-World Ransomware Attack

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

Apr 29, 2021

Joseph Carson: Your Journey to Privileged Access Security Maturity and Success

Privileged Access Management (PAM) continues to be a top priority for many organisations throughout the world. It is one of the most important   solutions   to help organisations reduce the risk from cyberattacks that target their privileged accounts   and help move passwords into the background reducing cyber fatigue . A compromised privileged account enables an attacker to move around the network undetected, download malicious payloads, stage compromised servers and cause significant financial losses to their victims.  Almost all users are now privileged users. With 80% of breaches involving the compromise of IT and business user credentials you must create a plan to reduce the risks posed by “overprivileged access” users, applications, and services.   When users are over-privileged it only takes attackers a few easy steps to become a full domain administrator.  We must make it more difficult that force attackers to take more risks increasing the chance of detecting them early before serious damage is done.   One question for all organizations is how to get started. Where is the best place to begin for managing and protecting privileged access? It’s vital that you have have a solid strategy. Whether you’re starting a new PAM project or strengthening an existing Privileged Access Solution, Joseph Carson, Thycotic’s Chief Security Scientist and Advisory CISO will guide you step-by-step through planning your journey to privileged access security   and introduce you to the PAM checklist that will help guide you to both maturity and success . 

Sep 02, 2020

Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation

What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks...

Aug 21, 2020

Joseph Carson: Privileged Access Cloud Security: Insider Tips and Best Practices

As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority. Join Thycotic chief security scientist and author Joseph Carson as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also share how Thycotic’s new Access Control solutions can safeguard cloud access by both IT and business users.

Dec 15, 2015

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Apr 29, 2015

Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk efficiency w...

May 06, 2014

How to Stop the Insider Threat: Protect Yourself from Privileged Users

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the ri...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00


Munich, Germany

Congress

European Identity & Cloud Conference 2018

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 15 - 18, 2018 Munich, Germany

Key Topics

  • Identity & Access Management (IAM) 2020

  • Customer Identity Management (CIAM) as a Business Enabler

  • Privacy & GDPR

  • Blockchain ID, Privacy & Security

  • Cybersecurity: Managing & Mitigating Risk

  • Identity in the Age of AI & Intelligent Assistants

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00