European Identity & Cloud Conference 2020

200+ Speakers • 1000+ Delegates • 50+ Exhibitors • 180+ Sessions • 30+ Social Events
• Unlimited networking opportunities

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

With five parallel tracks, more than 200 international speakers and experts, many Best Practice presentations and 130 hours of relevant content, EIC 2020 provides you with a comprehensive overview of future trends in Internet security as well as practical information about current projects.

Every year the agenda focuses on the latest and most relevant Information Security and Digital Identity topics to offer you the foundation to design the right digital identity and security strategies for your business. Hear about emerging trends in order to be prepared to meet and exceed present and future business, identity and security challenges.

Key Topics

Digital identities are core element of any digital transformation. Letting the customer into your enterprise to manage processes and information related to him means that you need to have a secure and adaptive system in place to manage identities and their access rights. Implementing such capabilities on a per service base is expensive, slow and risky. Setting up an Identity Fabric delivering identity services to the new digital business, will enable you to take the lead and strengthen your innovative power. EIC 2020 will help you define a step-by-step approach to migrate from your legacy IAM to a future-proof Identity Fabric.
New digital business services change the way IAM needs to be done. To be successful, strong digital identity backend that delivers all identity services required by the new digital services that are created. KC Principal Analyst Martin Kuppinger calls such backend the “Identity Fabrics”, which are more than identity API platforms, both regarding capabilities and interfaces. This shift to API-based access in consequence of the digital transformation requirements changes IAM and puts the API capabilities at the center.
There is no doubt that artificial intelligence (AI) can enhance identity and access management (IAM) and help protect IT networks from future security breaches. While IAM plays a huge role in mitigating data breaches and additional cyber risks, AI offers more efficient and accurate processes by automating and accelerating tasks. Exploring innovative solutions and ways of applying new technologies to develop novel forms of digital ID is the key to successful transformation and leadership.
Utilizing AI to defend yourself from attackers and solidify your surroundings becomes increasingly crucial. It is important to better understand where AI comes into play in the industry, what tangible results does it have and how to leverage its extensive potential. Dynamism in the infrastructure and volatile growth of IoT point out on the prominence of implementing better security solutions and approaches. From biometrics to context-based identity and artificial intelligence, IAM will continue to maintain its importance and grow in scope and scale.
Solid knowledge, awareness and strategic preparation are the basic steps toward the adoption of machine learning and AI features in your own projects and applications. Extensive and rigorous content enables you to boost your understanding and be ready to drive your company’s digital transformation. EIC will offer high impact boot camps leaving you fully equipped with a broad range of useful tools to incorporate into your own business strategy. Helping you navigate through the AI landscape to learn how to spot business opportunities and what exactly is needed for strategic adoption and implementation of artificial intelligence.
Consumer identity and access management (CIAM) has emerged in the last few years to meet evolving business requirements. Enterprises want to collect, store, and analyze data on consumers in order to create additional sales opportunities and increase brand loyalty. CIAM goes beyond traditional IAM in supporting some baseline features for analyzing customer behavior, as well as collecting consent for user data usage, and integration into CRM, connected devices, and marketing automation systems. It focuses on the connectivity with the customer when accessing all customer-facing systems, from registration and throughout the relationship. Understanding the wishes and requirements of customers and mapping them successfully in CIAM processes is the key to successful online business.
The number of non-human identities is increasing dramatically. These can be IoT devices, bots, service accounts, all interconnected within a network and using keys and certificates. The authentication procedure of machine identities is highly automated and very often the level of security is lower than for human authentication. This poses a security risk to an enterprise network and can lead to breaches and hacks, if not treated with adequate care. Therefore, it is necessary for the good enterprise IAM hygiene to cover identities of device accounts and not only those belonging to humans. Thorough understanding of the risks associated with non-human identities is essential for enabling fully secure access.
Managing digital identities and being in control of your own data, share it only when necessary and as much as necessary seems to be impossible through traditional centralized identity management models. Blockchain technology is promising to solve this challenge by providing a decentralized approach which offers more control and security to the challenge of digital identities. Blockchain makes self-sovereign identities (SSIs) possible, and concepts, as well as number of commercial products, are being offered on the market already. It remains to be seen how scalability, governance questions, and future privacy regulations affect wider adoption of blockchain technology.
Data is the core asset of the digital enterprise and is essential for its’ growth. But the digitalization brings with itself new challenges, like novel cyber threats. The number and variety of cyber-attacks is increasing rapidly. Thousands of ransomware incidents occur daily costing companies and government entities billions of dollars. It is essential for the digital enterprise and its leadership to define an effective cybersecurity strategy and know the limits of existing cybersecurity defenses. Only then the companies can enable frictionless customer experience, develop new products and avoid unnecessary risks.
Enterprises are utilizing cloud capabilities in order to reduce their costs, bring speed, scalability and accuracy to their business solutions. For companies moving to a cloud strategy, having a roadmap is essential and the move must be aligned with the overall business strategy. Despite the above-mentioned potential benefits, user experience, specific cost, governance and security must be considered. Asking the right questions and having a clear direction will ensure that your business gains maximum benefit from the move.
Most enterprises are utilizing both public and on-premise cloud infrastructures. They get the benefit of both worlds which allows companies to scale and consolidate their business. But challenges remain such as migration, integration, security and effective management. Furthermore, edge computing can allow for deployment of complex techniques such as machine learning and combine novel data processing capabilities with performing rapid data analysis on the cloud. Moving and maintaining this complex architecture requires thorough checks of security, regulatory and internal requirements. Having a clear understanding of those is central to success of today’s digital enterprise.
Deploying robotic process automation (RPA) instead of humans to perform automated tasks is hugely beneficial and cost effective, however, associated with severe security challenges. While the significance of RPA on identity governance will increase in the future, we have to ask ourselves: How can we mitigate access related risks? Can we rely on standard identity and access management (IAM) capabilities of identity governance and administration (IGA) and privileged access management (PAM)? Balancing new opportunities such as RPA with security risks is the main challenge for every company willing to achieve a new level of operational efficiency.

Platinum Sponsors

European Identity & Cloud Conference 2020 Agenda

Monday, May 11, 2020
19:00 - 22:00 EIC 2020 Innovation Night
Dr. Guillaume Aimetti, Co-founder & CTO, Inspirient
Dr. George Beridze, AI Practice Lead / Project Manager, KuppingerCole
Joseph Heenan, Senior Architect, Authlete Inc
Lukas Kemkes, Co-Founder, Creatext
Kamer Ali Yuksel, Chief Data Scientist, hawk:AI
Room: ALPSEE
Tuesday, May 12, 2020
08:00 - 18:00 Check-in & Registration
Room: COUNTER EXPO AREA
09:00 - 13:00
KuppingerCole AI Workshop

 

AI Governance: Doing AI Ethically is Doing AI Right

 

Anne Bailey, KuppingerCole
Mike Small, KuppingerCole

 

OpenID Foundation Workshop

 

EIC Pre-Conf Workshop hosted by OpenID

 

John Bradley, Yubico
Stina Ehrensvärd, Yubico
Bjorn Hjelm, Verizon
Dr. Michael B. Jones, Microsoft
Dr. Torsten Lodderstedt, YES.com AG
Eve Maler, ForgeRock
Nat Sakimura, OpenID Foundation
Don Thibeau, OpenID Foundation

 

Kantara Workshop

 

Standardised Consent in the Wild - Implementing Kantara's Consent Receipt Specification

 

James Aschberger, One.Thing.Less AG
Andrew Hindle, IDPro
Martin Sandren, Nixu
Oscar Santolalla, Ubisecure
Mike J Schmidt, Smartspecies.ca

 

Building Digital Trust for People - Different Perspectives Towards a Common Goal

 

Lubna Dajani, Allternet Ltd.
Katryna Dow, Meeco
Colin Wallis, Kantara Initiative

 

Women in Identity/ IDPro Workshop

 

EIC Pre-Conf Workshop from IDPro & Women in Identity

 

Ian Glazer, Salesforce
Dr. Barbara Mandl, FOSTER FORE
Drs. Jacoba C. Sieders, ABNAMRO Bank
Dr. Angelika Steinacker, IBM Security Europe

 

 
Room: AMMERSEE I
Room: ALPSEE
Room: AMMERSEE II
Room: BODENSEE
13:00 - 14:00 Lunch & Networking
Room: EXPO AREA
14:00 - 14:10 Welcome to EIC 2020
Jennifer Haas, Project Manager, KuppingerCole
Room: AUDITORIUM
14:10 - 14:30 Opening Keynote - Future of IAM
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
14:30 - 14:50 Keynote 2
Room: AUDITORIUM
14:50 - 15:10 tba
Joni Brennan, President, Digital ID & Authentication Council of Canada
Kim Cameron, Idenpendent Identity Advisor
Room: AUDITORIUM
15:10 - 15:30 No ID, No DX
Nat Sakimura, Chairman, OpenID Foundation
Room: AUDITORIUM
15:30 - 15:50 AI Beyond Deep Learning
Prof. Dr. Christoph von der Malsburg, Senior Fellow, FIAS Frankfurt Institute for Advanced Studies
Room: AUDITORIUM
15:50 - 16:10 tba
Joy Chik, Corporate Vice President – Identity Division, Microsoft
Room: AUDITORIUM
16:10 - 17:00 Coffee & Networking
Room: EXPO AREA
17:00 - 17:20 tba
Dr. Sridhar Muppidi, IBM Fellow & CTO, IBM Security
Room: AUDITORIUM
17:20 - 17:40 Helping the CISO to have Impact - From Cost Generation to Protecting and Adding Value
Gerald Horst, Partner - Digital Identity EMEA, PwC
Room: AUDITORIUM
17:40 - 18:00 Your Digital Identity, Your Choice
Dan Johnson, Vice President, Identity Products Cyber and Intelligence Solutions, Mastercard
Room: AUDITORIUM
18:00 - 18:20 tba
Patrick Parker, Founder and CEO, EmpowerID
Room: AUDITORIUM
18:20 - 18:40 AI - Mankind's Last Invention?
Dr. Horst Walther, Managing Director, SiG software Integration
Room: AUDITORIUM
18:40 - 19:00 Enterprise versus Intruders: Turn the Game Using Digital Identities!
Ulrike van Venrooy, Associate Partner - Cybersecurity, Lead Digital Identity Services Germany, Switzerland and Austria, EY
Room: AUDITORIUM
19:00 - 19:20 Just in Time Provisioning - How it Meets the Demands of Today's Dynamic Enterprise?
Kurt Lieber, CISO, Aetna
Room: AUDITORIUM
19:20 - 19:40 Modern Identity: Unifying Access and Authentication
Gerald Beuchelt, CISO, LogMeIn
Room: AUDITORIUM
19:40 - 20:10 Keynote Panel: Hearts, Minds & Wallets: The Coming War Over Digital Identity
Richard Bird, Chief Customer Information Officer, Ping Identity
Joni Brennan, President, Digital ID & Authentication Council of Canada
Kim Cameron, Idenpendent Identity Advisor
Joy Chik, Corporate Vice President – Identity Division, Microsoft
Heather Dahl, CEO, Sovrin Foundation
Darrell Long, VP, Marketing and Product Management, One Identity
Room: AUDITORIUM
20:10 - 23:59 Sponsored by Akamai
Bavarian Happy Hour
Room: HIRSCHALM
Wednesday, May 13, 2020
07:00 - 07:45 Sponsored by Ping Identity
EIC Run 2020
Room: In front of the INFINITY Hotel
08:00 - 18:00 Check-in & Registration
Room: COUNTER EXPO AREA
08:30 - 08:50 tba
Berthold Kerl, Seasoned Expert for Finance Industry
Room: AUDITORIUM
08:50 - 09:10 Security Starts with Identity - A Simple and Integrated Approach
Kim Valdemar Larsen, Head of Service Operations, BEC
Darrell Long, VP, Marketing and Product Management, One Identity
Frank Moris, IAM Architect, BEC
Room: AUDITORIUM
09:10 - 09:30 We Need Customertech. It's as Simple as That
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, Harvard's Berkman Klein Center for Internet and Society
Room: AUDITORIUM
09:30 - 09:50 The Importance of Identity Fabrics to True Digital Transformation
Tim Barber, Senior Vice President, EMEA, ForgeRock
Room: AUDITORIUM
09:50 - 10:10 Is Artificial Intelligence in Cybersecurity Trustworthy or Deceivable?
Dr. Mariarosaria Taddeo, Research Fellow and Deputy Director, Digital Ethics Lab, Oxford Internet Institute, University of Oxford
Room: AUDITORIUM
10:10 - 11:00 Coffee & Networking
Room: EXPO AREA
Quo Vadis Identity I
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
AI & Digital ID: Re-Defining Leadership  
Moderator:
Anne Bailey, KuppingerCole
Dr. George Beridze, KuppingerCole
John Tolbert, KuppingerCole
Protecting Digital Enterprise Against Cyber Risk I
Moderator:
Alexei Balaganski, KuppingerCole
Paul Fisher, KuppingerCole
Cloud Strategy Roadmap
Moderator:
Christopher Schuetze, KuppingerCole
Mike Small, KuppingerCole
Expert Stage I
Moderator:
Richard Hill, KuppingerCole
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
Room: CHIEMSEE
Room: EIC CAFÉ
11:00 - 12:00
Identity Fabrics

 

Identity Fabrics: Delivering IAM for the Digital Business

 

Martin Kuppinger, KuppingerCole
11:00 - 11:20

 

Panel: Disruptive Role of Mobile Device Manufactures Within the Digital Identity Market

 

Artur Burgardt, CORE SE
Kim Cameron, Idenpendent Identity Advisor
Adam Cooper, ID Crowd
Dr. Dirk Woywod, Verimi
11:20 - 11:40

 

Digital Transformation and Leadership

 

tba

 

Dr. Barbara Mandl, FOSTER FORE
11:00 - 11:20

 

Integrated Intelligence – Combining Human and Artificial Intelligence for Competitive Advantage

 

Prof. Dr. Ulrich Lichtenthaler, International School of Management
11:20 - 11:40

 


AI and Digital Boarders: The Race to Out-Regulate and Out-Platform for an Open Society

 

Katryna Dow, Meeco
11:40 - 12:00

 

Emerging Threats

 

tba

 

Alexei Balaganski, KuppingerCole
11:00 - 11:20

 

Security Predictions for 2020

 

Filipi Pires, Cyber Security Evangelist
11:20 - 11:40

 

Transforming Your Organization

 

Hybrid Cloud Strategy Blueprint: an overview of Architecture

 

Mike Small, KuppingerCole
11:00 - 11:20

 

Cloud Migration – an Obscure Journey on Its Own or a Well-Paved Road

 

Hristomir Hristov, Cobuilder International
11:20 - 11:40

 


Panel: Governing Your Hybrid Cloud

 

Hristomir Hristov, Cobuilder International
Eleni Richter, EnBW
11:40 - 12:00

 

Privileged Access Management

 

tba

 

Reto Bachmann, One Identity

 

tba

 


Forget about complex PAM projects: Now's the time for quick, easy and TCO-efficient Privileged Access Management

 

Didier Cohen, WALLIX

 

12:00 - 13:00
Enterprise IAM Trends

 

Re-inventing Identity Management at the BBC

 

Ros Smith, BBC
12:00 - 12:20

 

IAM Performance Measurement

 

David Doret, BNP Paribas
12:20 - 12:40

 


Panel: Unique Digital Identities in Complex and Global Organizations

 

David Doret, BNP Paribas
Thorsten Niebuhr, WedaCon
Ros Smith, BBC
Dr. Angelika Steinacker, IBM Security Europe
12:40 - 13:00

 

Leveraging AI

 

Essay on Leadership Blindness on AI and Its Impact on the Digital and Human Transformation - Do We Know What We Need to Know?

 

Marisa Monteiro Borsboom, Humanity Of Things
12:00 - 12:20

 

Panel: AI and Ethical Standards: Challenges of Implementation and Evaluation

 

Hannes Hahkio, Nixu Oyj
Mike Kiser, SailPoint
Prof. Dr. Ulrich Lichtenthaler, International School of Management
12:20 - 12:40

 

Cyber Supply Chain Risk Management

 

Necessary Components of an Effective Cyber Supply Chain Risk Management (C-SCRM)

 

Alexei Balaganski, KuppingerCole
Christopher Schuetze, KuppingerCole
12:00 - 12:30

 

Panel: Managing Cyber Supply Chain Risks and Achieving Digital Business Resilience

 

Dr. Vangelis Gazis, Huawei Technologies
Dr. Michele Nati, IOTA Foundation
12:30 - 13:00

 

Best Practices

 

How Do You Design for Failure With Azure Services?

 

Sven Malvik, Vipps AS
12:00 - 12:30

 

Public-Cloud, Private-Cloud, On-Prem: Impacts of Cloud Cover on IDM

 

Eleni Richter, EnBW
12:30 - 13:00

 

Customer Identity Management as Core of Business Strategy

 

tba

 

Bolstering User Identity Validation: Plugging the gaps in credential management for better and more secure account recovery

 

Andrew Shikiar, FIDO Alliance

 


tba

 

Mika Huhtamäki, Vastuu Group Oy
Teemu Kääriäinen, Nixu Cybersecurity

 

13:00 - 14:30 Lunch & Networking
Room: EXPO AREA
Quo Vadis Identity II
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
AI-powered Cybersecurity
Moderator:
Anne Bailey, KuppingerCole
Dr. George Beridze, KuppingerCole
Dr. Barbara Mandl, FOSTER FORE
Protecting Digital Enterprise Against Cyber Risk II
Moderator:
Alexei Balaganski, KuppingerCole
Paul Fisher, KuppingerCole
Public & On-Premise Cloud, Core IT Hosting, Edge IoT
Moderator:
Christopher Schuetze, KuppingerCole
Mike Small, KuppingerCole
John Tolbert, KuppingerCole
Expert Stage II
Moderator:
Richard Hill, KuppingerCole
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
Room: CHIEMSEE
Room: EIC CAFÉ
14:30 - 15:30
Best Practices

 

Build Your Own IDaaS: Lessons from Year One

 

Alyssa Kelber, Thomson Reuters
Jon Lehtinen, Thomson Reuters
14:30 - 14:50

 

A Crew as Nuts as You Are: Building a Local IAM User Group

 

Steve Hutchinson, GE Digital
14:50 - 15:10

 


Beyond Tooling of IAM - the Importance of Processes and People - Lessons Learned From an IAM Project

 

Maria Hyland, AIB
Dr. Silvia Knittl, PwC
15:10 - 15:30

 

Future of Security and AI

 

Panel: Ethical and Governance Challenges at the intersection of AI and Cybersecurity

 

Mario Beccia, European Defence Agency
Marisa Monteiro Borsboom, Humanity Of Things
Adam Bowering, European Parliament
Florian Pennings, Microsoft
Lorenzo Pupillo, CEPS (Centre for European Policy Studies)
Doc Searls, Harvard's Berkman Klein Center for Internet and Society
Dr. Mariarosaria Taddeo, Digital Ethics Lab, Oxford Internet Institute, University of Oxford

 

Cyberattack Resilience & the Future SOC

 

Security Orchestration, Automation & Response (SOAR) - Market Trends & Overview

 

Alexei Balaganski, KuppingerCole
14:30 - 14:50

 

How Does a Hacker Reduce the Risk From Getting Hacked - Inside the Mind of a Hacker

 

Joseph Carson, Thycotic
14:50 - 15:10

 


Panel: Cyber Security Challenges in the Age of Industry 4.0 - OT Meets IT

 

Dave Lewis, Duo Security (now part of Cisco)
Mark de Simone, Wallix
15:10 - 15:30

 

Improving Business Efficiency & Reliability

 

What is 5G and Why It Matters

 

Mike Small, KuppingerCole
14:30 - 14:50

 

tba

 

Robert Lapes, Independent Identity Architect & Analyst
14:50 - 15:10

 

Digital Identity, IoT & Privacy

 

Session 1

 

tba

 


Session 3

 

15:30 - 16:30
Privileged Access Management

 

Privileged Access Management 2020 - Leadership Compass Overview

 

Paul Fisher, KuppingerCole
15:30 - 15:50

 

Panel: Digital Trends, Risks and Rewards - Achieving Control of Privilege Accounts in the Digital Enterprise
15:50 - 16:10

 

Current Trends and Challenges

 

tba

 

Mario Beccia, European Defence Agency
15:30 - 15:50

 

Let's Get #DeepReal

 

Doc Searls, Harvard's Berkman Klein Center for Internet and Society
15:50 - 16:10

 

Best Practices I

 

tba

 

Stefan Würtemberger, Marabu Inks
15:30 - 16:00

 

User Awareness Challenges in Cyber Security

 

Kashif Husain, Nomura
16:00 - 16:30

 

Cloud Computing and Cloud Architecture Trends

 

Panel: DevOps Paving the Way for Cloud Identity

 

Loren Russon, Ping Identity
15:30 - 15:50

 

Digital Identity: A Systematic Rethink

 

Governance Beyond Identities: Implementing Policy Based Access Control

 

Gal Helemski, PlainID

 

16:30 - 17:30 Coffee & Networking
Room: EXPO AREA
17:30 - 18:30
Identity in a Digital World

 

Digital Identity as a Building Block for Ethical Digital Economies

 

Adam Cooper, ID Crowd
17:30 - 17:50

 

Use Case: Belgian Mobile ID for Digital Inclusion

 

Sylvie Vandevelde, Belgian Mobile ID
17:50 - 18:10

 


Panel: Connecting the Power of the Pan-Canadian Trust Framework for Global Impact, The Emergence of Identity Networks

 

Andre Boysen, DIACC / SecureKey Technologies
Joni Brennan, Digital ID & Authentication Council of Canada
Steve Pannifer, Consult Hyperion
18:10 - 18:30

 

AI IAM and Security

 

Identity Analytics is the Most Important Threat Mitigation Tool

 

Steve Hutchinson, GE Digital
17:30 - 17:50

 

Can ML Help Identity Management Keep up With the Changing IT Landscape?

 

Mark Wahl, Microsoft Corporation
17:50 - 18:10

 


Panel: The Idea and Benefits of Business Process Driven Data Protection and Access Management (BPDDPAM)

 

Petter Bergström, PwC
Andreas Mergner, PwC
18:10 - 18:30

 

Best Practices II

 

NPA - Non Personal Accounts or No Person Accountable?

 

Jan-Joost Bouwman, ING
Leon Janson, ING
17:30 - 17:50

 

Practical Security Analysis for Smart Contracts

 

Mohammadreza Ashouri, University of Potsdam
17:50 - 18:10

 


tba

 

Klaus R. Nötzel, EUMETSAT
18:10 - 18:30

 

Cloud, Edge, IoT

 

Cloud DNS Strategies to Maximize Failover Efficiency & UX in Multi-Region Deployments

 

Jon Lehtinen, Thomson Reuters
17:30 - 17:50

 

Protecting the 5G Core Service Based Architecture (SBA)

 

Bjorn Hjelm, Verizon
17:50 - 18:10

 


Panel: From Smart Cities to Manufacturing – Securing Clouds of Things
18:10 - 18:30

 

Innovation Best Practises

 

tba

 

tba

 


First steps towards SSI under eIDAS and the European SSI Framework

 

Xavier Vila Pueyo, Validated ID

 


Good Cyber Hygiene Keeps Privileged Accounts Clean

 

Gil Shulman, Illusive Networks

 


Beyond Identity - the Bright Future of Authorization

 

Ewan Dawson, Symphonic Software

 

18:40 - 19:00 Central Banks and the Future of Digital Money
Matthieu Saint Olive, Strategic Sales Executive, ConsenSys
Room: AUDITORIUM
19:00 - 19:20 Building the Decentral Trust Layer for the Age of Ambient Intelligence
Holger Koether, Director of Partnerships, IOTA Foundation
Room: AUDITORIUM
19:20 - 19:40 tba
Room: AUDITORIUM
19:40 - 20:15 European Identity & Cloud Awards Ceremony
Room: AUDITORIUM
20:15 - 22:00 Fun-Fair Evening
Room: EXPO AREA
Thursday, May 14, 2020
08:00 - 18:00 Check-in & Registration
Room: COUNTER EXPO AREA
08:30 - 08:50 Modern Privileged Access Management for Hybrid and Multi-Cloud Environments
Sami Ahvenniemi, Chief Customer Officer, SSH.COM
Room: AUDITORIUM
08:50 - 09:10 Security Management: Tailored to Your Needs
Dr. Barbara Mandl, Advisor, FOSTER FORE
Room: AUDITORIUM
09:10 - 09:30 tba
Room: AUDITORIUM
09:30 - 09:50 Moving from the Dark Age of Legacy to the Era of Enlightenment
Henk Marsman, Lead Product Manager IAM, Rabobank
Room: AUDITORIUM
09:50 - 10:10 Killing that ESB moment in Customer IAM!
Prabath Siriwardena, Vice President - Security Architecture, WSO2
Room: AUDITORIUM
10:10 - 11:00 Coffee & Networking
Room: EXPO AREA
Identity Fabrics & Identity API Platforms I
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Customer Identity & Marketing Automation
Moderator:
Roland Bühler, KuppingerCole
John Tolbert, KuppingerCole
Transposing Human Identity: RPA and Digital ID
Moderator:
Paul Fisher, KuppingerCole
Richard Hill, KuppingerCole
Christopher Schuetze, KuppingerCole
Self-Sovereign Identity I
Moderator:
Anne Bailey, KuppingerCole
Andrew Tobin, Evernym
Expert Stage III
Moderator:
Mike Small, KuppingerCole
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
Room: CHIEMSEE
Room: EIC CAFÉ
11:00 - 12:00
Enabling Seamless & Secure Access

 

Access Control Tools for SAP Environments - Leadership Compass Overview

 

Martin Kuppinger, KuppingerCole
11:00 - 11:20

 

Preparing for the Destruction of Sap Siloes: Doing Access Control and Security Right for Your Modern Business Applications

 

Martin Kuppinger, KuppingerCole
11:20 - 11:40

 


SAP Compliance, Governance and Integration with Your Identity Management Systems - Done!

 

Lara Patricia, The Hartmann Group
11:40 - 12:00

 

Best Practice Cases for CIAM

 

CIAM at AUDI - A Constant Transformation in an worldwide Digital Ecosystem

 

Genc Begolli, AUDI AG
11:00 - 11:20

 

Transformation from a "Contract Specifc Login to a User Centric Experience"

 

Rolf Hausammann, Swisscom
11:20 - 11:40

 


Customer IAM (CIAM) and Digital Transformation

 

Martin Ingram, Royal Bank of Scotland
11:40 - 12:00

 

Overcoming Security Implications

 

Effective and Secure Robot Account and Access Management in ING

 

Emin Baki, ING
11:00 - 11:20

 

Governance Surrounding Bot Identities

 

Sara Farmer, Thomson Reuters
11:20 - 11:40

 


Panel: Automated Surveillance in the Physical World, Fast, Cheap and Out of Control

 

Joni Brennan, Digital ID & Authentication Council of Canada
Mark Lizar, Open Consent Group
11:40 - 12:00

 

Future of Digital Identity

 

Reimagining Identity: a Buyer’s Guide to Blockchain Identity

 

Anne Bailey, KuppingerCole
11:00 - 11:20

 

Self-Sovereign Identity: It's About More Than Identity

 

Andrew Tobin, Evernym
11:20 - 11:40

 


Panel: The Challenges Of Deploying SSI At Scale

 

Rouven Heck, ConsenSys
Dr. Michele Nati, IOTA Foundation
Xavier Vila Pueyo, Validated ID
Andrew Tobin, Evernym
11:40 - 12:00

 

Access Management & Security

 

Transforming an Existing on Premise IAM to Meet a Hybrid Reality

 

Martin Sandren, Nixu

 

tba

 


Everything as Code – Ensuring Compliance and Governance for IAM

 

Dr. Heiko Klarl, iC Consult Group

 

12:00 - 13:00
Authentication Trends

 

The Future of OAuth

 

Dr. Torsten Lodderstedt, YES.com AG
12:00 - 12:20

 

Panel: FIDO, Strong Authentication & eIDAS

 

John Bradley, Yubico
Naohiro Fujie, Itochu Techno Solutions
Koichi Moriyama, FIDO Alliance
Nat Sakimura, OpenID Foundation
12:20 - 12:40

 

The Future of CIAM & Data Protection

 

Latest Results from the Leadership Compass "Fraud Reduction"

 

John Tolbert, KuppingerCole
12:00 - 12:20

 

Hidden Motivators of Data Breaches

 

Christian Goy, Behavioral Science Lab
12:20 - 12:40

 

Digital ID: A Systemic Rethink

 

Holistic Digital Identity and its Emerging Technology

 

Kim Cameron, Idenpendent Identity Advisor

 

Self-Sovereign Identity & Verifiable Credentials

 

Solving Problems with SSI

 

Will Abramson, Edinburgh Napier University
12:00 - 12:20

 

Bringing Self-Sovereign Identity Into Practice: The Good, the Bad and the Ugly

 

Sebastian Bickerle, Main Incubator GmbH
Marcus Heizmann, Commerz Business Consulting GmbH
12:20 - 12:40

 


Panel: Investing in Digital Identity: The Future of Blockchain in the New World of Data Protection Regulation

 

Dr. Juan Caballero, Spherity GmbH
Kim Cameron, Idenpendent Identity Advisor
Andrew Tobin, Evernym
Dr. Phil Windley, Brigham Young University
12:40 - 13:00

 

Current & Future Status of IAM

 

Modernize Your Identity Governance to Enable Digital Transformation

 

Dr. Alfons Jakoby, Omada

 

How Natural Language Interactions with your IAM System will Change Everything

 

Sanjay Nadimpalli, Tuebora Inc

 


I Expect you to go Passwordless Mr. Bond!

 

Ingo Schubert, RSA

 

13:00 - 14:30 Lunch & Networking
Room: EXPO AREA
Identity Fabrics & Identity API Platforms II
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Balancing User Experience, Privacy, & Security
Moderator:
Roland Bühler, KuppingerCole
John Tolbert, KuppingerCole
Managing Non-Human Identities
Moderator:
Paul Fisher, KuppingerCole
Richard Hill, KuppingerCole
Christopher Schuetze, KuppingerCole
Self-Sovereign Identity II
Moderator:
Anne Bailey, KuppingerCole
Andrew Tobin, Evernym
Expert Stage IV
Moderator:
Mike Small, KuppingerCole
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
Room: CHIEMSEE
Room: EIC CAFÉ
14:30 - 15:30
Identity & APIs

 

APIs Are Enablers: How the OpenID Financial-grade API (FAPI) is Driving Open Banking

 

Nat Sakimura, OpenID Foundation
14:30 - 15:00

 

Panel: API Management - Industry Drivers & Challenges in 2020

 

Andre Priebe, iC Consult Group
Joe Zanini, Ping Identity
15:00 - 15:30

 

Put Your Customer into Focus with a Great User Experience

 

Vectors of Identity: A Model for Better User Experience

 

George Fletcher, Verizon Media Group
14:30 - 14:50

 

Panel: Best Ways to Balance User Experience & Security for your Consumer Identity Management Strategy

 

Robin Goldstein, Microsoft
Ishara Karunarathna, WSO2
Dave Lewis, Duo Security (now part of Cisco)
Martyn Roberts, Squareball
14:50 - 15:10

 


Designing Consumer Identity Systems for Inclusion

 

Nishant Kaushik, Uniken
15:10 - 15:30

 

New Paradigm in ID Management I

 

How Non-Human Identities Will Deliver Better Security and Better Business Outcomes

 

Paul Fisher, KuppingerCole
14:30 - 14:50

 

Using W3C Verifiable Credentials to Strongly Identify and Authorise Entities in a Global IoT Infrastructure

 

Prof. Dr. David Chadwick, University of Kent / Verifiable Credentials Ltd.
14:50 - 15:10

 

Beyond Blockchain

 

Panel: How Self-Sovereign Identity Has Graduated From the Blockchain World

 

Dr. Julien Bringer, KALLISTECH
Vic Cooper, HearRo, Inc.
Heather Dahl, Sovrin Foundation
Riley Hughes, Streetcred ID
Dr. André Kudra, esatus AG
14:30 - 14:50

 

U.S. Permanent Resident Cards with SSI

 

Markus Sabadello, Danube Tech
14:50 - 15:10

 


Self-Sovereign Identity in a European Digital Single Market – Quo vadis?

 

Erik R. van Zuuren, Trustcore.EU
15:10 - 15:30

 

Cybersecurity & Threat Detection

 

Dissecting and Comparing Different Binaries to Malware Analysis

 

Filipi Pires, Cyber Security Evangelist

 

tba

 

15:30 - 16:30
Identity Standards

 

The Future of Digital Identity

 

Ian Glazer, Salesforce
15:30 - 16:00

 

FastFed: a Standard for Configuring Standards

 

Pamela Dingle, Microsoft
16:00 - 16:30

 

Privacy & Security in the Next Century

 

Consent vs. Consent Restrictions – Enabler or Stumbling Block for Businesses?

 

James Aschberger, One.Thing.Less AG
15:30 - 15:50

 

Panel:Customer Identities are Critical - How can Businesses Build Trust and a Privacy-Centric CIAM Strategy?

 

Mike Kiser, SailPoint
Mayur Upadhyaya, Akamai
15:50 - 16:10

 


Identity APIs is the New Black in CIAM

 

Ishara Karunarathna, WSO2
16:10 - 16:30

 

New Paradigm in ID Management II

 

tbd

 

Jelle Millenaar, IOTA Foundation

 

Panel: Product Digital Identity - Digital Twin for Assuring Compliance and Higher Engagement

 

Uwe Hennig, Avery Dennison
15:50 - 16:10

 

Best Practices I

 

Blockchain-anchored Identities and Credentials Enabling Digital Transformation in the Pharma

 

Marco Cuomo, Novartis
Daniel Fritz, Novartis
15:30 - 15:50

 

Building an Holistic Identity

 

Julian Wilson, Ecospend
15:50 - 16:10

 


The Journey to the Trust Over IP Stack

 

John Jordan, Province of British Columbia
16:10 - 16:30

 

 

16:30 - 17:00 Coffee & Networking
Room: EXPO AREA
17:00 - 18:00
Best Practices

 

Demystifying NISTIR 8112 – Why Organizations Need Attribute Context to Make Good Business Decisions

 

Bjorn Hjelm, Verizon
17:00 - 17:30

 

Transaction Tokens: Solving the External/Internal Authorization Problem

 

George Fletcher, Verizon Media Group
17:30 - 18:00

 

Self-determined Access and Data Control for your Customer

 

Managing and Propagating Consents for Optimal Business Processes Support

 

Markus Bauer, xdi360
17:00 - 17:20

 

Panel: Customers Expectation of CIAM - How to Serve Your Target Audience Right

 

James Aschberger, One.Thing.Less AG
17:20 - 17:40

 


How Customer Identity is Keeping your Organization Hostage - The true Cost of Legacy Customer Identity and How to set your Organization free

 

Hugo Löwinger, PwC Europe
17:40 - 18:00

 

Risks and Challanges

 

Secure Vehicle Data Exchanges and Federate Driver Identities With OpenID Connect (OIDc)

 

Fulup Ar Foll, IoT.bzh
17:00 - 17:20

 

When Good Bots Go Bad: Countering Exploits Using Non-Human Identities

 

Alex Weinert, Microsoft
17:20 - 17:40

 


Panel: IoT - Tractors, Bots and other Things and their Identification and Authentication and beyond

 

Dr. Angelika Steinacker, IBM Security Europe
Alex Weinert, Microsoft
Gerhard Zehethofer, ForgeRock
17:40 - 18:00

 

Best Practices II

 

Digital Trust and Digital Sovereignty in Mobility

 

Peter Busch, Robert Bosch Group
17:00 - 17:20

 

Building an Ecosystem of Trusted Credentials

 

Mike Brown, ATB Financial
17:20 - 17:40

 


A Digital Staff Passport for Doctors

 

Dr. Manreet Nijjar, NHS
17:40 - 18:00

 

 

18:00 - 18:30 Closing Keynote & Announcement of EIC 2020 Gamification Winners
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
Friday, May 15, 2020
08:30 - 10:00 Check-in & Registration
Room: COUNTER HOTEL
EIC Boot Camp 1
Moderator:
Alexei Balaganski, KuppingerCole
Christopher Schuetze, KuppingerCole
Mike Small, KuppingerCole
EIC Boot Camp 2
Moderator:
Paul Fisher, KuppingerCole
Richard Hill, KuppingerCole
Matthias Reinwarth, KuppingerCole
EIC Boot Camp 3
Moderator:
Anne Bailey, KuppingerCole
Martin Kuppinger, KuppingerCole
John Tolbert, KuppingerCole
Room: ALPSEE
Room: AMMERSEE I
Room: AMMERSEE II
09:00 - 12:30
Incident Response Boot Camp l

 

Incident Response Boot Camp: Are You Ready For When A Cyber Incident Occurs?

 

Alexei Balaganski, KuppingerCole
Christopher Schuetze, KuppingerCole
Mike Small, KuppingerCole

 

Privileged Access Management (PAM) Boot Camp l

 

Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise

 

Paul Fisher, KuppingerCole
Richard Hill, KuppingerCole
Matthias Reinwarth, KuppingerCole

 

Identity Fabrics Boot Camp l

 

Becoming Prepared for the Future of IAM: Supporting the Digital Transformation of Your Business

 

Anne Bailey, KuppingerCole
Martin Kuppinger, KuppingerCole
John Tolbert, KuppingerCole

 

12:30 - 13:30 Lunch Break
Room: RESTAURANT
13:30 - 16:00
Incident Response Boot Camp ll

 

Incident Response Boot Camp: Are You Ready For When A Cyber Incident Occurs?

 

Alexei Balaganski, KuppingerCole
Christopher Schuetze, KuppingerCole
Mike Small, KuppingerCole

 

Privileged Access Management (PAM) Boot Camp ll

 

Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise

 

Paul Fisher, KuppingerCole
Richard Hill, KuppingerCole
Matthias Reinwarth, KuppingerCole

 

Identity Fabrics Boot Camp ll

 

Becoming Prepared for the Future of IAM: Supporting the Digital Transformation of Your Business

 

Anne Bailey, KuppingerCole
Martin Kuppinger, KuppingerCole
John Tolbert, KuppingerCole

 

Keynote Speakers

Sami is a software industry veteran with over 20 years of experience from global sales, business development, and product management. Sami knows SSH well, having worked at SSH in executive positions in 1998-2002 and 2012-2015 both in Finland and the US. Sami has also served as an executive,...

Tim joined ForgeRock in February 2017, heading up the Telecoms & Media Industry practice globally. In 2019 he took over the helm running ForgeRock in the EMEA region. Tim has 30+ years experience working in technology orientated companies in a variety of senior management roles and...

Gerald  Beuchelt  as the Chief Information Security Officer at LogMeIn is responsible for the company’s  overall security, compliance, and technical privacy program.  With more than 20 years of experience working in information...

Heather C. Dahl is widely-respected as a thought leader in technology and media with over 25 years of strategic leadership experience in newsrooms, multinational corporations, and high-tech startups. Since becoming CEO in 2018, Heather has led the Sovrin Foundation through its most significant...

Gerald Horst joined PwC in 2016 as Partner and is leading PwC Europe’s Digital Identity team. Before joining PwC, Gerald held an executive position for over 15 years at Everett, a consulting and system integration firm specialized in IAM. Gerald is regarded as an authority on Consumer...

Berthold studied economics and computer science at the University of Nürnberg and graduated in 1988. Berthold had been with Deutsche Bank AG since 2002 where he performed in different roles: CIO for access channels or major IT Transformation, IT Strategy, Change Management and Governance...

As Director of Partnerships, Holger is working with corporate partners to support IOTAs integration into proof of concepts as well as full product developments. Before joining the IOTA Foundation in 2018, he worked as Senior Director at Siemens and Atos to manage several global service deliveries.

Kim works as a department manager at BEC a.m.b.a., a Danish, full-service IT house dating back to 1964. BEC has more than 50 years of experience in developing and operating IT systems for financial institutions operating in Denmark. Kim has more than 10 years of experience in management and...

Kurt Lieber is the CISO for Aetna, the Health Care Benefits division of CVS Health. In addition to his CISO responsibilities, he also has enterprise responsibility for Identity & Access Management, IT Hygiene and Third Party Risk Governance. Lieber has over 20 years of experience in...

Dr. Barbara Mandl is a FOSTER FORE Advisor  with a focus on topics related to the CISO role in large enterprises. Her previous role was Group CISO at Daimler until May 2017; She was also responsible for Global Identity and Access Management at Daimler and Security Architecture. Dr....

Henk Marsman is Lead Product Manager for Identity and Access Management at Rabobank, a top three bank in the Netherlands. He’s responsible for the cohesion and service orientation of the IAM services and works with the IAM product owners in Rabobank to materialize the vision and strategy....

Frank works as IAM architect at BEC a.m.b.a., a Danish company that specializes in IT development and operations for the banking sector in Denmark. Frank is responsible for the access management process, automation, helping the business embrace identity and access management as well as making...

Patrick Parker is the founder and CEO of EmpowerID and has over 20 years’ experience in identity management. With a research background in evolutionary biology and genetics, Mr. Parker applied scientific methods and principles to develop a novel role and attribute-based access control and...

Nat Sakimura is a well-known identity and privacy standardization architect and the Chairman of the OpenID Foundation. He is a co-author of many of the frequently used international standards such as OpenID Connect, JWT, JWS, OAuth PKCE, etc. He is currently editing ISO/IEC 29184 Guidelines for...

Location / Hotels

INFINITY BallhausForum

INFINITY BallhausForum

Andreas-Danzer-Weg 1 • 85716 Unterschleißheim, Munich • Germany
Phone: +49 (89) 370 530 0
Web: http://www.infinity-munich.de/en.html

Event Location

Hotels

INFINITY Munich Unterschleissheim

Andreas-Danzer-Weg 1 • 85716 Unterschleißheim • Deutschland
Phone: +49 89 3705300
Fax: +49 89 370530916
Web: http://www.infinity-munich.de/

 

A small number of rooms at the INFINITY Hotel is bookable via the following LINK (first come first served). 

If there are no more rooms available during your dates of travel,  please contact the INFINITY Hotel directly or choose another hotel from the list below.

Alternatively, you can reserve rooms at various nearby hotels via our partner HRS - Hotel Reservation Service.

Victor’s Residenz-Hotel München

Keplerstraße 14 • 85716 Unterschleißheim • Deutschland
Phone: +49 89 379794 100
E-Mail: info.cro@victors.de
Web: https://www.victors.de/de/hotels/muenchen/

 

Booking Keyword: EIC 2020
until April 4th, 2020

€ 99,00 in standard - single room including breakfast
€ 119,00 in standard - double room including breakfast

Hotel Alarun

Weihenstephaner Str. 2 • 85716 Unterschleissheim • Deutschland
Phone: +49 89 317 78 0
Fax: +49 89 317 78 178
E-Mail: hotel@alarun.de
Web: http://www.alarun.de

Hotel Olymp

Wielandstraße 3 • 85386 München-Eching • Deutschland
Phone: +49 (0)89 32 71 00
Fax: +49 (0)89 32 71 01 12
Web: https://www.olympmunich.com/

Platinum Sponsors

Broadcom’s Symantec Enterprise Division is the global leader in cyber security and is headquartered in the USA. The division helps organizations secure users’ identities and their information everywhere. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against and respond to sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both. Further, the former CA Technologies Identity Security business, previously acquired by Broadcom, is now part of Broadcom's Symantec Enterprise Division. 

EmpowerID is the award winning all-in-one Identity Management and Cloud Security platform designed for people. Globally managing millions of identities in diverse enterprises, EmpowerID offers user provisioning, Single Sign-On, access governance, and an industry leading user experience. Driven by sophisticated RBAC and Workflow engines, EmpowerID tailors visibility to fit the specific needs and technical skills of each stakeholder. It features shopping cart style access requests and self-service, secure delegation, process automation, powerful audit controls, and flexible reporting to enhance enterprise security and governance. It is built on a single codebase for performance and ease-of-use and it ships with a powerful API, a visual workflow designer and over 800 ready-to-use workflows. 

EY has been a global leader in cybersecurity, data protection, risk management and forensics for many years. More than 7,000 cyber professionals carry out risk assessments based on economic and geopolitical aspects in order to gain a realistic, comprehensive understanding of risks and enable targeted decision-making. We help our clients safeguard their business against cyber risks and unlock value through technological innovations.

IAM at EY is one of the pillars in cybersecurity. Starting with a comprehensive assessment EY helps our clients to optimize their existing IAM system to achieve a mature security level which is compliant and future-oriented as well as tailored to our customer’s needs.

EY Cyber: We help you to securely navigate the Transformative Age.

ForgeRock® is the Digital Identity Management company transforming the way organizations build trust and securely interact with customers, employees, devices, and things. Organizations adopt the ForgeRock Identity Platform™ as their digital identity system of record to monetize customer relationships, address stringent regulations for privacy and consent (GDPR, HIPAA, FCC privacy, etc.), and leverage the internet of things. ForgeRock serves hundreds of brands, including Morningstar, Vodafone, GEICO, TomTom, and Pearson, as well as governments such as Norway, New Zealand, and Belgium, among many others. Headquartered in San Francisco, California, ForgeRock has offices in Austin, London, Bristol, Grenoble, Munich, Paris, Oslo, Singapore, Sydney and Vancouver, Washington. ForgeRock is privately held, backed by leading global venture capital firms Accel Partners, Foundation Capital, Meritech Capital and KKR. For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media:

Facebook ForgeRock | Twitter @ForgeRock | LinkedIn ForgeRock |

ForgeRock (@ForgeRock)

Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security. 

LastPass by LogMeIn is an award-winning password manager helping millions organize and protect their online lives, at home and at work. For businesses of all sizes, LastPass provides secure password storage and centralized admin oversight to reduce the risk of data breaches and remove password obstacles for employees. With customizable policies, secure password sharing, and comprehensive user management, LastPass gives IT the tools to strengthen password hygiene across the organization. LogMeIn is one of the world’s top 10 public SaaS companies, and a market leader in communication & conferencing, identity & access, and customer engagement & support solutions, headquartered in Boston with offices in Munich, Karlsruhe, Dresden. www.lastpass.com

Microsoft believes in what people make possible. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. Did you know Microsoft spends over $1B in R&D on Security every year? With Enterprise Mobility + Security solutions, Microsoft has leveraged it’s investments to quickly become the market leader in protecting companies from the latest security challenges while enabling employees to remain productive on their favorite devices and applications. Over 56,000 companies have already partnered with Microsoft to implement an identity-driven security solution that offers protection without compromising productivity. 

One Identity, a Quest Software business, lets organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings including AD account lifecycle management, identity governance and administration and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data - on-prem, cloud or hybrid. For more information, visit.

PwC is the one of the largest providers of business, security and IT services in the world. Our clients include enterprises and foundations in all sectors and sizes.

Having more than 20 years real and relevant experience in IAM, we consider ourselves the leading IAM firm in Europe. With over 200 IAM consultants and engineers in Europe today, we provide best-in-class IAM services and solutions and support our clients from strategy to execution and quite new: also in operation.

Creating value for our clients, our people and the communities we live and work in is at the heart of PwC. Our common purpose is what binds us together – to build trust in society and solve important problems.

SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around
the world. SailPoint's open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint's customers are among the world's largest companies in a wide range of industries, including: 8 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 9 of the top 15 property and casualty insurance providers, and 5 of the top 13 pharmaceutical companies.

SSH.COM is one of the most trusted cyber security mavericks. We foster a culture of innovation and purpose-driven engineering to secure access to the digital core.

Since inventing the SSH protocol in 1995, we’ve been safeguarding the digital economy. 3000+ security-aware customers, ranging from “digital-borns” to the world´s largest banks & fortune 500 enterprises, trust our expertise.

Our product promise is built-on the principles of zero-inertia, zero-friction and zero-credential risk.

WSO2 provides the only completely integrated enterprise application platform for enabling a business to build and connect APIs, applications, Web services, iPaaS, PaaS, software as a service and legacy connections without having to write code; using big data and mobile; and fostering reuse through a social enterprise store. Only with WSO2 can enterprises use a family of governed secure solutions built on the same code base to extend their ecosystems across the cloud and on mobile devices. Hundreds of leading enterprises rely on WSO2’s award-winning, 100% open source platform for mission-critical applications. To learn more, visit http://wso2.com

Gold Sponsors

Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Atos SE (Societas Europaea) is a leader in digital services with pro forma annual revenue of circa € 12 billion and circa 100,000 employees in 72 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions.

Evidian is the Atos brand for Cyber-security software and provides the latest technology in IAM for access control and identity management solutions. DirX enriches the Evidian identity management portfolio, combining two powerful developments to one leading solution in the market.

Atos is focused on business technology that powers progress and helps organizations to create their firm of the future.

Auth0, a global leader in Identity-as-a-Service (IDaaS), provides thousands of customers in every market sector with the only identity solution they need for their web, mobile, IoT, and internal applications. Its extensible platform seamlessly authenticates and secures more than 2.5 billion logins per month, making it loved by developers and trusted by global enterprises. The company's U.S. headquarters in Bellevue, WA, and additional offices in Buenos Aires, London, Tokyo, and Sydney, support its global customers that are located in 70+ countries.

iC Consult is a leading vendor-independent system integrator for global enterprises specializing in Identity and Access Management solutions. Members of the iC Consult Group are xdi360, IAM Worx, and, as of 2013, iC Consult Americas. With its branches in Germany, Austria, Switzerland, and the US, iC Consult is actively engaged in international projects for Identity and Access Management, Identity Access Governance, Consumer Identity, Social Media and Mobile Login, Internet of Things, Customer Data Management, and IAM Managed Services.
We provide technology consulting, product selection assistance, profitability examination, design and integration of partial and complete solutions, as well as project management and project planning. 

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 7,400 organizations, including Bertelsmann, Merz Pharma, 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to help protect the identities of their workforces and customers. www.okta.com

Omada is a market-leading provider of IT security solutions and services for identity management and access governance enabling organizations worldwide to achieve compliance, reduce risk exposure, and maximize efficiency. Acclaimed for its business-centric approach and high configurability, Omada’s solution empowers enterprises to manage identities across complex IT-systems and applications.

Established in 2000, Omada has operations in North America and Europe, delivering solutions directly and via a network of skilled partners and system integrators. Omada’s customer portfolio includes large, global enterprises such as BMW Group, Bayer, A.P Moller Maersk, Altria (Phillip Morris), UniCredit, Vattenfall, Danisco-Dupont Group, Novozymes, Jyske Bank, and ECCO Shoes. 

Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with MFA, SSO, access management, intelligent API security, directory and data governance capabilities. 

PlainID provides both Business AND Admin teams with a simple and intuitive means to control their organization’s entire authorization and access control process. The platform allows you to implement literally any kind of rules you could imagine, all without coding, and all in fine grained detail. PlainID simplifies Authorization so that thousands of Roles, Attributes and even Environmental Factors can be converted into a few logical SmartAuthorization policies using our Graph Database Decision Engine. We offer the first policy based access control (PBAC) solution that simplifies Authorization to one point of decision, one point of control and one point of view across your cloud, mobile and legacy applications. 

RSA® Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change. For more information, visit rsa.com. 

Access Governance and Intelligence for Cloud and Enterprise Applications

Saviynt offers Access Governance and Intelligence solutions for Cloud, Enterprise Applications and Big Data Platforms. Saviynt combines traditional access governance features with advanced usage analytics, data access governance and compliance controls to secure organization’s critical assets.

Saviynt helps organizations extend IAM processes seamlessly to Cloud and provide the ability to request access to fine-grained business processes and transactions. The innovative product portfolio also offers the ability to identify sensitive data, enforce controls to detect and prevent data loss, privileged access governance, user behavior analytics among many other advanced features. 

The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia. For more information, please visit https://thycotic.com

A software company providing cybersecurity solutions, WALLIX Group is a European specialist in privileged account governance. In response to recent regulatory change (NIS/GDPR in Europe and OVIs in France) and the cybersecurity threats affecting all companies today, the Bastion helps users protect their critical IT assets: data, servers, terminals and connected objects. It is the first market solution to have been awarded first-level security certification (CSPN) by France’s National Cybersecurity Agency (ANSSI) and thus meet all of the criteria for regulatory compliance. WALLIX accompanies more than 770 companies and organizations on a day-to-day basis. Its solutions are marketed through a network of more than 160 resellers and trained and accredited integrators. 

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers. Yubico is a leading contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries. 

Silver Sponsors

We are Duo, and we’re here to democratize security. We were born from a hacker ethos and a desire to make the Internet a secure place. Our mission is to protect the mission of our customers by making security simple for everyone. Our team is our secret weapon. We’re a diverse crew of makers and builders, skaters and coders, filmmakers and DJ’s, teachers and students brought together by a shared belief in adding value to the world. That diversity allows us to bring an empathetic approach to solve some of the most complex global business and security challenges faced today. Our roots and values were forged in the Midwest. We believe in enabling and empowering people to follow their passion, inside and outside of the office. Change is a constant we anticipate and embrace. These are some of the things that make us unique and drive our team to be the most loved company in security. Duo is now a part of Cisco.

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford.
From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
ManageEngine operates through it's authorised partner, Micronova, in Germany.
Visit us at www.manageengine.de

Nixu is a cybersecurity services company on a mission to keep the digital society running. Our passion is to help organizations embrace digitalization securely. Partnering with our clients we provide practical solutions for ensuring business continuity, an easy access to digital services and data protection. With Nordic roots, but based in four continents, we serve enterprise clients worldwide.

We believe that customer data collection is in the core of the digital services and the whole digital platform economy. It provides great competitive advantage, but creates concerns with privacy and security. Systems that process data must be reliable, so that business continuity can be ensured during and after the digital transformation. 

Onegini enables a digital transformation by getting your customers online, knowing who the customer is and engaging with them in a meaningful way. Our award-winning CIAM & Mobile Security Platform provides organisations with an easy way to deliver mobile apps and web single sign-on, with the best end-user experience and high security for external users. Onegini protects your customer personal data and enables secure transactions, using any device any time. The Onegini team consists of security specialists whose job it is to identify new threats in the mobile space and translate them into state-of-the-art mobile app protection. Onegini already protects data for millions of end users in the banking, insurance and transport markets and has customers around the world. 

The co-founders of Tuebora in their past lives were key employees at Aveksa, a pioneer in the IAM space (recently acquired by RSA). Sanjay Nadimpalli was the Director of Engineering; Prasad Bhamidipati was the Product Architect and Ashish Jhunjhunwala was the primary developer of the Access Certification module at Aveksa. They not only shaped and built a pioneering IAM platform, but also got to work directly with many customers of all sizes and in all verticals.

Our experiences with current customers with IAM products tell us that employees, HR, the IT Help Deck and CIOs are all frustrated with products that don’t help them fix practices and processes. They know these tools aren’t as efficient as they could be. Security teams know that identity is the new perimeter and identity theft and misuse are a major attack vector.

We started Tuebora knowing that automating the granting of access was only the first step toward the real solution to IAM frustrations. Through the application of machine learning, there is much more that can be done to help organizations use IAM to gain competitive advantage through efficiency, productivity and risk reduction.

Tuebora is Latin for “I will defend" and also the motto on the coat of arms of Michigan.

Innovation Sponsors

Illusive Networks stops cyberattacks by destroying attackers’ ability to make decisions as they move toward their targets. Illusive’s simple, agentless solutions eliminate high-risk pathways to critical systems, detect attackers early, and capture real-time forensics to minimize incident impact so that organizations can function with greater confidence and cyber agility.

iProov uses biometrics to authenticate users online. Our approach combines market-leading usability with national-grade security - delivering an intuitive solution that is resistant to all known forms of identity spoof attack. iProov delivers ‘genuine presence’, defending against both Presentation and Replay attacks to ensure that an online user is the right person, a real person and is transacting right now. iProov’s products are used in production by governments and banks worldwide.

Symphonic is a provider of market leading Identity and Access Management. software, specialising in providing intelligence in the authorisation process across a range of different industries. Symphonic addresses a significant issue in today's connected world, ensuring.

Validated ID was created in 2012 by several enthusiasts from the world of digital ID and electronic signatures. We were never a start-up as such. Between us all we had over 50 years’ experience within the field of ID and signature systems. We knew exactly what we wanted to achieve and where we were starting from. We had worked on countless authentication and signature projects, often complicated in nature, and as a result got to work in deploying services that put simplicity first, whilst maintaining the highest levels of technical and legal security. A clear business plan was drawn up, not merely for a product, but for a service. This, naturally, was challenging in itself.

With the above objectives laid down, we drew upon our years of experience in different areas: cryptography, digital certification, biometry, provision of high availability services, cloud computing, mobility and legal services. We put them all into a cocktail shaker and what was created was what continues to be our star service: VIDsigner Bio. This handwritten electronic signature service is easy to use, easy to integrate and incredibly robust legally.

Over time, new services have been added to VIDsigner that also strive to fulfill the same objectives: VIDsigner Mobile, VIDsigner DNIe, VIDstamp, VIDdelivery y Docusign (vía partnership).

Thanks to the knowledge and efforts of our founders, to date, since 2012, we have successfully maintained growth typical of a bootstrap, improving turnover and consolidating the company.

We have achieved recognition in the market and gathered both a partner and client base that provide us with stability and the drive to continue growing.

We are currently focusing our efforts on the creation of a new ID and signature system applicable to contracts. This system will incorporate various technologies and aim to make life easier for both buyers and sellers. We want to revolutionize the market with something completely new and make it available universally.

Badge Sponsor

WedaCon GmbH was founded in 2001 with a clear mission in mind: Helping our customers to manage their identities in increasing numbers of directories and data islands.

Today, we are an established strategic partner for medium and enterprise-sized organizations, offering outstanding services in the IAM/IAG World.

As a System Integrator, we offer the complete portfolio on IAM/IAG Program handling, including Process Development, Program Management, Technical Design, Implementation and Operation.

Our YIAM Productline brings back transparency into IAM/IAG Processes, and can serve as a general purpose User Interface to any available IAM Management System. Its Shop-Style handling makes it easy to use and allows operators to standardize common tasks based on their requirements.

Happy Hour Sponsor

Akamai secures and delivers digital experiences for the world’s largest brands. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers can be fast, smart, and secure. Identity Cloud is Akamai’s cloud-native CIAM solution that enables scalable registration, authentication, and identity management for leading consumer brands. Learn more: www.akamai.com/identitycloud

Association Sponsors

Where can an identity and access management practitioner turn for advice? How can organizations grow new identity practitioners? How can the identity and access management industry grow in executive mindshare, market size, and equality? The answer is a professional organization for identity management.

What does such an organization look like? It is an organization whose mission is to be the tide that lifts all boats. A place for professionals to learn how to make their programs and projects more successful. A place for professionals to learn how to grow their own careers. A place for professionals to learn how to work with their peers from security, privacy, and lines of business. An independent voice that extols the value of identity management as a partner and equal to both security and privacy as well as a crucial partner for customer delight with our lines-of-business.

IDPro is that organization.

Kantara (kan-TAR-a): Swahili for "bridge"; Arabic roots in "harmony"

Kantara Initiative: Bridging and harmonizing the identity community with actions that will help ensure secure, identity-based, online interactions while preventing misuse of personal information so that networks will become privacy protecting and more natively trustworthy environments

The OpenID Foundation (OIDF) was formed in June 2007 to help promote, protect and enable the OpenID technologies and community. This entails managing intellectual property, brand marks as well as fostering viral growth and global participation in the proliferation of OpenID. The OIDF does not dictate the technical direction of OpenID; instead it will help enable and protect whatever is created by the community.

If you (or your organization) would like to help OpenID make the Internet a better place, become involved and join the Foundation.

An open forum for women in identity to bounce ideas off each other, collaborate, and gain support. It is our hope that this page will be the beginning steps to provide mentorship, bounce ideas off each other, and push each other to gain the confidence to speak at conferences. The idea is be more visible in the identity community with a whole community of women backing you.

Our Vision
Women in Identity exists to foster new relationships and mentorship between women in our technical field and beyond. We will work towards a world where women already in identity are increasingly visible parts of the community and where women not yet in Identity can join easily and find support and growth. This community will work together to foster the skills, connections, inspiration and community needed to enter this field and to be recognized as a top contributor.

Our Mission
To enable growth for women working in the Identity space. Our community will foster new relationships, create a place for collaboration, and inspire individual advancement with an army of other women supporting you.

Morning Run Sponsor

Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with MFA, SSO, access management, intelligent API security, directory and data governance capabilities. 

Floorminder Sponsor

RSA® Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change. For more information, visit rsa.com. 

Media Partners

CIO Applications Europe has fast culminated into the most sought after magazine Pan-Europe as it has transformed its course hand-in-hand with the technology and has culminated into a leading media brand, with a unique editorial focus on bringing to light the core innovations in technology. CIO Applications Europe magazine stands out with its unique approach of learning from peers approach offering professionals the most comprehensive collection of technology trends. The magazine is the single most successful initiative Pan-Europe to advice and guide decision-makers regarding the latest in the fast-evolving technology landscape. We are determined to propose a myriad of additional services that can improve businesses and help customers deal with issues related to this industry.

Transforming news into insights, not only do we serve as a source of information but as the breeding ground for innovative ideas and exchange of breath-taking strategies that can make a difference in your technological understanding. We bring forth an enhanced, clever and a comprehensive platform which can assist the information seekers a filtered view of what they are searching. Our technology magazine is spearheading a revolution to provide knowledgeable articles written in simple yet lucid language that can give an insight into the latest in the world of technology.


Munich, Germany

Congress

European Identity & Cloud Conference 2020

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 12 - 15, 2020 Munich, Germany

Popular Webcasts

Next Webinar

Webinar

Redefining IAM: Harnessing AI to Identify Risk at the Speed of Change

In an increasingly complex and rapidly changing business, IT and regulatory environment, traditional approaches to identity governance must evolve to keep up with the rate of change. Given the dynamic nature of today’s business, managing entitlements and conducting access reviews have become particularly challenging, for example.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00