Rosenheimer Platz 4 • 81669 München
Phone: +49 89 29 03 60
Fax: +49 89 29 03 68 10 8
Deloitte provides audit, tax, consulting and financial advisory services for companies and institutions of all sectors. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte has in the region of 200,000 professionals, all committed to becoming the standard of excellence.
In the service area Cyber Risk we offer our clients outstanding services through the combination of professional competence with regulatory knowledge and technical expertise. Cyber Risk Services cover the complete lifecycle – including the comprehensive Identity & Access Management advisory and implementation portfolio, as well as services around Cyber Readiness, Threat Intelligence, Security Operations and Incident Management. Our clients benefit from the award-winning industry and implementation experience of our consultants.
|May 13 ‑ May 16, 2014||
European Identity & Cloud Conference 2014
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]