Identity & Access Management / Governance

  •  TYPE: Track   DATES: May 06 - May 07, 2015
Conference Tracks

Identity & Access Management (IAM) today first and foremost is an organizational challenge and is in need for a leadership that understands the governance approach to meet the challenges of digital risk. But after all, IAM/IAG also remains to be a technological challenge. This track will help IAM/IAG professionals, security experts and project managers assess their current improvement needs and prepare for the digital transformation, where employee IAM will only be the smallest part of the game.

Moderators:

Tracks:

The Future of Identity & Access Management

Sessions:

What are the Requirements for your Future IAM to Enable Digital Security?

Date: Wednesday, May 06, 2015 Time: 11:00-12:00 Location: AMMERSEE I

What are the Requirements for your Future IAM to Enable Digital Security?
When it comes to security for the digital enterprise, we have good reason to get nervous, understanding current breaches like Sony as the first signs of a dark future, where cyber criminals and even terrorists lurk and create serious damage. In this session, Martin Kuppinger will first define, what "digital security" means, what the real risks are that need to be faced and mediated, and which roles IAM will play in this context.  

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Understanding the criticality of IAM infrastructure (delivered as software or as a service) and securing the service and its lifecycle.

The Role of IAM in Hack Prevention
As witnessed by a seemingly non-stop onslaught of public breaches of prominent organizations (Sony, Anthem, Target, etc.), it appears that the gloves have come off in the battle being waged in cyberspace. Nations have become heavily involved in industrial hacking for the purpose of enriching their government-owned enterprises. Hacktivists are out in force to publicly expose and shame corporations for perceived public wrongs. Unfortunately, Enterprise IT is caught in the middle and must...

No Person is an Island: How Relationships Make the IT World More Manageable

Date: Wednesday, May 06, 2015 Time: 12:00-13:00 Location: AMMERSEE I

No Person is an Island: How Relationships Make the IT World More Manageable

The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
Everyone knows someone who is dealing with the aftermath of a failed IAM project and as a result, everyone knows someone struggling to move forward with the next phase of IAM. As a result, identity experts are struggling to overcome their organizations’ fear of commitment to IAM. In this session, we’ll share strategies for re-engaging with the business on its terms to enable you to secure funding for your project, protect the business, and add value to the organization.

The Future of Identity & Access Management

Sessions:

Identity @ The Guardian - SSO at Web Scale

Date: Wednesday, May 06, 2015 Time: 14:30-15:30 Location: AMMERSEE I

Identity @ The Guardian - SSO at Web Scale
The Guardian’s web and mobile application usage rates are experiencing explosive growth.  This growth is driven by an increased consumption of news online.  Today’s users have high expectations in terms of usability, security and performance.  This session aims to highlight the challenges that Identity faces and will discuss the technology that can be used to keep pace in this fast moving development environment. Topics covered will be: Cloud technology...

Rethinking Digital Identity: The Australian Government Story
The Australian Government’s coordinated approach to digital identity started in the business-to-government domain, with the creation of a whole-of-government credential (AUSkey) and trust broker (VANguard) in 2007. A separate process occurred in the citizen-to-government domain (myGov) in 2013. This case study examines the policy decisions leading to the creation of these systems, and the technical challenges and compromises that followed. This includes the decision to use digital...

The Death of the Password - Is It Finally Coming True?

Date: Wednesday, May 06, 2015 Time: 15:30-16:30 Location: AMMERSEE I

The Death of the Password - Is It Finally Coming True?
"Death of the Password" announcements have been around for a decade or more, but none of them have come true. The FIDO Alliance (Fast Identity Online), founded in 2012, with a member list reading like the Internet Who-isWho, has been gaining so mcuch traction with its proposed standard security protocol, that this time chances are great that the password based authentication will be killed. In this session we will talk about the concept behind the FIDO protocol and understand the...

Privilege Management Use Cases

Date: Wednesday, May 06, 2015 Time: 17:30-18:30 Location: AMMERSEE I

Privilege Management Use Cases
In this session,we will walk through major use cases for Privilege Management. Which are the most common use cases, what to look at in particular and which specific features to stress-test in a PoC?

The Snowden Effect: Why seeing is believing
We pride ourselves on being proactive in dealing with external threats to our data. But why is our approach to the insider threat so much more reactive and forensic? Have we considered that being able to actively monitor and take action where privileged users behaviour is identified as risky might help us prevent this kind of data loss? Thinking beyond log management to identify behaviour. Key Takeaways: Understanding the benefits of real-time monitoring. Considering which parts...

Redefining Access Governance

Sessions:

One-Click Insight, Lean Recertification, Improved Compliance: Redefining Access Governance for the Digital Business

Date: Thursday, May 07, 2015 Time: 11:00-12:00 Location: AMMERSEE I

One-Click Insight, Lean Recertification, Improved Compliance: Redefining Access Governance for the Digital Business
Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact on your infrastructure.  In his opening notes for the Access Governance Track, Matthias Reinwarth...

Externalized Access Management (ABAC, RBAC) at Talanx Systeme AG for Bancassurance
Beginning from the architectural impact of authorisation as a cross-sectional function in the system environment of an insurance service stack, role based access control (RBAC) and attribute based access control (ABAC) will be introduced. After these preliminary considerations it will be shown by means of the case study of the Talanx Bancassurance that both models co-exist efficiently and seamlessly by using a standard authorization tool.

IAM Processes and their Communication Loops
Need of basic business demands – providing IAM solution - establish fundamental operation – guidance, support and communication. To ensure the implementation of these chain within an global organization and to fulfill or exceed the expectations of our customers, regarding quality, service level and usability is a challenging and fascinating job. In this session the principles based on examples will be presented how IAM processes and their communication loops are established...

Roles or no Roles, that’s the Question. Two Different Approaches for Compliant IAM Processes.

Date: Thursday, May 07, 2015 Time: 12:00-13:00 Location: AMMERSEE I

Roles or no Roles, that’s the Question. Two Different Approaches for Compliant IAM Processes.
In this session, Matthias Reinwarth and Horst Walther will present the KuppingerCole standard IAM process models in two variants. One uses roles for implementing a consistent, comprehensive approach. However, there are various situations where deployment of complete role models is not feasible. For these situations, KuppingerCole has developed a lean model that works without roles, but allows organizations streamlining and standardizing their IAM processes anyway and meeting essential...

RBAC & ABAC Hybrid Approaches
Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access Control), Dynamic Authorization Management (DAM) and standards such as XACML. Other terms such as RiskBAC (Risk Based Access Control) have been introduced more recently. Quite frequently, there has been a debate between RBAC and ABAC, as to whether attributes should or must replace roles. However, most RBAC approaches in practice rely on...

Redefining Access Governance

Sessions:

Adaptive Policy-Based Access Management: Beyond ABAC and RBAC

Date: Thursday, May 07, 2015 Time: 14:30-15:30 Location: AMMERSEE I

Adaptive Policy-Based Access Management: Beyond ABAC and RBAC
Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access Control), Dynamic Authorization Management (DAM) and standards such as XACML. Other terms such as RiskBAC (Risk Based Access Control) have been introduced more recently. In particular, a frequent discussion has been going on between RBAC and ABAC enthusiasts, as to whether attributes should or must replace roles. However, most RBAC...

The Future of Authorization
In this panel, the participants will look at where authorization is today and where it should be in an ideal world. They will discuss the trends and evolution in that area, such as the growing relevance of OpenAZ. They will discuss whether there are gaps in standards and technology that must be addressed. They will discuss how to solve the challenge, that the vast majority of applications is not ready for APAM (Adaptive Policy-Based Access Management). They will provide hints on how to solve...

IAM/IAG @ Continental AG: Clearing Process as a Basis for Identity Management

Date: Thursday, May 07, 2015 Time: 15:30-16:30 Location: AMMERSEE I

IAM/IAG @ Continental AG: Clearing Process as a Basis for Identity Management
The history of Continental consists of many mergers and aquisitions which lead to a very heterogeneous environment concerning accounts and account processes. Continental designed a special clearing process to securely map the HR data and account data of each employee and create the digital identity. As a next step the identity lifecycle processes will be defined and implemented.

Identity Relationship and Access Management and Dynamic Authorisation Management as a Driver for New Business Opportunities
If you can externalise authorisation management away from the application you will simplify online application development considerably. If you can externalise authorisation and identity management to your customer you can achieve considerable cost savings through self-service functions. If you put your customer in control of their identity data, and link your Identity Relationship and Access Management (IRAM) solution to your CRM, you can automate registration processes and invite customers...

Access Intelligence, User Activity Monitoring, Recertification: What do we Really Need?

Date: Thursday, May 07, 2015 Time: 17:00-18:00 Location: AMMERSEE I

Access Intelligence, User Activity Monitoring, Recertification: What do we Really Need?
Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact on your infrastructure.  This panel will discuss which approaches on redefining and extending...


Stay Connected


Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Partners

The European Identity & Cloud Conference 2015 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00