Making your Identity Management & Cybersecurity fit for the Age of Digital

  •  TYPE: Track   DATES: May 11 - May 12, 2016
Conference Tracks

The ability to innovate fast and to profoundly disrupt old school business models has become more essential than ever. EIC 16 will help you to transform security concerns into strategic advantages through digital risk management with future-proof choice of mitigation options. Prioritize your security programs in a way that gives a robust answer to the increasingly complex threat landscape, where identity is the glue, and on which types of tools to focus on when mitigating digital risks.

Moderators:

Tracks:

Managing the Risk of Digital Transformation

Sessions:

Are you Ready? Effectively Managing the Digital Business Risks.

Date: Wednesday, May 11, 2016 Time: 11:00-12:00 Location: ALPSEE

Are you Ready? Effectively Managing the Digital Business Risks.

Best Practice - Cyber Security and Risk Management in Digital Transformation
Enterprise pursuits over Digital Transformation journey Green field & Brown field transformation scenarios Benefits & Pitfalls an enterprise must scan for Cyber security – prescriptions during concept/evolution/execution & sustain stage Major threats/outbreaks one must keep into account for across this context Risk management and their applicability Cyber security and risk management governing factors throughout the journey People, Process &...

Information Security & Risk Management in the Energy Industry of Ecuador

Date: Wednesday, May 11, 2016 Time: 12:00-13:00 Location: ALPSEE

Information Security & Risk Management in the Energy Industry of Ecuador
In this talk I will present the case on how the the National Electrical Corporation of Ecuador, the main actor of the energy industry in Ecuador, has created, implemented and operates its risk management strategy and its impacts to the country. Starting from the proposal of an Information Security Strategic Plan, risk management has come a long way inside our organization. I will show how we implemented our risk assessment and mitigation methodology, and how we integrated it to change...

Innovative Security through Managed Risk in the Electric Industry
This presentation will discuss how to implement innovative security through the Risk Management process in the Electric Industry. Recent research into recent security breaches points to the lack of relationship between cybersecurity and Risk Management at the organizational executive level. Security Issues at the executive level are best presented in terms of risk to the business rather than FUD (Fear, Uncertainty, and Doubt). This presentation will give an example of how organizations...

Cyber Security Leadership

Sessions:

Get used to it: Your Security is Breakable!

Date: Wednesday, May 11, 2016 Time: 14:30-15:30 Location: ALPSEE

Get used to it: Your Security is Breakable!
Zero day exploits, APTs, social engineering, insufficiently patched systems, insiders, human errors or simply headless clicking users enable attackers equipped with enough time, resources and/or dedication to succeed in circumventing the preventive security measures that are in place. This leads to the assumption that, despite all state-of-the-art defense mechanisms , it is still possible to break into the corporate network (=breakable security). Even though there is no silver bullet...

Security vs Collaboration in the “WWW”: True IAM Stories
Call it "World Wide Web", "Wild Wild West" or "World War Web", the "CyberSpace" cannot be used for any professional collaboration without additional security. In the complexity of the Aerospace and Defence (A&D) Extended Enterprise world where thousands of companies are collaborating together to build "best of class" planes, satellites, helicopters and other A&D products, most of all information exchange rely on the usage of Internet. The Aerospace and Defense sector has been...

Managing Risk in the Age of Digital: The New Role of the CISO

Date: Wednesday, May 11, 2016 Time: 15:30-16:30 Location: ALPSEE

Managing Risk in the Age of Digital: The New Role of the CISO
Bringing Business, Innovation and Information Security to support an agile organization moving at the forefront, together with the connected consumer. Is this an appropriate description of what a CISO´s role is in the age of Digital Disruption? Or should it still be a more protective role, responding to a cyberthreat landscape with increasing complexity? In this panel, CISOs from different industries, tightly regulated ones like finance, but as well from less...

Secure the Human Factor - Mitigate the Risk, Reduce the Attack Surface and Liability Exposure

Date: Wednesday, May 11, 2016 Time: 17:30-18:30 Location: ALPSEE

Secure the Human Factor - Mitigate the Risk, Reduce the Attack Surface and Liability Exposure
Numerous advances in technology, specifically in the area of cryptography, telecommunications and computer security have failed to produce safer environments and do not offer adequate protection for information. The number, frequency and magnitude of information security breaches across the globe are on the rise as do the financial costs associated. It is safe to say that information security has never been a purely technical problem; it has become quite clear that technical solutions alone...

Human Hacking – The Psychology behind Phishing Attacks
After 20 years of Phishing history, companies still identify the human factor as the weakest link in their defense strategy. The human hackers have spent great efforts to bring their skills to perfection, so why aren't we? Current Security Awareness Programs may satisfy compliance requirements, but when it comes to spear-phishing attacks they are far away from being a silver-bullet. In this speech you're going to experience the human OS vulnerabilities and learn how to exploit...

Privacy by Design

Sessions:

Post Safe Harbor & the Business Implications of the EU-U.S. Privacy Shield

Date: Thursday, May 12, 2016 Time: 11:00-12:00 Location: ALPSEE

Post Safe Harbor & the Business Implications of the EU-U.S. Privacy Shield
The new General Data Protection Regulation coming into force in June 2018 extends the scope of the EU data protection law to foreign companies processing data of EU residents. It provides for a harmonization of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations; however, this comes at the cost of a strict data protection compliance regime with severe penalties of up to 2% of worldwide turnover. As the new...

Pre-General Data Protection Regulation: How to Comply
The new General Data Protection Regulation coming into force in June 2018 extends the scope of the EU data protection law to foreign companies processing data of EU residents. It provides for a harmonization of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations; however, this comes at the cost of a strict data protection compliance regime with severe penalties of up to 2% of worldwide turnover. As the new...

The Need to Destroy in the Era of Populous Data and Cloud

Date: Thursday, May 12, 2016 Time: 12:00-13:00 Location: ALPSEE

The Need to Destroy in the Era of Populous Data and Cloud
What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel will explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators. Is it universally deleted from all servers, and backups or is the end user’s access to the data simply severed leaving data...

Successfully Securing Business Transformation

Sessions:

From On-Premise to Cloud and Big Data: Safeguarding Security and Governance for Today's and Tomorrow's SAP Environments

Date: Thursday, May 12, 2016 Time: 14:30-15:30 Location: ALPSEE

From On-Premise to Cloud and Big Data: Safeguarding Security and Governance for Today's and Tomorrow's SAP Environments
Achieving and maintaining an appropriate level of security and governance for their SAP system is an essential task for many organizations. While the overall SAP system landscape is changing and expanding dramatically with new solutions based on HANA technology and leveraging new deployment models in the cloud arriving at many of their customers, at the same time traditional SAP systems continue to be the foundation for essential core business processes. While the first thing coming to...

Cyber Threat Intelligence: A New Security Dimension: Industry Experience Using Open Standards to Accelerate Threat Response

Date: Thursday, May 12, 2016 Time: 15:30-16:30 Location: ALPSEE

Cyber Threat Intelligence: A New Security Dimension: Industry Experience Using Open Standards to Accelerate Threat Response
As we’ve heard, it is becoming increasingly necessary for a broad range of organizations to have a cyber threat intelligence capability. A key component of success for any such capability is information sharing opportunities with the partners, peers and others they elect to trust. Voluntary information sharing can help focus and prioritize the use of the immense volumes of complex cyber security information available to organizations today. Standardized, structured representations of...

Best Practice for API Security linked to IAM Technologies in Digital Business

Date: Thursday, May 12, 2016 Time: 17:00-18:00 Location: ALPSEE

Best Practice for API Security linked to IAM Technologies in Digital Business
Digital Transformation is building the foundation for entirely new business models within existing organisations, as well as giving rise to entirely new businesses. There could be a 100 billion connected devices by 2025, leading towards a trillion sensors ecosystem. In a hyper-connected era of mobile, social, cloud, big data, and the Internet of Things, future business models will depend on the availability of more data flowing beyond domains and through more systems, being accessed and used...

Open Banking: OpenID Foundation Financial API
Nat Sakimura and Tony Nadalin are proposing a OpenID Foundation Financial API Work Group. The WG will take into account open banking initiatives in the US via the FS-ISAC, in the UK via the Open Data Institute's Open Banking Work Group, etc.

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 - 13, 2016 Munich, Germany

Partners

The European Identity & Cloud Conference 2016 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00