The “Homework Track”: Get Your IAM Ready for the Age of Digital Transformation

  •  TYPE: Track   DATES: May 11 - May 12, 2016
Conference Tracks

Cloud, Mobile, Social Computing and the Internet of Things and Industry 4.0 have a profound impact on IAM processes and technology, as they shift your focus from employees to external communities like customers, partners, dealers, and billions of things. On the other hand, most organizations still have a lot of homework to do for implementing and improving their fundamental infrastructures. This track explores the key concept for a future-aware IAM architecture with topics like access governance, realtime analytics, proofing, authorization, authentication, API security and privileged identities and explains how to find the balance between short-term delivery and long-term sustainability.

Some of the topics:

  • The Future Role of IAM
  • Roles, Recertification & Next Generation Access Governance
  • Authentication, Authorization & API Security

Moderators:

Tracks:

Digital Transformation & The Identity Challenge

Sessions:

Leading the Information Security Transformation

Date: Wednesday, May 11, 2016 Time: 11:00-12:00 Location: AMMERSEE I

Leading the Information Security Transformation
Information Security is not what it used to be anymore. The days where Information Security and IT Security were used as synonyms are past for long. Information Security has increasingly made its move to the business departments, with Information Security officers looking far more at Information Governance than at technical measures for securing information, even while they request technical measures from the IT departments. This is not the only fundamental change we observe. Business IT...

Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem
As the industry designs and deploy highly interconnected, autonomous and data-centric services, enterprises and government agencies worldwide must strike a delicate balance between the obligations of security and privacy with the continued drive towards agile, business–oriented and interconnected systems. In order to maintain that balance, we must put identity at the center of the IT ecosystem. By putting IAM at the center brings more identity awareness to operational and...

Trends & Innovation Panel: What Are the Most Important Innovations and Who Are the Innovators?

Date: Wednesday, May 11, 2016 Time: 12:00-13:00 Location: AMMERSEE I

Trends & Innovation Panel: What Are the Most Important Innovations and Who Are the Innovators?
Keeping track with what are the relevant trends, being able to find those (few) innovations which actually solve existing problems or create new opportunities is not so easy in these days. Yes, it is the job of KuppingerCole and all other analyst firms to find these innovators, name them and help them entering the market. But why shouldn´t we widen this perspective and ask those who have also been dealing with innovation throughout their professional career: vendors. The idea of...

The Future Role of IAM

Sessions:

How does Digital Transformation affect IDM?

Date: Wednesday, May 11, 2016 Time: 14:30-15:30 Location: AMMERSEE I

How does Digital Transformation affect IDM?
This session will take a closer look at digital transformation and IDM. First we will try to find a suitable definition for digital transformation. Then we will discuss how digital transformation affects IDM in general, to then introduce a case-study on IDM, partner and cloud-business. We will touch a simple model for cloud-business and take a look on some legal aspects. We will expand the classical IDM: first to cloud-usage, then to cloud-offerings. The second case-study will...

IAM Requirements and Trends in a Dynamic and Regulated Environment

Date: Wednesday, May 11, 2016 Time: 15:30-16:30 Location: AMMERSEE I

IAM Requirements and Trends in a Dynamic and Regulated Environment
On the one hand, cybercrime threats are growing at a fast pace and regulators are raising the requirements for IAM processes and procedures higher and higher. On the other hand, new competitors and new technologies are pushing banks to be more agile and to adopt faster, either using self-developed applications, solution providers, or cloud services. So, how can an online bank cope with these issues? What are some possible strategies to be compliant and agile with your IAM solution? In...

IAM Automation at Henkel: Identity Lifecycle Management
At the end of 2014, Henkel launched the AIM4 Future program to simplify and optimize the Identity & Access Management process and architecture landscape. One of the major targets is to automate the standard User Lifecycle process as much as possible with an end to end process view over IT, Security, HR and Financial processes, e.g. starting with HR recruitment and ending with IT workplace onboarding at day1 of an employee. Beside the technical challenges to exchange 5 tailor made...

Identity & Access Management in the Digital Age - Results of a recent Study

Date: Wednesday, May 11, 2016 Time: 17:30-18:30 Location: AMMERSEE I

Identity & Access Management in the Digital Age - Results of a recent Study
PAC and Kuppinger Cole recently conducted a survey based study on European businesses to gain insight into how digital transformation is reshaping IAM policies, procurement and deployment as well as risk and compliance policies. The top line findings of this brand new and important research will be presented in this session. What we will discuss: How the role of IAM is evolving within European businesses from ensuring compliance to managing risk and enabling new services...

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?
When talking with customers, many of these indicate that they need to simplify their IAM. Processes are cumbersome, users have to deal with various non-integrated user interfaces, and frequently organizations have a number of tools in place. However, what is the right place to start? From the user perspective, it is about the UI. From a process perspective, it might be about integration. However, you still might end up with a zoo of different IAM, IT Service Management, Windows...

Authentication & Authorization

Sessions:

The Future of Authentication - Stop Sweating the Password

Date: Thursday, May 12, 2016 Time: 11:00-12:00 Location: AMMERSEE I

The Future of Authentication - Stop Sweating the Password
We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the password obsolete? There have been many announcements, that the password is dead and indeed, there have been alternatives available - but mainly as siloed non-standard approaches. Now, there is something new: initiatives like FIDO are proposing alternatives going beyond a single...

Transforming Public Services with Attribute Exchange

Date: Thursday, May 12, 2016 Time: 12:00-13:00 Location: AMMERSEE I

Transforming Public Services with Attribute Exchange
UK local authorities are moving to digital service delivery to improve customer service and make significant cost savings. Identity assurance and attribute provision are key tools to unlock the full potential of digital and transform the way services are delivered to citizens. This presentation will show how UK local and central government are collaborating to develop effective ways of sharing personal data attributes to make public services more streamlined and easier for citizens to...

OpenID Connect for Enterprise SSO
As the enterprise Identity landscape becomes more complex, it's important to centralize the authentication and authorization functionality around a core set of APIs and services. User experience benefits as a single set of authentication credentials and policies can be applied across multiple enterprise products. As many of these products move to mobile based applications, the need for long term authorization grows and the policies around session management change. This talk will explore...

Identity Aware Cybersecurity

Sessions:

Recertifications - What's Possible Today, Limitations and the Future Potential for Access Governance

Date: Thursday, May 12, 2016 Time: 14:30-15:30 Location: AMMERSEE I

Recertifications - What's Possible Today, Limitations and the Future Potential for Access Governance
Recertifications are one of the established concepts in IAM today. However, you will rarely find any organization that is really happy with the way recertification works. Recertification initiatives cause a lot of work, friction, and frustration. However, the biggest challenge of recertification is that it is more than questionable whether it delivers on its target, which is is risk mitigation, concretely access risk mitigation. By running regular recertification campaigns, organizations...

Beyond Recertification
Very few companies, if any, are satisfied with the outcomes of their recertification efforts, because intelligence on risks come too late to be of real value. In this panel session we will discuss on how to get better and what possible alternative strategies are.  

Building structures for IAM automation

Date: Thursday, May 12, 2016 Time: 15:30-16:30 Location: AMMERSEE I

Building structures for IAM automation
Technically, automated access management based on attributes, rules and roles has become a no-brainer. But missing organizational structures and unstructured service and resource management are a barrier for tapping the full automation potential. Uncontrolled access management procedures have often led to intransparent environments where the implementation of policies is difficult. The panel will discuss where automation makes sense and where not. Clean-up strategies are discussed, and...

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections

Date: Thursday, May 12, 2016 Time: 17:00-18:00 Location: AMMERSEE I

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls will present the anatomy of a typical...

The Future of On-Premise AD in the days of Azure AD
Azure AD is here. It can act as a domain controller. It helps you managing your partners. It is ready-made for managing your customers. The application proxy builds the bridge back to your on-premise applications. That raises an important question for all organizations running AD on-premises: What is the future role for on-premise AD? What is the right strategy? Who can and should get rid of on-premise AD now or in the near future, who should focus on a hybrid strategy? Where is the overlap?...


Stay Connected


Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 - 13, 2016 Munich, Germany

Partners

The European Identity & Cloud Conference 2016 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00