Customer-Centric Identity Management: Securely Aligning IAM, CRM, and Big Data

  •  TYPE: Track   DATES: May 11 - May 12, 2016
Conference Tracks

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk mitigation requirements for commercial transactions, the relationship with secure payments, customer retention, new business models and thus new requirements for interacting with customers: The challenge has never been that big. The glue is the identity. If you know your customer and manage one consumer identity, you can solve your business challenges. This requires new ways for managing identities, the sweet spot for Cloud IAM. It requires integrating all customer-related information, from all sources – one identity, one view on the consumer. It requires adaptive authentication for balancing convenience and security. And it requires a well thought-out approach towards security and privacy to mitigate the reputation risks.

Topics in this track:

  • Scaling Your IAM: Dealing with millions of users and billions of things
  • One view on the customer/consumer
  • Big Data & Privacy by Design

Moderators:

Tracks:

Big Data in Information Security

Sessions:

Big Data in Information Security: Results from a recent Study

Date: Wednesday, May 11, 2016 Time: 11:00-12:00 Location: AMMERSEE II

Big Data in Information Security: Results from a recent Study
BARC and KuppingerCole have jointly conducted a study on Big Data in Information Security, building on three well-received BARC surveys in recent years: “Big Data Use Cases”, “Big Data Analytics“, and “Big Data Survey Europe“. While the previous surveys focused on big data analytics in general, this survey concentrated on security use cases of big data analytics in information security and fraud detection. The survey examined a number of areas...

Keeping Pace with the Real-Time Revolution in Identity and Access Management
The volume of security data and events has undergone an exponential explosion whose pace is only projected to increase with the proliferation of the Internet of Things devices. Fortunately, for the first time in IT security history the tools to analyze these firehoses of Big Data and provide real-time insight are appearing. What opportunities do these new tools present and how will they create a paradigm shift in the strategy for CISOs and security professionals.

Fraud Management vs. Security? Risk, Fraud, and Security!

Date: Wednesday, May 11, 2016 Time: 12:00-13:00 Location: AMMERSEE II

Fraud Management vs. Security? Risk, Fraud, and Security!
As of now, Fraud Management and Security, including Real Time Security Intelligence (RTSI) and advanced security and threat analytics are commonly segregated from each other. While this at first glance makes sense, given the different corporate buyers, there are three good reasons for a more integrated perspective. On is that the underlying analytical technologies are vastly the same. It is about machine-learning and pattern-based analytics, helping better protecting organizations against...

The Organizational Perspective: Should Fraud Management and Security Intelligence Converge?
There are two facets of fraud – the business fraud and the IT fraud. The first is about people e.g. transferring money to accounts they have created for a fake supplier. The latter involves all fraudulent behavior in IT systems, particularly when it leads to financial losses. However, IT fraud includes attackers hijacking accounts of business users, ending up in business fraud. And most business fraud scenarios are related to excessive entitlements and SoD violations. So business fraud...

Cloud Identity & Security

Sessions:

Cloud Risk and Opportunity

Date: Wednesday, May 11, 2016 Time: 14:30-15:30 Location: AMMERSEE II

Cloud Risk and Opportunity
Using cloud services provides new opportunities and introduces new risks. In this presentation Mike Small Senior Analyst will describe some examples of how organizations are using cloud services and guide you through the risks that need to be managed.

Best Practice: OSRAM’s way to a Private Cloud

Why Certifications for Cloud Providers are Necessary: Real Cases in Italian Public Administration

Date: Wednesday, May 11, 2016 Time: 15:30-16:30 Location: AMMERSEE II

Why Certifications for Cloud Providers are Necessary: Real Cases in Italian Public Administration
Alessandro will walk with you through two different Cloud Best Practices: Ministry for Italian Education and Universities Italian Railways demostrating that certification is essential for security issues and to assure the requested service levels

IDaaS in Digital Learning at ThiemeMeulenhoff
In education there is an increasing shift towards digital learning resources, called e-learning. Digital learning resources offer a lot more flexibility than traditional study books. Immediate feedback, customization, and integration of multimedia and web links are just a few of the advantages. More important, e-learning offers the possibility of personalization, in which the digital learning resources keep pace with the progress and the talent of pupils and students. ThiemeMeulenhoff...

Provably Secure Data Protection in the Cloud

Date: Wednesday, May 11, 2016 Time: 17:30-18:30 Location: AMMERSEE II

Provably Secure Data Protection in the Cloud
Unencrypted personal data accessed by a single hack impacted over 36 million users, resulting in personal loss, shattered reputations and costing millions of dollars! Organizations must move forward beyond traditional network security to protect all of their data. Come and learn how a revolutionary game-changing and 'Provably secure' technology is re-inventing the way cloud data security is designed and implemented Key Takeaways: The paradigm of data security is evolving beyond...

Using Metadata to Effectively Secure Cloud Content
As more and more organizations are investigating cloud storage solutions and how/when to move some of their data to the cloud, the question about how to manage data in a hybrid environment – a combination of on prem and cloud storage – is becoming more and more frequent, and we know that this will continue to increase over the coming years. This leads to the concern of how to bridge the gap between on prem DLP systems with cloud-based CASBs, and how data classification and...

Identity at Scale: Managing Millions of Users and Billions of Things

Sessions:

Identity 1.0 & 2.0 are dead, long live Identity 3.0

Date: Thursday, May 12, 2016 Time: 11:00-12:00 Location: AMMERSEE II

Identity 1.0 & 2.0 are dead, long live Identity 3.0
We all know that Identity in the digital world is broken; and has been for some time. Passwords are well beyond their sell-by date, yet are still the only realistic game in town. Meanwhile Spam, Fraud, Phishing and Cyber Crime succeed by being able to steal identities and impersonate individuals. Credit Card fraud has hit an in excess of thirty billion US dollars per annum. To date, all attempts of national or commercial solutions have started with grand intentions and then either failed...

New Tools & Rules in Internet Identity Management: Navigating a Zero Trust World
The world of identity management changed forever on June 10, 2013 with the introduction of the Zero Trust architecture approach. First proposed by Forrester Research, this new "best practice" has "never trust, always verify" as its guiding principle. It takes the old model—"trust but verify"—and inverts it. As recent breaches have proven that when an organization trusts, it doesn’t verify. Something is fundamentally broken in the world of information security. Despite...

Go Live: UK's new Digital Identity Service.

Date: Thursday, May 12, 2016 Time: 12:00-13:00 Location: AMMERSEE II

Go Live: UK's new Digital Identity Service.

The Shared Opportunity for Managing European Moving Workforce Identities
In Europe the moving workforce is a reality – particularly in the construction industry – and there is vast business potential in the integrated handling of associated identity-management services. Kaius and his team are unlocking this potential with a platform they have developed called QVARN. Based on GLUU open-source access management, QVARN already houses the identities of more than one million construction workers across Sweden, Finland and the Baltics. And Kaius envisions...

Managing Privileged Users

Sessions:

Understanding Privilege Management: What do you need first?

Date: Thursday, May 12, 2016 Time: 14:30-15:30 Location: AMMERSEE II

Understanding Privilege Management: What do you need first?
Privilege Management, also referred to as Privileged Account Management (PAM), Privileged Identity Management (PIM) etc., is still an unsolved issue in the vast majority of organizations – despite the massive risk that can be caused by privileged users, be it by fraudulent behavior or because these accounts have been hijacked. On the other hand, the multiple facets and elements of Privilege Management make it difficult to identify the best starting point. Matthias Reinwarth will give...

The Privilege Management Market 2016: KuppingerCole Leadership Compass
In this presentation, Martin Kuppinger will give an overview about the Privilege Management market and the players therein, based on the current KuppingerCole Leadership Compass Privilege Management.

The Future of Privilege Management: Suites? Analytics? Embedded?

Date: Thursday, May 12, 2016 Time: 15:30-16:30 Location: AMMERSEE II

The Future of Privilege Management: Suites? Analytics? Embedded?
Privilege Management has evolved from a small niche market to a respectable market segment, with some vendors already being publicly listed companies. Many vendors have extended their product portfolio from specific solutions for certain use cases towards suites. Others focus on innovative areas such as Privileged User Behavior Analytics. Some vendors also focus more on embedding Privilege Management into their overall IAM suites, understanding Privilege Management as an integral part and...

How to avoid your Privilege Management project from stalling

Date: Thursday, May 12, 2016 Time: 17:00-18:00 Location: AMMERSEE II

How to avoid your Privilege Management project from stalling
Best practices and a staged approach for your Privilege Management project Matthias Reinwarth will look at the reasons for stalling Privilege Management projects. Aside of the standard challenges of projects involving a lot of different parties (such as Windows administrators, UNIX/Linux administrators, and network operators) and the technical complexity, he will particularly emphasize four areas. The first is the business case for Privilege Management. Second is the organizational...

Lessons learned from customer projects: How to support the customer?
In this panel, vendors and integrators will discuss their lessons learned from customer projects and how they help and educate their customers to avoid stalling projects.

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 - 13, 2016 Munich, Germany

Partners

The European Identity & Cloud Conference 2016 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00