Identity & Access Management

  •  TYPE: Track   DATES: April 18 - April 19, 2012
Conference Tracks

If you are responsible for IAM in your company, if you manage IAM related projects or if you are an IT architect or otherwise involved in IAM projects, this is the track to not miss. Learn about the newest trends from KuppingerCole analyst and Industry Expert thought leadership, learn about best practices, and get the information you need to successfully run your projects around all areas of IAM.

After attending this track you will be able to:

  • Describe the KuppingerCole IT Model and how it provides IT services the business really needs.
  • The steps you need to take to get your IT organization ready for the future.
  • Re-engineer IAM to better serve your Business Needs
  • List the latest best practices for identity federation and privileged user management.
  • List best practices for lean, efficient and focused information security projects.
  • Describe the lessons learned from large IAM implementation projects.

This track in total qualifies for up to 14 Group Learning based CPEs depending on the number of sessions you attend.

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website:

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email:



What to Focus on for Future-Proof IAM


Increase Value to the Business: The KuppingerCole IT Model

Date: Wednesday, April 18, 2012 Time: 10:30-11:30 Location: Ammersee 1

Increase Value to the Business: The KuppingerCole IT Model
KuppingerCole recently has unveiled its view on the IT: The KuppingerCole IT Model. This model focuses on fulfilling the business needs: Providing the services business really needs – and ensuring that corporate information is adequately protected. Based on these targets, the model segments IT in three layers and allows mapping virtually anything. It supports in increasing the agility of IT in terms of quickly fulfilling business service requests. It explains on how to build your IT...

How IAM can Catalyze the Secure Enterprise
IAM (Identity & Access Management) is one of the cornerstones of Information Security. Thinking in identities and putting the security of information and the access to information in the center of attention is the foundation for improving information security. Moving away from device-centric and network-centric security to information-centric security allows to better understand information risks and the required actions to mitigate these risks and better secure your enterprise. Leading...

Winds of Change in your IT Organization: Get ready for the Future

Date: Wednesday, April 18, 2012 Time: 11:30-12:30 Location: Ammersee 1

Winds of Change in your IT Organization: Get ready for the Future
IT Organizations are on the move. The Cloud requires new skills in procurement, service orchestration and service management. An increasing number of CEOs nowadays aren’t IT veterans anymore but young managers which understand the CIO role as an important career step. And the demand for more Business/IT alignment drives the change of IT organizations as well. In this session, you will learn of how to fundamentally restructuring your IT, following the KuppingerCole IT Model. This...

The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
Most organizations have done quite some investment into IAM and Access Governance. But they need much more. They need to integrate, they need to extend what they have done, and tey need to levarage developments like geographically dispersed infrastructures, mobile computing and cloud. Thus good solutions should add value to what these organizations have instead of putting most effort in redoing things which did cost a lot of money. In this panel, we will discuss strategies for IAM and Access...

IAM Architecture


Identity Federation Challenges and how to approach them

Date: Wednesday, April 18, 2012 Time: 14:00-15:00 Location: Ammersee 1

Identity Federation Challenges and how to approach them
In recent times where the term "federation" is slipped into the conversation as if it were a straight forward hassle free process, there lurks a multitude of technical challenges. Chief amongst those are the "session state" issues of SLO and idle time-out. This panel session will unpick the problem and touch on various approaches being used to solve it, manage it, or avoid it.

Best Practice in Out-sourced Federation: WAYF

PCI-DSS, SOX, Basel: How to Manage Privileged Access and Pass the Audit

Date: Wednesday, April 18, 2012 Time: 15:00-16:00 Location: Ammersee 1

PCI-DSS, SOX, Basel: How to Manage Privileged Access and Pass the Audit
Privileged accounts like root, sysadmin or Oracle system, are necessary to run and manage databases, middleware and operating systems. These accounts are the most powerful within an organisation as they allow access to any type of business and in most cases ‘critical’ information. So if somebody wanted to severely damage your business, attacks targeting these privileged accounts would be the way to do it. This leads us to the question: Would you at least find out if a...

Single Point of Access: The IAM Strategy at Teleflex

Date: Wednesday, April 18, 2012 Time: 17:00-18:00 Location: Ammersee 1

Single Point of Access: The IAM Strategy at Teleflex
Working across six continents, Teleflex provides medical devices used in critical care and surgeries across the globe. Their products help protect patients from infections and enables surgeons to do safer, less invasive procedures ranging from vascular access, anesthesia and airway management among many others. Teleflex Incorporated ( has a core identity management strategy: one point of access. Beginning as just a temporary fix to decommission the company's Sun LDAP...

One Identity Service, Many Initiatives: Exploring Use Cases for Identity Virtualization
Modern identity infrastructures are a tangled web of identity sources, protocols, and varies security means. This panel discussion will focus on the challenges around unifying a disparate identity infrastructure for identity management and federation initiatives. The panel will explore how an identity service, enabled by virtualization, can be used to tackle many kinds of identity management challenges, and facilitate the addition of new identity stores and populations. Nick Sabinske’s...

IAM Architecture


Re-engineering IAM to better serve your Business Needs

Date: Thursday, April 19, 2012 Time: 10:30-11:30 Location: Ammersee 1

Re-engineering IAM to better serve your Business Needs
Identity and Access Management like most of the organizations have implemented is on change. Provisioning as the core element in former days still plays some role, but with Access Governance becoming established, new concepts like Access Intelligence (in its still somewhat undefined form), integration to SIEM, re-thinking of established IT concepts like Message Queueing for the role they can play in Identity and Access Management and many other influencing factors, Identity and Access...

The Role of Open Source in Today´s IAM Infrastructure

Building Identity & Access Management as a Public Administration Service for the Trento Autonomous Province
This session will explore how Trento Autonomous Province is working to establish standards that make it easy for (local and central) government agencies and businesses to consume identities with confidence in their quality. Fabrizio Russo, Trento IAM Project's chair, will discuss the local government's role in establishing a trustworthy identity infrastructure. This session will explore: 1: The importance of a comprehensive identity and access governance strategy targeted and the highest...

Identity & Access Governance (IAG): Building the Business Case & Implementation

Date: Thursday, April 19, 2012 Time: 11:30-12:30 Location: Ammersee 1

Identity & Access Governance (IAG): Building the Business Case & Implementation
Many companies are making IAG projects a high priority because of the business benefits the governance-based approach delivers. In this session, Rabobank International’s Global head of security operations, Jethro Cornelissen, presents an IAG case study and discusses best practices for demonstrating business value in each phase of an IAG implementation.

Deployment of a Role Based Access Identity Management System in a University Hospital
François-Pierre Regamey, CIO of CHUV, a large Swiss university hospital, will describe how Identity Management takes a central part in CHUV's strategic drive toward digital healthcare. The presentation will cover the strategic and practical aspects of Identity management deployment in a hospital. It will present the lessons learned, main recommendations and key success factors. CHUV's strategic plan calls for a strong development and integration of the hospital's health...

IAM Architecture


Best Practices for Lean, Efficient and Focused Information Security Projects

Date: Thursday, April 19, 2012 Time: 14:00-15:00 Location: Ammersee 1

Best Practices for Lean, Efficient and Focused Information Security Projects
From our Advisory Services, KuppingerCole has a long and comprehensive experience in how to do Information Security Projects in a lean, efficient, and focused way. This session will provide you advice on how to mitigate your project risks, how to solve the IT/Business alignment challenge in such projects, and how to ensure that you end up with the solution you need – and not the solution your auditor’s preferred consultants or the technology vendor have in mind. There is a lot of...

Identity and Security Intelligence
Security is now as much a question of visibility as it is of controls. Enterprises need to be able to see what’s happening throughout their physical and virtual environments, including both in house and in the cloud. This session discusses the role of identity management in security intelligence, including the kinds of information that enterprises need to collect, the kind of analysis that needs to be performed and the ways that the resulting security intelligence can be applied in...

Best Practice: Telekom Italia

Date: Thursday, April 19, 2012 Time: 15:00-16:00 Location: Ammersee 1

Best Practice: Telekom Italia
In order to comply with internal and external regulatory requirements, Telecom Italia had built a "Traceability & Secure Logging Framework." During this session we will cover this framework as a basis for a ‘best practice’ approch on how to implement a good Ideneity and Access solution.

Access & Entitlements - More than just Role Management
Access Management is a hot topic. It is about controlling who has access to what or, in other terms, who is entitled. Entitlements are what we need to manage. A common approach on that is Role Management. Role Management is established, there is a lot of experience. However, this experience led to two important learnings: 1) You need more than roles - you need to understand competencies, context, and the businesses processes. 2) Role Management approaches are typically to coarse grain for a...

Cloud Ready Authorization Archtitectures

Date: Thursday, April 19, 2012 Time: 16:30-17:30 Location: Ammersee 1

Cloud Ready Authorization Archtitectures
Authorization seems to still be one of the dirty secrets of IT. There is a lot of work around managing identities and accessing them. There are standards for that, like LDAP, SPML or SCIM. There is a lot of work done around managing authentication, with far too many standards like OAuth, OpenID, Kerberos, and all the others. Vendors are heavily investing, startups are popping up, and end user organizations are jumping on that topic. However, when it comes to authorization, there are only...

Stay Connected

KuppingerCole on social media


European Identity & Cloud Conference 2012

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Apr 17 - 20, 2012 Munich, Germany


The European Identity & Cloud Conference 2012 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00