Automotive

  •  TYPE: Track   DATES: May 15 - May 16, 2013
Conference Tracks

Managing Identities the right way will become a game changer for the automotive industry. Traditionally, the automotive industry has been leading edge when it comes to managing supplier employees. But even there we see massive room for improvement, with new federation standards like OAuth enabling new types of solutions. However, the far bigger challenge is extending IAM and IAG to the full ecosystem, with other business partners, dealers, and customers. The Extended Enterprise is increasingly becoming reality – however, this is not a simple task for the automotive industry with its complex relationships. Beyond that, the Connected Vehicle stands for the need for a quantum leap in Identity Management. The Internet of Things with a number of connected identities within the car and a mass of identities associated with the car – driver, owner, insurance company, leasing company, garage, manufacturer, police, etc. – requires identity-based concepts. The Connected Vehicle will not becoming reality without a strong identity foundation. Besides the manufacturers which are in the center of that evolution, this is also a challenge for their suppliers which participate in both the automotive industry ecosystem and the connected vehicle.

The Automotive Virtual Track is a guideline through various topics. Identity Federation and Cloud Identity Services, the Extended Enterprise, Life Management Platforms and the API Economy (both being essential enablers for the Connected Vehicle), and for sure the Automotive Roundtable deliver the information you need to make the next step towards the level of IAM automotive manufacturers and their suppliers will need in future.

Moderators:

Tracks:

How to Build your IAM/IAG Infrastructure the Right Way – and Support Business Today

Sessions:

People, Process, Product, Partner - the Four P´s of IAM/IAG in the Extended Enterprise

Date: Wednesday, May 15, 2013 Time: 10:30-11:30 Location: AMMERSEE 2

People, Process, Product, Partner - the Four P´s of IAM/IAG in the Extended Enterprise
Although, Identity and Access Management (IAM) is the security backbone of an organization, it is often seen as a mere technical implementation. The four P’s comprise people, process, product and partner and are a main concept within IT service management. In this session the four P’s of IAM are applied to the context of extended enterprise. An extended enterprise is a network of firms which cover supply chains but also loosely coupled collaborations as for example arise in...

Supporting the Extended Enterprise: Partners, Customers, Mobile Users, and all the Others
The most pressing demand from business to the IAM departments today is about the “extended enterprise”. Business wants new services. They want to access services and systems of business partners. They want to onboard external partners. They want to use cloud services. All this has to be done quickly but still in a secure way. This session will explain how to move forward when it comes to supporting the enterprise and to deal with all types of third parties in a consistent way. It...

Creating Customer Portals with Sensitive Personal Data without Compromising Security

Date: Wednesday, May 15, 2013 Time: 11:30-12:30 Location: AMMERSEE 2

Creating Customer Portals with Sensitive Personal Data without Compromising Security
This is a real life case study about how CSS implemented the security for a customer and sales portal using a Federated Identity Provider, 2 factor SSO with SAML, and attribute based access control on the SOA mediator between portal and backend using XACML. CSS has a well established SOA backend with Role Based Access Control: Employees are assigned to one or more roles, based upon which access to varying levels of customer data is granted. However, when opening up such an IT system to...

G4S Bulgaria: Identify and Protect Critical Information and Prevent Data Leaks
For organizations that deal with sensitive information on a daily basis, and work with people and organizations located around the world, preventing information leaks is a top priority. There are many ways that sensitive data can leak from organizations, however the insider threat remains the hardest to quantify and resolve. G4S discovered that before they could improve their data loss prevention efforts and effectively protect sensitive information, they needed to be able to answer other...

Managing Identities and Access to Information for Cloud, Mobile and Social Computing

Sessions:

The Future of IAM: Do not kill IAM, improve and extend it!

Date: Wednesday, May 15, 2013 Time: 14:00-15:00 Location: ALPSEE

The Future of IAM: Do not kill IAM, improve and extend it!
IAM has to change. It has to support more and other users than ever. It has to support internal and external (Cloud) services. It has to support logins from social networks and the transition of these users to “regular” users once they become real customers. It has to support the move from traditional, system-centric and static approaches of identity and access management to flexible, distributed, and dynamic approaches. However, instead of following a recent proposal made in...

Extending your existing IAM to the Cloud: Leverage your Investments
There are many ways to extend your existing IAM to the Cloud: Migrate to a cloud-based deployment model. Support simple sign-on to cloud services and provisioning of users for these services based on your existing on-premise environment. Complement the solution with new tools and features for the cloud. Add cloud-based strong authentication. And many more… But clearly there is neither the holy grail of cloud support for IAM nor the one and only approach of deploying IAM. In this...

Using IAM to protect you from Advanced Persistent Threats and Auditors

Date: Wednesday, May 15, 2013 Time: 15:00-16:00 Location: ALPSEE

Using IAM to protect you from Advanced Persistent Threats and Auditors
Identity & Access Management has become a lot more than just single sign-on. There are real threats which effective IAM can solve. For example access certification can bring you in line with regulations while removing attack vectors. Controlling privileged account access can reduce insider threats and take the sting out of APTs that rely on sloppy admin access. And simply giving the business visibility into who has access to what at the right time can empower the business to control the...

Plugging "Cloud Identity Leaks" - Should your Business become an Identity Provider?
Third party identity providers such as Facebook and Twitter make it easy to perform "Social Login", enabling users to log into third-party services using a Facebook ID or a Twitter ID. This is convenient for consumers, but it is a potential problem for businesses whose employees may now log into business services using third-party IDs, rather than using a corporate ID. This results in an "identity leak for the organization, where Cloud services begin to manage your employees identity. A...

Identity Management as a Service (IdMaaS) - the Dope or are we Duped?

Date: Wednesday, May 15, 2013 Time: 17:00-18:00 Location: ALPSEE

Identity Management as a Service (IdMaaS) - the Dope or are we Duped?
Big players like salesforce.com entering the market: Will this redefine the way we do IAM and solve our challenges in the days of Cloud Computing, Mobile Computing, and Social Computing? Two identity behemoths—Microsoft and Salesforce—bucked the trend of cornering your identity in a silo and announced general purpose Identity Metasystems. Microsoft with its Azure Active Directory and Salesforce with its Salesforce Identity. Sounds too good to be true? This webinar brings...

Automotive Roundtable

Sessions:

Implementing PKI at Daimler AG: Motivation, Challenges, Lessons Learned

Date: Thursday, May 16, 2013 Time: 10:30-12:30 Location: WALCHENSEE

Implementing PKI at Daimler AG: Motivation, Challenges, Lessons Learned
This roundtable will cover the experience of implementing PKI at Daimler AG. It will cover the motivation for embarking on the project including the business drivers. It will describe the challenges, both business and technical, that were encountered in realizing this highly complex piece of technical infrastructure. It will highlight the lessons that were learned by Daimler AG that could be useful to other automotive organizations attempting a similar project. After attending this...

Connected Vehicle & The Internet of Things: How to adapt your Infrastructure
Authentication: do we need single sign-on for vehicles, vehicle identifiers (like MAC addresses)? What authorisation schemes are used in cars? Even engine control systems seem to be fairly open so that different engineers can work on them, does this need to change as more electronic gadgetry is introduced to vehicles? Communication: the main issue within cars seems to be that there are multiple networks meeting in a single interface. Are these recognised by the manufacturers? Are they...

Life Management Platforms, Personal Data, Customer Managed Relationships

Sessions:

Life Management Platforms, Personal Data, Private Cloud - Standards and Initiatives

Date: Thursday, May 16, 2013 Time: 14:00-15:00 Location: ALPSEE

Life Management Platforms, Personal Data, Private Cloud - Standards and Initiatives

Roadmap to Life Management Platforms
Use Cases & Approaches Benefits for users and service providers Security Analysis & Privacy Impact Solutions and R&D Roadmap Recommendations

Secure Communication Ecosystem as Part of the Life Management Infrastructure

Date: Thursday, May 16, 2013 Time: 15:00-16:00 Location: ALPSEE

Secure Communication Ecosystem as Part of the Life Management Infrastructure
In this session, we will try to complement the goals of the Life Management concept with some thoughts on the structure of the corresponding communication ecosystem. The concept of "Life Management" was introduced by Martin Kuppinger defines the set of long-term goals for the current and ongoing development of numerous identification, authentication, and personal information protection systems. This concept places many new features, facilities, and situations under consideration. The...

From Risk to Value: The Future of Social Media and their Role as Catalysts in Enterprise IAM
When looking at the challenges the IT departments of organizations are faced with today, then the Computing Troika (Cloud Computing, Mobile Computing, Social Computing) and the related “Identity Explosion”, the need to deal with far more identities than ever before, are high on that list. Dealing with identities and their access is becoming increasingly complex in modern environments. On the other hand, Information Security is a major concern not only of IT but the Business, up...

Architecture and functionality of the "EIC App"

Date: Thursday, May 16, 2013 Time: 16:30-17:30 Location: ALPSEE

Architecture and functionality of the "EIC App"
In this session, two different Life Management prototypes will be shown. The first one is the combination of a personal data store (based on Windows Azure Graph Storage WAGS), some event-driven logic (Kynetx KRL) and a mobile device and be transformed into a system that is a harbinger of a Life Management Platform. We show the architecture and functionality of the EIC App. Key concepts of this prototype are that the WAGS and KRL components could be any vendors store of logic.

Qiy Foundation´s Infrastructure
The second one is based on the Dutch Qiy Foundation´s infrastructure. These are just examples. KuppingerCole advocates freedom of choice to the customer and does not promote vendor lock-in.


Stay Connected


Congress

European Identity & Cloud Conference 2013

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2013 Munich/Germany

Partners

The European Identity & Cloud Conference 2013 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00