Expert Stage

  •  TYPE: Track   DATES: May 15 - May 16, 2019
Conference Tracks

At the Expert Stage sessions, held in the Wintergarden area of the exhibition, you can listen to top experts that help you
solve critical business challenges and talk about their best practice experience. Take your opportunity to directly ask questions and discuss with the speakers face-to-face.
Each of the 20-minute Expert Stage sessions will be independently moderated by a KuppingerCole senior analyst.

Moderators:

Tracks:

Expert Stage I

Sessions:

PAM Uncovered: Your Privileged Access Management Journey Starts Here

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: WINTERGARTEN

PAM Uncovered: Your Privileged Access Management Journey Starts Here
With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s top priority. But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity? Join Chief Security Scientist Joseph Carson on a brief journey through the Privileged Access Management lifecycle to get you quickly up to speed on: Best practices for...

What Will be the PAM of Tomorrow?
The digital transformation is a real source of opportunity for organizations. But it also exposes them to increasingly numerous, sophisticated, and always-mutating cyberattacks. As the threat evolves, cybersecurity technologies must adapt to better address these new risks.  What about Privileged Access Management (PAM)? While it has previously only been of concern to IT experts, the need for privileged access management is expanding to other departments in organizations in all...

Considerations for Securing Privileged Access to Cloud Infrastructure and SaaS at Enterprise Scale
This session will explore some best-practices approaches and key considerations for facilitating, monitoring, governing privileged access and implementing critical business controls for cloud infrastructure platforms like Amazon Web Services, Azure, and Google Cloud Platform. Additionally, we will cover related topics for SaaS application platforms like SalesForce.com, 0365 and others. Most importantly, how this can be accomplished at an enterprise scale for all production and non-production...

Mission, Vision and Status of WiD

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: WINTERGARTEN

Mission, Vision and Status of WiD
Pam will provide more insight into the IAM field in general and discuss their view of where they see the industry heading in the future, from both a diversity and technology perspective.  

Skills of an Identity Professional
What skills do identity professionals use on a daily basis? How long does it take to feel confident as an identity professional? What projects are identity professionals working on in the coming year? Each year, IDPro conducts a survey to answer these questions and more. In this talk, Andrew Hindle will share the results of 2019 IDPro Skills and Programs Survey, provide his analysis of the results, highlight popular areas within the digital identity management industry, and examine growth...

Leveraging FIDO Authentication to Comply with PSD2 SCA Requirements

Expert Stage II

Sessions:

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: WINTERGARTEN

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage. Based on strategies developed...

Privileged Access Management: Operational Burden or Enabler for Protection Against Targeted Attacks?
Securing the use of privileged accounts, i. e. service accounts, accounts used for administration and accounts having the ability to access critical data and perform unauthorized changes, is one of the basic security measures. However, the practice shows that the implementation of privileged access security is a challenge for many organizations and opens critical cyber security vulnerabilities. Within this presentation, the speaker will build a bridge between privileged access management and...

Get the Most out of PAM: How to Make Privileged Access Management Meaningful and Effective

Schroedinger View on Identity: It is Consolidated and is not Consolidated

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: WINTERGARTEN

Schroedinger View on Identity: It is Consolidated and is not Consolidated

Digital Hybriditity, or: Greetings from the Outer Rim

Why Identity Management is Broken and What Can Be Done to Fix It
Ever tried to deploy a legacy, on-premise ID management solution? They are hard to deploy and even harder to upgrade and maintain. Cloud-based solutions are no picnic either. In addition to their lack of security and shared resources like memory and data, costs for licensing and maintenance can make cloud-based solutions cumbersome and a resource drain. If you could remove the resource strain, improve security, integrate back-office systems while saving costs, wouldn't it make sense to at...

Increase the Odds - How to Make your IoT Project a Business Success

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: WINTERGARTEN

Increase the Odds - How to Make your IoT Project a Business Success
The Internet of Things - managed or unmanaged devices - plays a significant role across all industries and has the potential to disrupt entire businesses. Even though many IoT projects are being implemented as we speak, many businesses are too late to the game. One of the main challenges during the project planning phase is the value quantification. The business value increases with the degree of process digitization. Digital Identity solutions, and IoT combined, help to make Information...

Data-Driven Compliance with Privacy Laws
Privacy laws such as GDPR require organizations to know whose data they have, where it is stored, and how they use it. They also have to match consent or agreements for use of the data, and the actual use of their customers’ data. In this presentation, we will show how privacy compliance can be based on data analytics, and how to automate that, so that continuous compliance can be achieved. Key takeaways: - How to build a map of personal data in the enterprise - Use the...

IDAM Controls to Detect and Prevent insider Fraudulent Access

Expert Stage III

Sessions:

How to Put Identity Analytics into Action

Date: Thursday, May 16, 2019 Time: 11:00-12:00 Location: WINTERGARTEN

How to Put Identity Analytics into Action
Are you letting users login without knowing the risks associated with their account activity and user behavior? If so, you’re likely missing indicators of compromise that could help you neutralize an attack in progress. Come see how RSA SecurID® Access and RSA NetWitness® Platform correlate identity analytics to reveal hidden anomalies and outliers, and automatically thwart identity-based attacks.

Open Source Identity: Building Your Own Enterprise Identity Platform

Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program
The data theft market is booming - and vulnerabilities in your privileged access management (PAM) infrastructure and practices open the door to a devastating breach. Learn five easy steps that enable your organization to assess the maturity of your PAM systems and processes, and take steps to tighten up security and make your business more efficient. Attend this session, hosted by One Identity, recently named a leader in KuppingerCole’s Leadership Compass report for Access Management...

The Role Of Identity in Multi-Cloud Management

Date: Thursday, May 16, 2019 Time: 12:00-13:00 Location: WINTERGARTEN

The Role Of Identity in Multi-Cloud Management

To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes

How A Major Retailer Successfully Performed a Divestiture
This session will cover aspects of how a retailer successfully transitioned to a 100% cloud-based managed service offering, having their active directory hosted in the cloud and integrating into multiple cloud applications including Office 365. We will cover approach, what worked and lessons learned.

Expert Stage Part IV

Sessions:

Best Practices as the Foundation of Agility and Innovation: IdentityPROCESS+ as an IGA Process Example

Date: Thursday, May 16, 2019 Time: 14:30-15:30 Location: WINTERGARTEN

Best Practices as the Foundation of Agility and Innovation: IdentityPROCESS+ as an IGA Process Example

Access Certification Campaigns that Work

Security and Efficiency Can and Does Co-Exist

Trust is The New Frontier

Date: Thursday, May 16, 2019 Time: 15:30-16:30

Trust is The New Frontier

Restoring Trust in a Digital World
Imagine a world where a person’s identity and the devices operating on their behalf can be verified immediately, safely, and securely, across multiple touchpoints and in both the digital and the physical world; where access is gained without passwords and data is exchanged only with consent - as simple as saying: “Hi, this is me.” Access to a digital identity will unlock new and enhanced experiences for people as they interact with businesses, service providers and their...

 

Date: Thursday, May 16, 2019 Time: 17:00-18:00

 

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00