Security Intelligence
Facebook Twitter LinkedIn

Security Intelligence

Combined Session
Thursday, April 19, 2012 14:00—15:00
Location: Ammersee 1

Best Practices for Lean, Efficient and Focused Information Security Projects

From our Advisory Services, KuppingerCole has a long and comprehensive experience in how to do Information Security Projects in a lean, efficient, and focused way. This session will provide you advice on how to mitigate your project risks, how to solve the IT/Business alignment challenge in such projects, and how to ensure that you end up with the solution you need – and not the solution your auditor’s preferred consultants or the technology vendor have in mind. There is a lot of room for improving your projects to better meet your targets while keeping the projects lean.

Best Practices for Lean, Efficient and Focused Information Security Projects
Presentation deck
Best Practices for Lean, Efficient and Focused Information Security Projects
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Horst Walther
Dr. Horst Walther
KuppingerCole
Dr. Horst Walther, born 1951 in Berlin, works as a interim manager, management consultant and independent technical advisor for more than 30 years. His expertise focuses on the business to...

Identity and Security Intelligence

Security is now as much a question of visibility as it is of controls. Enterprises need to be able to see what’s happening throughout their physical and virtual environments, including both in house and in the cloud. This session discusses the role of identity management in security intelligence, including the kinds of information that enterprises need to collect, the kind of analysis that needs to be performed and the ways that the resulting security intelligence can be applied in making effective security decisions.

Identity and Security Intelligence
Presentation deck
Identity and Security Intelligence
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Kim Cameron
Kim Cameron
Microsoft
Kim is Architect of Identity in the Identity Division at Microsoft, where he champions the emergence of a privacy-enhancing Identity Metasystem reaching across technologies,...
Robert Griffin
Robert Griffin
RSA, the Security Division of EMC
Robert Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture and strategy. He is particularly active in RSA’s...
Edwin van der Wal
Edwin van der Wal
Everett
As Senior Director Edwin is responsible for Professional Services within Everett and acts as chairman of the Knowledge Management Team. He performs the Senior Supplier role in key projects as well.
Subscribe for updates
Please provide your email address