Security Intelligence
Facebook Twitter LinkedIn

Identity and Security Intelligence

Combined Session
Thursday, April 19, 2012 14:00—15:00
Location: Ammersee 1

Security is now as much a question of visibility as it is of controls. Enterprises need to be able to see what’s happening throughout their physical and virtual environments, including both in house and in the cloud. This session discusses the role of identity management in security intelligence, including the kinds of information that enterprises need to collect, the kind of analysis that needs to be performed and the ways that the resulting security intelligence can be applied in making effective security decisions.

Identity and Security Intelligence
Presentation deck
Identity and Security Intelligence
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Kim Cameron
Kim Cameron
Microsoft
Kim is Architect of Identity in the Identity Division at Microsoft, where he champions the emergence of a privacy-enhancing Identity Metasystem reaching across technologies,...
Robert Griffin
Robert Griffin
RSA, the Security Division of EMC
Robert Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture and strategy. He is particularly active in RSA’s...
Edwin van der Wal
Edwin van der Wal
Everett
As Senior Director Edwin is responsible for Professional Services within Everett and acts as chairman of the Knowledge Management Team. He performs the Senior Supplier role in key projects as well.
Subscribe for updates
Please provide your email address