Access Intelligence: The New Standard Feature of Access Governance?

  • TYPE: Combined Session DATE: Wednesday, May 15, 2013 TIME: 15:00-16:00 LOCATION: AUDITORIUM


Access Intelligence is a hot new topic within the discipline of Access Governance. But what is this really about? Is it just better reporting? Or is it about applying advanced Data Warehouse capabilities to analyze existing access rights, the use of them, the access risks etc.? Should it be built based on standard BI tools or should it become more tightly integrated? What is the real benefit compared to standard reporting of Access Governance tools? These are questions customers are raising – and these will be answered within this session.


Olivier Bandle is a bilingual Client Partner with 15+ years of extensive global experience and proven ability to collaboratively develop and implement business strategies that reduce clients' costs and enhance end-user experience. Proven success in build and managing complex consulting teams,...

Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...

Thierry Winter has a degree in Telecommunication engineering from the French Ecole Nationale Supérieure des Télécommunications in 1990. He started his career within the software department of the Bull Group, by carrying out several development projects for the OpenMaster...

Abhimanyu is Vice President at Simeio Solutions and leads their Identity Management professional and cloud services practice for Europe. Prior to Simeio he held leadership positions at Vaau and Sun Microsystems where for 3 years he led product direction, strategy, and go-to-market activities for...

The objective of the Enhanced Access Management @Swiss Re is to improve and simplify access management. Shifting Swiss Re’s access rights philosophy from the "need-to-know", where only the information one needs to know is accessible, to the "need-to-protect" approach, a risk-based focus on protection of critical information. Strong business support and rule-based automation enabled this change.


Watch videos:  
Log in to download the presentation:  


Session Links


European Identity & Cloud Conference 2013

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2013 Munich/Germany