Cloud Identity & Security
Facebook Twitter LinkedIn

Cloud Identity & Security

Combined Session
Wednesday, May 06, 2015 11:00—12:00
Location: ALPSEE

Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact

Although cloud computing has left the early adopter stage, there are still quite a few organizations hesitant to migrate services and data into the cloud due to security concerns, not only in Europe. Many of the security and privacy concerns heard when listening to IT professionals, are not just fears - they are real amd meed to be treated. In this presentation, KuppingerCole Analysts Mike Small and Eric Cole will guide you through the top 5 Cloud Security & Privacy concerns and propose measures to mitigate the risks originating from those threats. 

Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Presentation deck
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Amar Singh
Amar Singh
KuppingerCole
Amar Singh is Senior Analyst at KuppingerCole, an C-level executive, information risk & GRC expert, CISO, writer industry speaker leading the global information risk management landscape with...
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?

Too many companies suffer from complex IAM implementations. Lack of user acceptance due to overly complex user interfaces; massive workloads for business people in recertification; failed projects due to complex infrastructures; the list of challenges is long. On the other hand, the need for a well-working IAM has never been as large as today. Support for more users and other types of identities than ever before, with more and more business users being involved in access requests and identity management; detecting abuse of access rights and excessive entitlements as soon as possible; simple implementation of more than just basic identity provisioning; that’s what companies need today.

Time to simplify IAM infrastructures. But where to start? Or does it require completely rethinking and re-implementing everything? And how to move from what you have to a simplified IAM infrastructure with broader reach?
The panelists will discuss the business and IT demand for simplifying IAM and how to reach that goal.

Marc Bütikofer
Marc Bütikofer
Ergon Informatik AG
Marc Bütikofer is a product manager and leads the development of Ergon's authentication solution Medusa. He has over 10 years of experience in authentication systems and has accompanied...
Ralf Knöringer
Ralf Knöringer
Atos
Ralf Knöringer is the head of the competence center IAM at Atos which includes the global responsibility for the DirX product suite. Ralf has more than 20 years of professional experience in...
Robert Levine
Robert Levine
Aurionpro
Robert Levine, President Western Region brings more than 25 years of technology management with a specific focus on Enterprise Security inclusive of Identity & Access Management. His role as...
James Litton
James Litton
Identity Automation
With more than 25 years of experience in enterprise technology software and systems, James has led teams as an executive living and working in North America, Africa, Europe, and throughout the...
Max Waldherr
Max Waldherr
Dell Software
Subscribe for updates
Please provide your email address