Risk Metrics
Facebook Twitter LinkedIn

Risk Metrics

Combined Session
Thursday, May 07, 2015 15:30—16:30
Location: AUDITORIUM

What Gets Measured Gets Done – Identifying New Metrics for Distributed Digital System Performance to Evaluate and Mitigate Risk.

Data is the lifeblood of organizations and managers of organizations have access to increasing volumes of data; but what does data really mean in a given context? How can effective and dynamic risk evaluation and mitigation processes be cultivated from better measurement practices in an organization, and a more nuanced understanding of how different sources of risk will reveal themselves through different sorts of metrics.

Robert Lapes
Robert Lapes
Capgemini
Robert Lapes is head of identity advisory services in Capgemini’s IAM practice in the UK. He is a chartered engineer with nearly 30 years of insight and lessons learnt in I.T. For the last...
Dr. Roy Lindelauf
Dr. Roy Lindelauf
Netherlands Defence Academy
Roy´s research focuses on the application of mathematical methods to the analysis of terrorism, political violence and related topics such as network resilience (cyber) and network design. He...
Luca Martelli
Luca Martelli
Oracle EMEA
Currently responsible for Oracle’s Identity and Security portfolio in Europe Middle East and Africa, Luca has spent the majority of his time in security, most recently as Identity &...
Nathan Wenzler
Nathan Wenzler
Thycotic
Nathan has almost two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. Throughout his career,...

How to Measure the Real Access Risk?

There are many factors that make up the access risk of users. Access to privileged accounts, but also elevated privileges in certain applications sum up to a complete picture of access risks. Users with uncommon combinations, user that have fairly different access than their peers, users with many direct assignments of entitlements: All these indicators might be related to higher access risk – or not. Aside of that: Not only the assigned entitlements are risk indicators, but also the use of access rights. Someone might access only the records of customers he is currently working with – or the ones of all customers he potentially has access to. The first one is just normal, the other an indicator of fraud.

However, organizations need to understand the real risks for being able to mitigate these.

In this session, the participants will discuss various approaches on measuring risk, looking at that from various angles.

Niels von der Hude
Niels von der Hude
Beta Systems Software
Niels is Director Market Development IAM at Beta Systems Software. He is a globally recognized IAM thought leader in the market and a very experienced Manager with balanced business and technical...
Dr. Sridhar Muppidi
Dr. Sridhar Muppidi
IBM Security
Dr. Sridhar Muppidi is an IBM Fellow and Chief Technology Officer at IBM Security. He leads the technical strategy, architecture and Research for IBM Security, focused on both securing digital...
Wolfgang Roesch
Wolfgang Roesch
Tesis Sysware
Wolfgang Roesch currently is responsible for the product portfolio at Tesis Sysware. Wolfgang is an innovative strategist, thinking “outside the box” to develop timely solutions to...
Subscribe for updates
Please provide your email address