Governance & Risk Based Cybersecurity Strategy

  • TYPE: Expert Talk DATE: Wednesday, May 10, 2017 TIME: 14:30-15:30 LOCATION: WINTER GARDEN
Cyber Security Experts Stage


A Risk based Strategy is in great demand for all organizations, but how do you formulate a risk approach that can realize a practical deployment? Are there practical examples of how to do this and can I use them to be effective in stopping the wide array of threats facing my organization? Where do you start and what tools and customized frameworks can help you to move beyond compliance to risk-based strategy that your management understands and supports? Learn how in the discussion of what others are doing and take it past just a strategy and risk approach to a practical reality.

Key Takeaways:

  • Learn about risk based Strategy
  • How do you formulate a risk approach that can realize a practical deployment
  • Learn where you start & what tools can help with risk based strategy
  • Learn to get past strategy and to the practical reality


Peter Allor is the Senior Cyber Security Strategist for IBM Security. He has been instrumental in IBM's strategy and development for securing Critical Infrastructures, Central Government Operations and Certifications. He focuses on developing solutions that integrate the full spectrum of...

The world today is more advanced and interconnected than it ever has been before. The channels for information and systems access are now many and varied. In today’s IT environment, it is far easier to gain information and access through these new channels and much harder to protect it. Every business today walks the fine line between business-enabled access and appropriate security and privacy. Information security investment involves a complex set of competing priorities. Most enterprises have made significant investments in endpoint protection, anti-virus, encryption, network security monitoring and much more. Sensitive information must be protected since the consequences of not doing so are catastrophic. But what is the cost of all this security? Are we striking the right balance between convenience and controls? Have we become so paralysed by the technology that we are losing our ability to be innovative and enhance core business drivers? Are we foregoing competitive advantage and business expansion in order to stay safe?


Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...


André Koot has more than 25 years of experience in the field of information security, and as an economist he practices this from a business point of view. The last 15 years he specializes in the field of Identity Management and Access Control, both as an architect and as a consultant. In...

Watch the video:  
Log in to download presentations:  


Session Links

André Koot - From RBAC to ABAC in a Pragmatic Way

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany