Cloud Security

  • TYPE: Expert Talk DATE: Wednesday, May 10, 2017 TIME: 17:30-18:30 LOCATION: WINTER GARDEN
Cyber Security Experts Stage


Traditional enterprise perimeters are vanishing due to the sourcing of computing resources and applications from heterogeneous multi-cloud environments. Business processes and sensitive business data are leaving the enterprise domain. Meanwhile, new decentralized identity silos are emerging in the Cloud and have to be managed in order to maintain full access governance. Moreover, the proliferation of mobile devices and the need to collaborate on a global scale are challenging existing Identity & Access Management deployments and processes of organizations and drive them to adapt to more flexible cloud-based Identity & Access Management services. With Identity Protect Pro, Telekom Security helps organizations to master the challenges of the digital transformation and to regain full control over access governance. Identity Protect Pro is operated in a highly secure Telekom data center in line with German data protection legislation and enables organizations to substitute self-managed, complex and expensive on-premises Identity & Access Management deployments by means of managed Identity & Access Management services.


Dietmar Krüger has been working with Deutsche Telekom / T-Systems International  since 1997. He served as technology consultant and IAM system architect within various projects and gained senior-level experience in areas of System Design, System Architecture & Software Development,...

Many organisations that are confident that they have protected themselves from data breaches, have a false sense of security. In fact, they have a dangerous blind spot when it comes to privileged access governance.

Many organisations are managing identity and access for regular users and privileged users in separate silos, blind to the risks of their failure to address privileged access governance (PAG) as part of a unified approach to governance.

Join this session to identify the warning signs, determine whether PAG is right for your organisation and find out how to begin putting in place a PAG solution.


SSH user keys provide access to your most critical infrastructure and applications, both on premise and in the cloud. Unlike other access credentials they are the ONLY form of access that can be self-provisioned without oversight, never expire, & are not clearly linked to identity and governance polices or systems. In this session we will demonstrate for you the challenge enterprises face today and how to gain visibility, control & governance of this unharnessed access.


Log in to download presentations:  


Session Links

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany