IAM Blueprint & Compliance

  • TYPE: Combined Session DATE: Wednesday, May 16, 2018 TIME: 11:00-12:00 LOCATION: ALPSEE


In this session, Martin Kuppinger will show the KuppingerCole IAM blueprint. This blueprint serves as a high-level architectural view on IAM, mapping use cases, capabilities, and technical building blocks. It helps organizations to understand where to best split the IAM. It helps understanding which building blocks are required for supporting urging business demands and thus prioritizing investments. It helps aligning Enterprise IAM and Consumer IAM initiatives. This big picture provides the foundation for planning and adjusting your IAM programme.


Dan Blum is an internationally-recognized expert in security, privacy, cloud computing, identity management and works as Senior Analyst at KuppingerCole. He develops Security Architects Partners’ business partnerships, creates content and leads consulting engagements. Blum provides...

Strategic overview of the Identity landscape and trends. Digital identity used to be mainly revolving around a simple user account, with the objective to claim access to a system. How is digital identity evolving in the technical landscape of today, and how do biometrics, new legislation and new authentication technologies, self-sovereign identity and other elements play together to solve business problems most banks are confronted with?

Some of the practical use cases and scenarios.


Jacoba Sieders is an all-round digital identity- and information security expert. She has 18 years of experience in consultancy, development and strategy in the area of digital identity and Access Control. Before joining ABNAMRO as the leading expert for digital identity and access control...

As GDPR is officially in place as of May 2018, many organizations have already taken the steps to formalize security requirements and security implementation to effectively comply with the GDPR legislation. This includes putting security controls in place that can safeguard the rights and privacy of the data subjects (the citizens and employees) as well as helping the data controllers and processors minimize the risks of storing and handling sensitive PII (Personal Identifiable Information) data.

This effort spans across different business processes, IT domains, and applications. In order to reach the broad spectrum a requirements and technologies organizations will need to implement a strong data protection program. A vital component in this program is a dynamic access control capability. The purpose of the access control mechanism is to enforce a common, consistent and contextual sensitive access control model across PII data and sensitive transactions.

In this presentation, we will highlight both the business and technical aspects of why and how a dynamic access control mechanism can help organizations, and how policy based authorization can play a key role in a GDPR-driven Data Protection program.

Key Takeaways:

  • Minimize data exposure and the risk of a breach
  • Solve enterprise-wide privacy, trust, and risk issues
  • Advance your digital initiatives to include the principles of ‘Privacy by Design’ and "Privacy by Default"
  • Enforce the user’s consent across your applications
  • Visibility into access control activities


Måns wears a number of hats at Axiomatics, including managing customer relationships by assisting customers with product evaluations, demonstrating how our solutions work and how they help meet customer needs, conducting product training, and assisting customers with policy modeling. His...

Log in to download presentations:  


Session Links

Munich, Germany


European Identity & Cloud Conference 2018

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 15 - 18, 2018 Munich, Germany