Digital Identity, IoT & Privacy
Facebook Twitter LinkedIn

Digital Identity, IoT & Privacy

Expert Talk
Wednesday, May 15, 2019 17:30—18:30
Location: WINTERGARTEN

Increase the Odds - How to Make your IoT Project a Business Success

The Internet of Things - managed or unmanaged devices - plays a significant role across all industries and has the potential to disrupt entire businesses. Even though many IoT projects are being implemented as we speak, many businesses are too late to the game. One of the main challenges during the project planning phase is the value quantification.

The business value increases with the degree of process digitization. Digital Identity solutions, and IoT combined, help to make Information available in near real time throughout the entire business process, not confined to individual data silos. This allows a leaner and more customer/consumer friendly process.

Digitized business processes have many actors (employees, customers, third party and historic data, the device itself and many more). Each actor needs to be uniquely identifiable, and actions need to be recorded for audit purposes. But that is not enough as responsibilities may change over time and data privacy laws must be adhered to.

In this session, we will discuss the importance of digital identity management for an efficient business digitization process, as well as key requirements for such a system.

Increase the Odds - How to Make your IoT Project a Business Success
Presentation deck
Increase the Odds - How to Make your IoT Project a Business Success
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Gerhard Zehethofer
Gerhard Zehethofer
ForgeRock
Gerhard is ForgeRock’s vice president for IoT and manufacturing. He is passionate about leveraging technology to improve people’s business and personal lives. Over the course of his...

Data-Driven Compliance with Privacy Laws

Privacy laws such as GDPR require organizations to know whose data they have, where it is stored, and how they use it. They also have to match consent or agreements for use of the data, and the actual use of their customers’ data.

In this presentation, we will show how privacy compliance can be based on data analytics, and how to automate that, so that continuous compliance can be achieved.

Key takeaways:

- How to build a map of personal data in the enterprise

- Use the data map to automate data subject rights

Jens Kettler
Jens Kettler
BigID
Jens Kettler is a product manager with BigID and responsible for BigID’s data scanners and interfaces.

IDAM Controls to Detect and Prevent insider Fraudulent Access

IDAM Controls to Detect and Prevent insider Fraudulent Access
Presentation deck
IDAM Controls to Detect and Prevent insider Fraudulent Access
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Bala Bhaskar Gurram
Bala Bhaskar Gurram
Wipro Limited
Bala Bhaskar Gurram, General Manager at Wipro heads the Identity and Access Management business practice which provides consulting, architecture, systems integration and managed services and...
Subscribe for updates
Please provide your email address