Access Governance
Facebook Twitter LinkedIn

Access Governance

Combined Session
Wednesday, September 15, 2021 17:00—18:00
Location: ALPSEE

Solving the Access Challenge in Cloud Migration

Berno Snijder
Berno Snijder
Shaped by an extensive career in banking & IT environments, Berno Snijder developed broad knowledge and expertise in  the IT security domain. As account lead security with Accenture he is...

Digital Onboarding

Enterprise hiring in the time of Covid is putting greater emphasis on supporting remote on boarding of new employees. This creates new challenges for the IAM team as it is no longer self evident that new contractors and employees to show up at a physical helpdesk, provide ID and pick up their new accounts. How do you organize the remote onboarding and are there technologies and approaches that are used in digital customer onboarding and KYC processes that can be leveraged to also handle employee onboarding?

Another important aspect is that remote working has become the norm and securing the remote connections is critical. A big part of that effort is to implement MFA at scale but in this situation how do you handle the roll out of the MFA when the users are not present in the office?

How do you support remote onboarding at scale?
How do you roll out MFA to a 100 000 people organisation?
What is the future for remote onboarding of contractors and employees?

Martin Sandren
Martin Sandren
Martin Sandren is a security architect and delivery lead with over eighteen years of experience of various information security related roles. Primarily focused on security architecture and digital...

Panel: Identity vs Authorization - Where to Draw the Line

We will look at OAuth protocol and its misusage for authorization purposes. What is the difference between client and user authorization and at which stage should each happen? We will revise what Identity is at its core and what should or should not be part of it. And what about Group Membership – a ‘domain-driven’ advise how to triage roles between Identity and Authorization. All these best practices are backed by real-life experience.

- OAuth and its misusage as an authorization protocol
- Essence of Identity
- Difference between client authorization and user authorization in the context of OAuth
- Group Membership – where do roles belong?
- Theory backed by practice

Hristomir Hristov
Hristomir Hristov
Hristomir has 15 years of experience in software development and architecture within different technological fields. For the past few years, he has been focusing on strategic implementations of the...
Martin Manov
Martin Manov
Cobuilder International
Martin has 10 years of experience as a software developer in several industries. Currently he is a software architect at Cobuilder. In the past few years, he has been focused on integrating Azure...
Fabian Süß
Fabian Süß
Fabian joined KuppingerCole‘s Events Team in July 2021 as a Project Manager, with a focus in Content and Agenda for the Cybersecurity Leadership Summit. He holds both a M. Eng. in...


On-Demand Access
Re-live EIC 2021
Watch more than 250 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address