Prime Discount
expires in
Register Now

Agenda

Identity Security II

Identity Security II

Session
Wednesday, November 15, 2023 15:30—16:30
Location: Sirius
Log in to download presentations

Enabling the Power of Digitalization with Identity-Based Access Privileges
15:30—15:50

Watch the video

 

As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has never been more vital. Strong identity-based access to applications not only fortifies security by allowing organizations to grant privileges based on verified identities, buy it also enables real-time threat detection, compliance adherence, and adaptive scalability. You’ll always know with certainty who is connecting to what and what they’re doing while they’re connected. Join us to explore how this approach empowers modern hybrid organizations to strike the delicate balance between safety, security, user experience and the transformative potential of true digitalization.

Joe O’Donnell
GM OT/IOT-SVP Corporate Development
Cyolo
Joe has held senior management positions over his plus 30 years in cyber security. He has built programs, teams, and lines of business at many market leaders such as Cisco Systems, Nortel,...
Panel: Autonomous yet accountable: Do We Need Identities for AI?
15:50—16:10

Watch the video

 

This session aims to explore the practicalities and paradigms of integrating AI identities into current and future digital infrastructures. Topics will include the regulatory and governance challenges posed by autonomous AI operations, the technical requirements for creating and managing AI identities, and the technical and even legal considerations of recognizing AI as identifiable entities, focusing on accountability and traceability within various frameworks.

Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Matthias Reinwarth
Head of Advisory
KuppingerCole
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias...
Drs. Jacoba C. Sieders
Consultant, Strategic Digital Identity
Independent
Jacoba is a digital identity expert, eager to make digital life better and a lot more secure than it is today. Keynote speaker at international IAM congresses and teacher of masterclasses. ...
Operational concepts with the WALLIX tiering model
16:10—16:30

Watch the video

 

Lack of control and controllability is increasingly a problem in many internal IT departments today. The complexity of the solutions used has steadily increased. It is therefore all the more important that information security systems are optimally set up and easy to operate and administer.

Establishing a risk class-based access management system makes sense for many reasons. In addition to meeting compliance requirements such as ISO27001, BSI IT-Grundschutz or industry standard 62443 and integrating seamlessly into a risk-based approach followed in the information security management system, this approach promotes the regaining of control over all possible accesses to company or organisational systems, regardless of these requirements.

Stefan Rabben
Sales Director DACH
WALLIX GmbH
Stefan Rabben is Area Sales Director DACH & Eastern Europe at the WALLIX Group. The graduate information technology engineer previously spent more than seven years at Quest and Dell in various...
Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch