Access Governance: Tales from the Trenches

  • TYPE: Combined Session DATE: Wednesday, May 05, 2010 TIME: 11:30-12:30 LOCATION: Galaxis


Getting in control with regard to users and their authorizations is probably one of the most mentioned goals of IAM projects in the last couple of years. It sounds good, it feels good and it fits the GRC business speak perfectly. But many IAM projects have been and probably are struggling. Execution requires perseverance and effective change management. Due to budget cuts, project scope changes and seemingly everlasting emerging technologies the desired business ability to prove being in control unfortunately remains a challenge. In his presentation Dennis will share key lessons learned of several Access Governance projects carried out in 2009 and of projects still in flight.


Dennis is an enthusiastic professional with over 10 years experience with aligning business and IT in general and with regard to IT-security and GRC in particular. His experience ranges from managing complex IAM implementation projects to advising clients on IAM strategy, governance,...

When does Identity Risk become material to the business? How do we know when such risks become realized? Where do IT GRC controls appear in a multi-level risk strategy? These are some of the questions that large organizations are starting to ask. We present some answers for debate on this topic.


Seasoned Security & Information Risk professional with 19 years experience of business development, consulting, pre-sales, project and product management in the IT industry. 10 year track record working in the Identity Management field with in-depth expertise of technologies including...

Ships that pass in the night, and speak each other in passing, only a signal shown, and a distant voice in the darkness; So on the ocean of life, we pass and speak one another, only a look and a voice, then darkness again and a silence." Is this an accurate description of identity management and GRC projects? Or, are identity management and GRC projects so closely related that there are no identity management projects but just GRC projects? In this session Jackson Shaw will discuss the business and technical drivers of GRC and IAM projects along with who are the “personas” in an organization who are driving these projects all to answer these questions: Is identity management dead? Is GRC the new identity management?


Priska Altorfer manging partner at wikima4, is a specialist in Continues Control Management, Identity Management, services and products for SAP environments. She has more than ten years of experience in both in international trading and IT. At wikima4 she focuses on development and implementation...

Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...

Log in to download the presentation:  


Session Links


European Identity Conference 2010

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 04 - 07, 2010 Munich