Building Blocks for a Complete Access Management Strategy and Implementation
Facebook Twitter LinkedIn

Building Blocks for a Complete Access Management Strategy and Implementation

Combined Session
Thursday, May 12, 2011 14:00—15:00
Location: Auditorium

This session will discuss the elements required to fulfill regulatory compliance as well as administrative requirements. Access Management, especially in virtualized and cloud environments, needs a set of technologies which have to be well integrated. Access Governance, Provisioning, PxM (Privileged Access, Account, Identity, User) Management and as well SIEM play a vital role. But there are links to virtualization security products, web access management and versatile/risk-based authentication and authorization, network security tools and other technologies as well. Learn what you need to fulfill the requirements and how to establish few consistent and strong lines of defense and access management.

Stefan Dodel
Stefan Dodel
Oracle
Stefan is responsible for advising customers, partners and Oracle organisations on I&AM solutions and architecture across EMEA. He has been working in the areas of Identity and Access...
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Maarten Stultjens
Maarten Stultjens
BHOLD Company B.V.
Maarten Stultjens is responsible for the IT-Audit products at BHOLD Company, a software vendor for access control and access management. He started in 2001 at BHOLD to introduce its RBAC-software...
Heinrich Wilking
Heinrich Wilking
Turnkey Consulting
Heinrich Wilking is Director at Turnkey Consulting where he is Subject Matter Expert for SAP Business Objects GRC Process Control and Identity and Access Governance. He workes at large and...
Subscribe for updates
Please provide your email address