Speaker details

John Hermans Partner

KPMG

John is partner of the Amstelveen practice of KPMG IT Advisory. In his current position he is heading the Information Security Services of KPMG in Netherland, covering the following services:

  • lSecurity Strategy Services
  • lIT Governance, Risk and Compliance
  • lTechnical Security Services
  • lIdentity & Access Management
  • lBusiness Continuity services

John is member of KPMG’s global leadership on Information Security as well the global lead of Identity & Access Management Services within KPMG.

Furthermore, John is leading the Cloud Computing Services within KPMG Netherlands. In this role he is responsible for (setup of) the services portfolio concerning Cloud Computing, including advisory services as well as auditing services. John is member of KPMG’s Global Cloud Enablement Program Steering Group .

Professional and industry experience 

John worked for numerous organisations in most industry sectors, such as Financial Service, Oil & Gas, Government and others. John was involved in more than 100 national and international information security projects across the world. John’s major involvements were in assisting clients in their strategy, building the business case and perform program management activities as well as quality assurance activities.

Next to being involved in information security projects, John was involved in numerous cloud computing projects in private and public sector. John’s major involvements were in assisting clients in their cloud computing strategy as well as in advising on cloud security/assurance advisory topics.

 Sessions

Date Title

European Identity & Cloud Conference 2015

May 06, 2015
15:30‑16:30
Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
Session Details
May 07, 2015
08:30‑08:50
"Guiding" the Management and Supervisory Boards to Choose the Right Investment Priorities for Cyber Risk Mitigation
Session Details
May 07, 2015
12:00‑13:00
Cloud Contracting Risks
Reaching Compliance Across Jurisdictions: Fundamental Considerations Before Signing a Cloud Services Contract
Session Details

European Identity Conference 2011

May 11, 2011
10:30‑11:30
Assessing the Risks of Cloud Computing
Session Details

European Identity Conference 2010

May 04, 2010
15:00‑15:30
Trust in the Cloud
Session Details
May 05, 2010
15:00‑16:00
Panel: Reducing the Risk of Information Leaks: DLP, IRM or both?
Session Details

European Identity Conference 2009

May 06, 2009
10:30‑11:30
Re-Assessing IAM-Strategy in Turbulant Times - Cost Optimisation Approaches for IAM Initiatives
Session Details
May 06, 2009
11:30‑12:30
An Ounce of Prevention is Worth a Pound of Cure - Moving from Detective Controls to Automated Prevention.
Session Details

European Identity Conference 2008

Apr 24, 2008
14:00‑15:00
Business Roles - Methods and Tools
Methodical Approaches to Business Roles
Session Details
Apr 24, 2008
16:30‑17:30
Panel: Role-based Analytics for Effective GRC - How to Quickly Deploy IT Controls to Address Regulatory Requirements
Session Details

 Moderation

Title

European Identity & Cloud Conference 2015

Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Track Details

European Identity Conference 2011

Audit-Proof Access Management
Track Details
Governance, Risk Management & Compliance (GRC)
Track Details
Information Governance
Track Details
Managing the New Risks
Track Details

European Identity Conference 2010

Linking IdM & GRC to Corporate Performance
Track Details
Mitigating Risk
Track Details
Privacy & Regulation
Track Details
Roles & Attributes
Track Details

Stay Connected

Top Events

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Popular Webcasts