Speaker details

Darran Rolls CTO & CISO

SailPoint

@djrolls   

Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies ranging from Tivoli Systems, IBM, Waveset, Sun Microsystems and now SailPoint, Mr. Rolls has helped design, built and deliver innovative, ground-breaking technology solutions that have defined and shaped the identity and access management industry. Mr. Rolls frequently speaks at industry events and to customers about identity and access management, and next generation enterprise security solutions.

 Sessions

Date Title

European Identity & Cloud Conference 2017

May 10, 2017
11:00‑12:00
Authentication Trends
Gooey on the Inside: Common Failures in Authentication Centric Security Architectures
Session Details
May 10, 2017
14:30‑15:30
Governance & Risk Based Cybersecurity Strategy
Achieving Enhanced Security While Driving Business Growth with the Power of Identity
Session Details

European Identity & Cloud Conference 2016

May 11, 2016
11:00‑12:00
The Transformation of Identity
Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem
Session Details
May 12, 2016
17:00‑18:00
IAM Takeaways & Homework Session
The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
Session Details

European Identity & Cloud Conference 2015

May 06, 2015
11:00‑12:00
Security for the Digital Business
IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Session Details
May 07, 2015
14:30‑15:30
Dynamic Authorization
The Future of Authorization
Session Details
May 07, 2015
15:30‑16:30
IAM as a Managed Service
Experiences with IAM as a Service and/or IAM Managed Service
Session Details

European Identity & Cloud Conference 2014

May 14, 2014
15:30‑16:30
IAM/IAG Vendor Landscape
The 5 Critical Tenets of Identity and Access Management
Session Details
May 14, 2014
17:30‑18:30
Access & Data Governance
What Is the Level of Detail, an IAM Solution Must Cover?
Session Details
May 15, 2014
14:30‑15:30
Measuring IAM/IAG Maturity
From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly
Session Details

European Identity & Cloud Conference 2013

May 15, 2013
11:30‑12:30
Going beyond static Assignments
Access Governance: How to Govern all Access
Session Details
May 15, 2013
14:00‑15:00
SAML, OAuth, SCIM, XACML
OASIS Panel: ID Protocols – Out with the Old and in with the New?
Session Details
May 15, 2013
15:00‑16:00
Combined Session
Access Intelligence: The New Standard Feature of Access Governance?
Session Details
May 16, 2013
14:00‑15:00
Combined Session
Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile
Session Details
May 16, 2013
14:00‑16:00
Roundtable
Fighting Hydra – Strategies for Audit and Control of large Numbers of Applications
Session Details

European Identity & Cloud Conference 2012

Apr 18, 2012
11:30‑12:30
The Future IT Organization
The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
Session Details
Apr 18, 2012
15:00‑16:00
SCIM
Simple Cloud Identity Management (SCIM)
Session Details
Apr 19, 2012
14:00‑15:00
Access Intelligence
Beyond the Pioneer Approaches - The next Level in Access Governance and Risk
Session Details
Apr 19, 2012
15:00‑16:00
Federation vs. Synchronization
Federation or Synchronization – the Future of the Cloud
Session Details

European Identity Conference 2011

May 11, 2011
10:30‑11:30
Combined Session
Adopting IAM Standards in the Enterprise
Session Details
May 12, 2011
11:30‑12:30
Combined Session
Identity Governance - Creating Business Value and Solving Compliance Challenges
Session Details
May 12, 2011
15:00‑16:00
Combined Session
Identity and Access in the Cloud
Session Details

European Identity Conference 2010

May 04, 2010
17:00‑17:30
Keynote
Next-Generation Provisioning: A Governance-based Approach
Session Details
May 05, 2010
10:30‑11:30
Combined Session
Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution
Session Details
May 05, 2010
14:00‑15:00
Combined Session
Simplifying & Streamlining Access Delivery while Embedding Governance through Preventative Control.
Session Details

European Identity Conference 2009

May 05, 2009
14:30‑15:00
Keynote
Is there a difference between the European way of doing IAM/GRC and „the rest of the world“? If yes, why? And what?”
Session Details
May 07, 2009
10:30‑11:30
Role Lifecycle Management
Role Lifecycle Management: Making Role Concepts Work
Session Details
May 07, 2009
15:00‑16:00
Combined Session
Seeing the Big Picture: Context-Based Authentication
Session Details
May 07, 2009
16:30‑17:30
Combined Session
Standards for Policies and Risk Management: What do we have, what do we need?
Session Details

European Identity Conference 2008

Apr 23, 2008
14:00‑15:00
Combined Session
Panel: New School Access Compliance and Risk Management Innovation
Session Details
Apr 24, 2008
14:00‑15:00
Business Roles - Methods and Tools
Enterprise Role Management instead of Identity Role Management?
Session Details
Apr 25, 2008
14:00‑15:30
Workshop
The Role of Roles in Compliance – A Practical Approach
Session Details
Apr 25, 2008
16:00‑17:30
Workshop
The Role of Roles in Compliance – A Practical Approach
Session Details

Stay Connected

Top Events

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Conference

Customer Technology World 2020

Understanding your customer’s wishes and requirements and mapping them successfully with CIAM processes is the key to a successful online business. At the Customer Technology World you will learn how to create a customer-centric strategy for your digital business.

Conference

Cybersecurity Leadership Summit 2020

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

Next Seminar

Training

KC Master Class - PAM for the 2020s

KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.

Popular Webcasts