Speaker details

Darran Rolls
Research and Advisory Fellow
KuppingerCole
@djrolls
Mr. Darran Rolls is a research and advisory Fellow at Kuppinger Cole. He has a long history in Identity Management and Security at companies ranging from Tivoli Systems - IBM, Waveset Technologies, Sun Microsystems and SailPoint Technologies. Over the past 20 plus years Mr. Rolls has helped design, build and deliver innovative, groundbreaking technology solutions that have defined and shaped the Identity and Access Management industry. For over 12 years, Darran was the Chief Technology Officer at SailPoint and he spent 4 years as the company’s Chief Information Security Officer, leading internal security and compliance through their successful IPO in late 2017. Today, Mr. Rolls is a Identity & Security technology specialist working exclusively with Kuppinger Cole as a research analyst and Fellow. Mr. Rolls also continues to work independently with customers and technology investors to help design and delivering the next generation of IAM solutions worldwide. Mr. Rolls has also been a frequent contributor to IAM standards at OASIS, the W3C and the IETF. He frequently speaks at industry events and to customers about IAM technologies and security solutions, offering a unique vendor In/Out perspective on designing, delivering and deploying an Identity-centric, Zero Trust oriented enterprise security architecture.
In December of 2019 Darran co-authored one of the industry’s leading texts on using IAM technologies to enhance the prevention, detection and mitigation of cyber-attacks. “Identity Attack
Vectors – Implementing an Effective Identity & Access Management Solution” is available from Amazon and leading technical book sellers at ISBN 13:978-1484251645.
Sessions
Date | Title |
---|---|
Cybersecurity Leadership Summit 2020 |
|
Nov 10, 2020
14:00‑14:20 |
Session The Confessions of an X-CISO: Identity Centric Security @ Enterprise Scale Session Details |
Nov 10, 2020
14:40‑15:00 |
Panel Panel - Zero Trust Paradigm for the Future of Security Session Details |
Nov 10, 2020
16:00‑17:00 |
Session Identity Attack Vectors: The Concept, the Book and the Authors Session Details |
Identity Governance & Administration and Next Generation Access |
|
Sep 15, 2020
13:20‑13:40 |
Session Standing on the Beach, Looking at the Sea: Identity Governance & Administration, Today, Tomorrow and Sometime Later Session Details |
Sep 15, 2020
13:40‑14:00 |
Panel Panel - Re-Envisioning the Adoption of IGA in the Enterprise Session Details |
European Identity & Cloud Conference 2017 |
|
May 10, 2017
11:00‑12:00 |
Authentication Trends Gooey on the Inside: Common Failures in Authentication Centric Security Architectures Session Details |
May 10, 2017
14:30‑15:30 |
Governance & Risk Based Cybersecurity Strategy Achieving Enhanced Security While Driving Business Growth with the Power of Identity Session Details |
European Identity & Cloud Conference 2016 |
|
May 11, 2016
11:00‑12:00 |
The Transformation of Identity Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem Session Details |
May 12, 2016
17:00‑18:00 |
IAM Takeaways & Homework Session The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections Session Details |
European Identity & Cloud Conference 2015 |
|
May 06, 2015
11:00‑12:00 |
Security for the Digital Business IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom Session Details |
May 07, 2015
14:30‑15:30 |
Dynamic Authorization The Future of Authorization Session Details |
May 07, 2015
15:30‑16:30 |
IAM as a Managed Service Experiences with IAM as a Service and/or IAM Managed Service Session Details |
European Identity & Cloud Conference 2014 |
|
May 14, 2014
15:30‑16:30 |
IAM/IAG Vendor Landscape The 5 Critical Tenets of Identity and Access Management Session Details |
May 14, 2014
17:30‑18:30 |
Access & Data Governance What Is the Level of Detail, an IAM Solution Must Cover? Session Details |
May 15, 2014
14:30‑15:30 |
Measuring IAM/IAG Maturity From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly Session Details |
European Identity & Cloud Conference 2013 |
|
May 15, 2013
11:30‑12:30 |
Going beyond static Assignments Access Governance: How to Govern all Access Session Details |
May 15, 2013
14:00‑15:00 |
SAML, OAuth, SCIM, XACML OASIS Panel: ID Protocols – Out with the Old and in with the New? Session Details |
May 15, 2013
15:00‑16:00 |
Combined Session Access Intelligence: The New Standard Feature of Access Governance? Session Details |
May 16, 2013
14:00‑15:00 |
Combined Session Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile Session Details |
May 16, 2013
14:00‑16:00 |
Roundtable Fighting Hydra – Strategies for Audit and Control of large Numbers of Applications Session Details |
European Identity & Cloud Conference 2012 |
|
Apr 18, 2012
11:30‑12:30 |
The Future IT Organization The Future of Identity & Access Management: Embrace, Extend - and don't Replace? Session Details |
Apr 18, 2012
15:00‑16:00 |
SCIM Simple Cloud Identity Management (SCIM) Session Details |
Apr 19, 2012
14:00‑15:00 |
Access Intelligence Beyond the Pioneer Approaches - The next Level in Access Governance and Risk Session Details |
Apr 19, 2012
15:00‑16:00 |
Federation vs. Synchronization Federation or Synchronization – the Future of the Cloud Session Details |
European Identity Conference 2011 |
|
May 11, 2011
10:30‑11:30 |
Combined Session Adopting IAM Standards in the Enterprise Session Details |
May 12, 2011
11:30‑12:30 |
Combined Session Identity Governance - Creating Business Value and Solving Compliance Challenges Session Details |
May 12, 2011
15:00‑16:00 |
Combined Session Identity and Access in the Cloud Session Details |
European Identity Conference 2010 |
|
May 04, 2010
17:00‑17:30 |
Keynote Next-Generation Provisioning: A Governance-based Approach Session Details |
May 05, 2010
10:30‑11:30 |
Combined Session Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution Session Details |
May 05, 2010
14:00‑15:00 |
Combined Session Simplifying & Streamlining Access Delivery while Embedding Governance through Preventative Control. Session Details |
European Identity Conference 2009 |
|
May 05, 2009
14:30‑15:00 |
Keynote Is there a difference between the European way of doing IAM/GRC and „the rest of the world“? If yes, why? And what?” Session Details |
May 07, 2009
10:30‑11:30 |
Role Lifecycle Management Role Lifecycle Management: Making Role Concepts Work Session Details |
May 07, 2009
15:00‑16:00 |
Combined Session Seeing the Big Picture: Context-Based Authentication Session Details |
May 07, 2009
16:30‑17:30 |
Combined Session Standards for Policies and Risk Management: What do we have, what do we need? Session Details |
European Identity Conference 2008 |
|
Apr 23, 2008
14:00‑15:00 |
Combined Session Panel: New School Access Compliance and Risk Management Innovation Session Details |
Apr 24, 2008
14:00‑15:00 |
Business Roles - Methods and Tools Enterprise Role Management instead of Identity Role Management? Session Details |
Apr 25, 2008
14:00‑15:30 |
Workshop The Role of Roles in Compliance – A Practical Approach Session Details |
Apr 25, 2008
16:00‑17:30 |
Workshop The Role of Roles in Compliance – A Practical Approach Session Details |
Stay Connected
Top Event
European Identity & Cloud Conference 2021
Sep 13 - 16, 2021 in Munich, Germany
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.