Speaker details

Darran Rolls Research and Advisory Fellow

KuppingerCole

@djrolls   

Mr. Darran Rolls is a research and advisory Fellow at Kuppinger Cole. He has a long history in Identity Management and Security at companies ranging from Tivoli Systems - IBM, Waveset Technologies, Sun Microsystems and SailPoint Technologies. Over the past 20 plus years Mr. Rolls has helped design, build and deliver innovative, groundbreaking technology solutions that have defined and shaped the Identity and Access Management industry. For over 12 years, Darran was the Chief Technology Officer at SailPoint and he spent 4 years as the company’s Chief Information Security Officer, leading internal security and compliance through their successful IPO in late 2017. Today, Mr. Rolls is a Identity & Security technology specialist working exclusively with Kuppinger Cole as a research analyst and Fellow. Mr. Rolls also continues to work independently with customers and technology investors to help design and delivering the next generation of IAM solutions worldwide. Mr. Rolls has also been a frequent contributor to IAM standards at OASIS, the W3C and the IETF. He frequently speaks at industry events and to customers about IAM technologies and security solutions, offering a unique vendor In/Out perspective on designing, delivering and deploying an Identity-centric, Zero Trust oriented enterprise security architecture.
In December of 2019 Darran co-authored one of the industry’s leading texts on using IAM technologies to enhance the prevention, detection and mitigation of cyber-attacks. “Identity Attack
Vectors – Implementing an Effective Identity & Access Management Solution” is available from Amazon and leading technical book sellers at ISBN 13:978-1484251645.

 Sessions

Date Title

Cybersecurity Leadership Summit 2020

Nov 10, 2020
14:00‑14:20
Session
The Confessions of an X-CISO: Identity Centric Security @ Enterprise Scale
Session Details
Nov 10, 2020
14:20‑14:40
Panel
Panel - Zero Trust Paradigm for the Future of Security
Session Details

Identity Governance & Administration and Next Generation Access

Sep 15, 2020
13:20‑13:40
Session
Standing on the Beach, Looking at the Sea: Identity Governance & Administration, Today, Tomorrow and Sometime Later
Session Details
Sep 15, 2020
13:40‑14:00
Panel
Panel - Re-Envisioning the Adoption of IGA in the Enterprise
Session Details

European Identity & Cloud Conference 2017

May 10, 2017
11:00‑12:00
Authentication Trends
Gooey on the Inside: Common Failures in Authentication Centric Security Architectures
Session Details
May 10, 2017
14:30‑15:30
Governance & Risk Based Cybersecurity Strategy
Achieving Enhanced Security While Driving Business Growth with the Power of Identity
Session Details

European Identity & Cloud Conference 2016

May 11, 2016
11:00‑12:00
The Transformation of Identity
Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem
Session Details
May 12, 2016
17:00‑18:00
IAM Takeaways & Homework Session
The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
Session Details

European Identity & Cloud Conference 2015

May 06, 2015
11:00‑12:00
Security for the Digital Business
IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Session Details
May 07, 2015
14:30‑15:30
Dynamic Authorization
The Future of Authorization
Session Details
May 07, 2015
15:30‑16:30
IAM as a Managed Service
Experiences with IAM as a Service and/or IAM Managed Service
Session Details

European Identity & Cloud Conference 2014

May 14, 2014
15:30‑16:30
IAM/IAG Vendor Landscape
The 5 Critical Tenets of Identity and Access Management
Session Details
May 14, 2014
17:30‑18:30
Access & Data Governance
What Is the Level of Detail, an IAM Solution Must Cover?
Session Details
May 15, 2014
14:30‑15:30
Measuring IAM/IAG Maturity
From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly
Session Details

European Identity & Cloud Conference 2013

May 15, 2013
11:30‑12:30
Going beyond static Assignments
Access Governance: How to Govern all Access
Session Details
May 15, 2013
14:00‑15:00
SAML, OAuth, SCIM, XACML
OASIS Panel: ID Protocols – Out with the Old and in with the New?
Session Details
May 15, 2013
15:00‑16:00
Combined Session
Access Intelligence: The New Standard Feature of Access Governance?
Session Details
May 16, 2013
14:00‑15:00
Combined Session
Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile
Session Details
May 16, 2013
14:00‑16:00
Roundtable
Fighting Hydra – Strategies for Audit and Control of large Numbers of Applications
Session Details

European Identity & Cloud Conference 2012

Apr 18, 2012
11:30‑12:30
The Future IT Organization
The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
Session Details
Apr 18, 2012
15:00‑16:00
SCIM
Simple Cloud Identity Management (SCIM)
Session Details
Apr 19, 2012
14:00‑15:00
Access Intelligence
Beyond the Pioneer Approaches - The next Level in Access Governance and Risk
Session Details
Apr 19, 2012
15:00‑16:00
Federation vs. Synchronization
Federation or Synchronization – the Future of the Cloud
Session Details

European Identity Conference 2011

May 11, 2011
10:30‑11:30
Combined Session
Adopting IAM Standards in the Enterprise
Session Details
May 12, 2011
11:30‑12:30
Combined Session
Identity Governance - Creating Business Value and Solving Compliance Challenges
Session Details
May 12, 2011
15:00‑16:00
Combined Session
Identity and Access in the Cloud
Session Details

European Identity Conference 2010

May 04, 2010
17:00‑17:30
Keynote
Next-Generation Provisioning: A Governance-based Approach
Session Details
May 05, 2010
10:30‑11:30
Combined Session
Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution
Session Details
May 05, 2010
14:00‑15:00
Combined Session
Simplifying & Streamlining Access Delivery while Embedding Governance through Preventative Control.
Session Details

European Identity Conference 2009

May 05, 2009
14:30‑15:00
Keynote
Is there a difference between the European way of doing IAM/GRC and „the rest of the world“? If yes, why? And what?”
Session Details
May 07, 2009
10:30‑11:30
Role Lifecycle Management
Role Lifecycle Management: Making Role Concepts Work
Session Details
May 07, 2009
15:00‑16:00
Combined Session
Seeing the Big Picture: Context-Based Authentication
Session Details
May 07, 2009
16:30‑17:30
Combined Session
Standards for Policies and Risk Management: What do we have, what do we need?
Session Details

European Identity Conference 2008

Apr 23, 2008
14:00‑15:00
Combined Session
Panel: New School Access Compliance and Risk Management Innovation
Session Details
Apr 24, 2008
14:00‑15:00
Business Roles - Methods and Tools
Enterprise Role Management instead of Identity Role Management?
Session Details
Apr 25, 2008
14:00‑15:30
Workshop
The Role of Roles in Compliance – A Practical Approach
Session Details
Apr 25, 2008
16:00‑17:30
Workshop
The Role of Roles in Compliance – A Practical Approach
Session Details