Speaker details

Mike Small
Senior Analyst
KuppingerCole
@MikeSmall64
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.
With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.
Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.
Sessions
Date | Title |
---|---|
Cybersecurity Leadership Summit 2022 |
|
Nov 10, 2022 14:20‑14:40 |
Privacy and Security NIS2 Directive – What It Is and Why You Need to Prepare |
European Identity and Cloud Conference 2022 |
|
May 11, 2022 11:20‑11:40 |
Multi-Cloud/Multi-Hybrid Panel: Multi-Cloud Agility Must-Haves |
May 11, 2022 12:20‑13:00 |
CIEM and Beyond Panel: Cloud Infrastructure Entitlement Management (CIEM) : Managing Your Cloud Scale Risk with an Identity Defined Security Approach |
May 11, 2022 14:50‑15:10 |
Multi-Cloud KC Market Compass: European Hosted Hybrid IaaS Cloud |
May 13, 2022 10:30‑11:00 |
Identity & Cyber Assessment Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds |
Cybersecurity Leadership Summit 2021 |
|
Nov 10, 2021 12:20‑12:40 |
Cybersecurity Governance and Risk Management I Post Schrems II Cloud Adoption |
European Identity and Cloud Conference 2021 |
|
Sep 15, 2021 11:00‑11:30 |
Everything CIEM Clouds for all Seasons |
Cloud Strategy Optimization - Ensuring Efficient and Secure Collaboration on Cloud |
|
Jul 07, 2021 14:10‑14:30 |
Keynote A Cloud for all Seasons |
cybernetix.world 2020 |
|
Nov 24, 2020 10:00‑13:00 |
Workshop AI Governance: Doing AI Ethically is Doing AI Right |
Customer Identity & Marketing Automation |
|
Jul 16, 2020 17:20‑17:40 |
Session Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement |
Cloud First - Strategy & Roadmap |
|
Jun 16, 2020 10:50‑11:10 |
Session Cloud Backup and Disaster Recovery Why This Is an Essential Component of Digital Transformation |
Jun 16, 2020 14:40‑15:00 |
Session Panel - Governing Your Hybrid Cloud |
Cybersecurity Leadership Summit 2019 |
|
Nov 12, 2019 09:00‑16:00 |
Incident Response Boot Camp Are You Ready For When A Cyber Incident Occurs? |
Nov 13, 2019 14:00‑14:30 |
Effective Response & Recovery Digital Transformation Resilience - Are You Really Prepared? |
Nov 13, 2019 15:20‑15:40 |
Risk Management & Best Practices Cyber Resilience – Every Second Counts (Video) |
European Identity & Cloud Conference 2019 |
|
May 14, 2019 09:00‑13:00 |
AI – Myths, Reality and Challenges Artificial Intelligence & Machine Learning in Cybersecurity 101 |
May 15, 2019 11:00‑12:00 |
AI & ML for Cybersecurity AI for the Future of your Business |
May 15, 2019 17:30‑18:30 |
AI Ethics The 6 Major Ethical Issues of AI |
May 15, 2019 19:20‑20:10 |
Networking Event European Identity & Cloud Awards Ceremony |
European Identity & Cloud Conference 2018 |
|
May 17, 2018 17:00‑18:00 |
Hybrid Cloud Going Hybrid: Who’s Best in Delivering the Infrastructure? |
May 18, 2018 09:00‑12:30 |
Hybrid Cloud Hybrid Cloud Done Right |
Digital Finance World 2018 |
|
Mar 01, 2018 11:00‑12:00 |
Impact of GDPR and Meeting its Requirements GDPR and Financial Services – Imperatives and Conflicts |
Mar 01, 2018 15:00‑16:00 |
Compliance and Beyond PSD2 – Does the RTS Prohibit Secure Customer Authentication? |
Privacy Engineering: Tools to Kickstart Your GDPR Compliance |
|
May 09, 2017 09:00‑10:15 |
Combined Session Welcome |
May 09, 2017 09:00‑10:15 |
Combined Session The Privacy Battlefield – What does the GDPR Require? |
European Identity & Cloud Conference 2017 |
|
May 09, 2017 09:00‑13:00 |
OASIS Privacy Engineering Workshop Privacy Engineering: Tools to Kickstart Your GDPR Compliance |
Privacy Engineering: Tools to Kickstart Your GDPR Compliance |
|
May 09, 2017 11:30‑13:00 |
Combined Session Workshop Panel Discussion and Wrap up |
European Identity & Cloud Conference 2017 |
|
May 10, 2017 11:00‑12:00 |
Cyber Challenges Today & Tomorrow Cyber Threat Intelligence - What this is and why it Matters? |
May 10, 2017 12:00‑13:00 |
GDPR + CIAM Turning GDPR Compliance into a Competitional Advantage Through Customer Identity Management (CIAM) |
May 11, 2017 15:30‑16:30 |
CASB Cloud Access Security Brokers - Why you Need one to Ensure GDPR Compliance |
May 11, 2017 17:00‑18:00 |
Online Identity Verification AML & PSD2 Compliant Online Identification: Which Methods will Survive? |
May 12, 2017 09:00‑12:30 |
Friday Workshop Stream I - Morning How to Prepare for Security and Privacy by Design and by Default, Once |
European Identity & Cloud Conference 2016 |
|
May 11, 2016 14:30‑15:30 |
Managing Cloud Risks Cloud Risk and Opportunity |
May 13, 2016 09:00‑12:30 |
Cloud Security Cloud Services Certification |
May 13, 2016 13:30‑16:00 |
Measuring your Identity Management Using Metrics to Measure IAM Success |
European Identity & Cloud Conference 2015 |
|
May 06, 2015 11:00‑12:00 |
Cloud Identity & Security Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact |
May 06, 2015 15:30‑16:30 |
Cloud Risk Assessment Assessing and Mitigating Cloud Risks |
May 06, 2015 15:30‑16:30 |
Cloud Risk Assessment Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses. |
May 07, 2015 14:30‑15:30 |
IoT/OT Privacy & Security Security and the Internet of Everything and Everyone |
May 08, 2015 09:00‑12:30 |
Workshop Cloud Risk Assessment |
European Identity & Cloud Conference 2014 |
|
May 14, 2014 14:30‑15:30 |
Social & Mobile Login Evaluating the Risks of Social Login |
May 15, 2014 12:00‑13:00 |
Software Defined Infrastructures - Compliance and Security Defining your Path Towards a Software Defined Datacenter |
May 15, 2014 12:00‑13:00 |
Software Defined Infrastructures - Compliance and Security Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC |
May 15, 2014 14:30‑15:30 |
Cloud Identity Cloud Identity & Access Management: Defining the Market |
May 15, 2014 15:30‑16:30 |
Cloud Encryption Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed |
May 16, 2014 09:00‑12:30 |
Workshop Negotiating the Cloud Standards and Advice Jungle |
May 16, 2014 13:30‑16:00 |
Workshop Internet of Everything and Big Data: Benefits and how to Manage Risk |
Cloud Provider Assurance Workshop |
|
May 17, 2013 09:00‑10:30 |
Workshop Introduction to cloud services |
May 17, 2013 11:00‑12:30 |
Workshop Cloud Provider Selection |
May 17, 2013 13:30‑14:30 |
Workshop Cloud Provider Assurance |
European Identity & Cloud Conference 2013 |
|
May 14, 2013 09:00‑13:00 |
EIC Warm-Up Getting Started: How to Find your Best Path through EIC 2013 |
May 16, 2013 10:30‑11:30 |
Big Data Opportunities and Risk Big Data – the Need, the Opportunities |
May 16, 2013 11:30‑12:30 |
Smart Data Information Stewardship: What does it mean for Big Data? |
May 16, 2013 16:30‑17:30 |
Trust, Assurance Top Ten Tips for Negotiating and Assuring Cloud Services |
May 17, 2013 09:00‑12:30 |
Workshop Understanding the Role of Cloud Computing for your Business - and Selecting the Appropriate Provider |
May 17, 2013 13:30‑16:00 |
Workshop Cloud Provider Assurance - Get what you Pay for |
European Identity & Cloud Conference 2012 |
|
Apr 17, 2012 09:00‑13:00 |
Pre-conference Event OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough? |
Apr 19, 2012 10:30‑11:30 |
Trustworthy Cloud Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration |
Apr 19, 2012 14:00‑15:00 |
Cloud Security Issues Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them |
Apr 19, 2012 14:00‑15:00 |
Cloud Security Issues Secure Online Identity with Cloud Identity and Privacy Services |
Apr 19, 2012 16:30‑17:30 |
Key Management, Encryption The Bad Things that can happen if Encryption Management Fails |
European Identity Conference 2011 |
|
May 11, 2011 14:00‑15:00 |
Combined Session Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer? |
May 11, 2011 15:00‑16:00 |
Combined Session Cloud Provider Assurance Metrics |
May 12, 2011 10:30‑11:30 |
Combined Session Finding the Right Approach to Cloud Governance |
May 13, 2011 09:00‑12:00 |
Workshop Information Security in the Cloud |
European Identity Conference 2010 |
|
May 04, 2010 09:00‑13:00 |
Pre-conference Event Cloud Computing - Answers to 10 Security Questions you Should Ask |
May 05, 2010 14:00‑15:00 |
Combined Session Cloud Computing – Identity and Security Smog? |
May 06, 2010 10:30‑11:30 |
Combined Session Identity Issues of Virtualization |
European Identity Conference 2009 |
|
May 06, 2009 08:30‑09:00 |
Keynote Risk, Reward and Compliance in Challenging Times |
May 06, 2009 15:00‑16:00 |
Combined Session Is the IAM Focus of Today’s GRC Platforms Sufficient? |
European Identity Conference 2008 |
|
Apr 23, 2008 16:30‑17:30 |
Combined Session Vendor Panel: Picking the Right Federation Software |
Apr 23, 2008 18:00‑18:30 |
Keynote Security, Privacy and Trust – Mission Impossible? |
Apr 24, 2008 16:30‑17:30 |
Combined Session Security by Design – Externalizing Authentication and Authorization |
Moderation
Title |
---|
European Identity and Cloud Conference 2023 |
EU Digital Identity - The European Digital Wallet Track Details |
Privacy Trends Track Details |
European Identity and Cloud Conference 2022 |
Cyber Resilience I Track Details |
Hybrid & Multi-Cloud Track Details |
Cybersecurity Leadership Summit 2019 |
Artificial Intelligence & Machine Learning for Cybersecurity Track Details |
Incident Response Track Details |
European Identity & Cloud Conference 2019 |
Artificial Intelligence & Machine Learning Track Details |
Artificial Intelligence & Machine Learning in Cybersecurity Track Details |
Artificial Intelligence & Machine Learning in Cybersecurity 101 Track Details |
Expert Stage Part IV Track Details |
Things, Robotics & Industrial Internet Track Details |
European Identity & Cloud Conference 2018 |
(Hybrid) Cloud Identity Track Details |
GDPR - Compliance Now Track Details |
GDPR - Compliance Now Track Details |
IAM 2020 Track Details |
Digital Finance World 2018 |
Blockchain, Trust, Identity Track Details |
Preparing for the EU General Data Protection Regulation (GDPR) Track Details |
PSD2: Seizing Opportunities through Innovation & Transparency Track Details |
European Identity & Cloud Conference 2017 |
Cyber Security Experts Stage Track Details |
Trusted Identities for the (Mobile) Digital Business - I Track Details |
Trusted Identities for the (Mobile) Digital Business - II Track Details |
European Identity & Cloud Conference 2016 |
Cloud Identity & Security Track Details |
Internet of Things & Industry 4.0 Track Details |
European Identity & Cloud Conference 2015 |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Track Details |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Track Details |
Securing Operational Technology (OT) and the Internet of Things (IoT) Track Details |
European Identity & Cloud Conference 2014 |
IAM Infrastructure Trends & Concepts Track Details |
Mobile Security Track Details |
Secure Cloud Track Details |
European Identity & Cloud Conference 2013 |
Cloud Governance Track Details |
Cloud Provider Assurance Workshop Track Details |
Managing Identities and Access to Information for Cloud, Mobile and Social Computing Track Details |
European Identity & Cloud Conference 2012 |
Cloud Identity & Access Track Details |
Cloud Security Track Details |
Cloud Security Track Details |
European Identity Conference 2011 |
Cloud Security Track Details |
Cloud Standards Adoption Track Details |
Directories & Federation Track Details |
European Identity Conference 2010 |
Cloud Computing: Compliance & Security Track Details |
Stay Connected