Speaker details

Mike Small
Senior Analyst
KuppingerCole
@MikeSmall64
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.
With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.
Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.
Sessions
Date | Title |
---|---|
cybernetix.world 2020 |
|
Nov 24, 2020
10:00‑13:00 |
Workshop AI Governance: Doing AI Ethically is Doing AI Right Session Details |
Customer Identity & Marketing Automation |
|
Jul 16, 2020
17:20‑17:40 |
Session Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement Session Details |
Cloud First - Strategy & Roadmap |
|
Jun 16, 2020
10:50‑11:10 |
Session Cloud Backup and Disaster Recovery Why This Is an Essential Component of Digital Transformation Session Details |
Jun 16, 2020
14:40‑15:00 |
Session Panel - Governing Your Hybrid Cloud Session Details |
Cybersecurity Leadership Summit 2019 |
|
Nov 12, 2019
09:00‑16:00 |
Incident Response Boot Camp Are You Ready For When A Cyber Incident Occurs? Session Details |
Nov 13, 2019
14:00‑15:00 |
Effective Response & Recovery Digital Transformation Resilience - Are You Really Prepared? Session Details |
Nov 13, 2019
15:00‑16:00 |
Risk Management & Best Practices Cyber Resilience – Every Second Counts (Video) Session Details |
European Identity & Cloud Conference 2019 |
|
May 14, 2019
09:00‑13:00 |
AI – Myths, Reality and Challenges Artificial Intelligence & Machine Learning in Cybersecurity 101 Session Details |
May 15, 2019
11:00‑12:00 |
AI & ML for Cybersecurity AI for the Future of your Business Session Details |
May 15, 2019
17:30‑18:30 |
AI Ethics The 6 Major Ethical Issues of AI Session Details |
May 15, 2019
19:20‑20:10 |
Networking Event European Identity & Cloud Awards Ceremony Session Details |
European Identity & Cloud Conference 2018 |
|
May 17, 2018
17:00‑18:00 |
Hybrid Cloud Going Hybrid: Who’s Best in Delivering the Infrastructure? Session Details |
May 18, 2018
09:00‑12:30 |
Hybrid Cloud Hybrid Cloud Done Right Session Details |
Digital Finance World 2018 |
|
Mar 01, 2018
11:00‑12:00 |
Impact of GDPR and Meeting its Requirements GDPR and Financial Services – Imperatives and Conflicts Session Details |
Mar 01, 2018
15:00‑16:00 |
Compliance and Beyond PSD2 – Does the RTS Prohibit Secure Customer Authentication? Session Details |
Privacy Engineering: Tools to Kickstart Your GDPR Compliance |
|
May 09, 2017
09:00‑10:15 |
Combined Session Welcome The Privacy Battlefield – What does the GDPR Require? Session Details |
European Identity & Cloud Conference 2017 |
|
May 09, 2017
09:00‑13:00 |
OASIS Privacy Engineering Workshop Privacy Engineering: Tools to Kickstart Your GDPR Compliance Session Details |
Privacy Engineering: Tools to Kickstart Your GDPR Compliance |
|
May 09, 2017
11:30‑13:00 |
Combined Session Workshop Panel Discussion and Wrap up Session Details |
European Identity & Cloud Conference 2017 |
|
May 10, 2017
11:00‑12:00 |
Cyber Challenges Today & Tomorrow Cyber Threat Intelligence - What this is and why it Matters? Session Details |
May 10, 2017
12:00‑13:00 |
GDPR + CIAM Turning GDPR Compliance into a Competitional Advantage Through Customer Identity Management (CIAM) Session Details |
May 11, 2017
15:30‑16:30 |
CASB Cloud Access Security Brokers - Why you Need one to Ensure GDPR Compliance Session Details |
May 11, 2017
17:00‑18:00 |
Online Identity Verification AML & PSD2 Compliant Online Identification: Which Methods will Survive? Session Details |
May 12, 2017
09:00‑12:30 |
Friday Workshop Stream I - Morning How to Prepare for Security and Privacy by Design and by Default, Once Session Details |
European Identity & Cloud Conference 2016 |
|
May 11, 2016
14:30‑15:30 |
Managing Cloud Risks Cloud Risk and Opportunity Session Details |
May 13, 2016
09:00‑12:30 |
Cloud Security Cloud Services Certification Session Details |
May 13, 2016
13:30‑16:00 |
Measuring your Identity Management Using Metrics to Measure IAM Success Session Details |
European Identity & Cloud Conference 2015 |
|
May 06, 2015
11:00‑12:00 |
Cloud Identity & Security Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact Session Details |
May 06, 2015
15:30‑16:30 |
Cloud Risk Assessment Assessing and Mitigating Cloud Risks Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses. Session Details |
May 07, 2015
14:30‑15:30 |
IoT/OT Privacy & Security Security and the Internet of Everything and Everyone Session Details |
May 08, 2015
09:00‑12:30 |
Workshop Cloud Risk Assessment Session Details |
European Identity & Cloud Conference 2014 |
|
May 14, 2014
14:30‑15:30 |
Social & Mobile Login Evaluating the Risks of Social Login Session Details |
May 15, 2014
12:00‑13:00 |
Software Defined Infrastructures - Compliance and Security Defining your Path Towards a Software Defined Datacenter Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC Session Details |
May 15, 2014
14:30‑15:30 |
Cloud Identity Cloud Identity & Access Management: Defining the Market Session Details |
May 15, 2014
15:30‑16:30 |
Cloud Encryption Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed Session Details |
May 16, 2014
09:00‑12:30 |
Workshop Negotiating the Cloud Standards and Advice Jungle Session Details |
May 16, 2014
13:30‑16:00 |
Workshop Internet of Everything and Big Data: Benefits and how to Manage Risk Session Details |
Cloud Provider Assurance Workshop |
|
May 17, 2013
09:00‑10:30 |
Workshop Introduction to cloud services Session Details |
May 17, 2013
11:00‑12:30 |
Workshop Cloud Provider Selection Session Details |
May 17, 2013
13:30‑14:30 |
Workshop Cloud Provider Assurance Session Details |
European Identity & Cloud Conference 2013 |
|
May 14, 2013
09:00‑13:00 |
EIC Warm-Up Getting Started: How to Find your Best Path through EIC 2013 Session Details |
May 16, 2013
10:30‑11:30 |
Big Data Opportunities and Risk Big Data – the Need, the Opportunities Session Details |
May 16, 2013
11:30‑12:30 |
Smart Data Information Stewardship: What does it mean for Big Data? Session Details |
May 16, 2013
16:30‑17:30 |
Trust, Assurance Top Ten Tips for Negotiating and Assuring Cloud Services Session Details |
May 17, 2013
09:00‑12:30 |
Workshop Understanding the Role of Cloud Computing for your Business - and Selecting the Appropriate Provider Session Details |
May 17, 2013
13:30‑16:00 |
Workshop Cloud Provider Assurance - Get what you Pay for Session Details |
European Identity & Cloud Conference 2012 |
|
Apr 17, 2012
09:00‑13:00 |
Pre-conference Event OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough? Session Details |
Apr 19, 2012
10:30‑11:30 |
Trustworthy Cloud Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration Session Details |
Apr 19, 2012
14:00‑15:00 |
Cloud Security Issues Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them Secure Online Identity with Cloud Identity and Privacy Services Session Details |
Apr 19, 2012
16:30‑17:30 |
Key Management, Encryption The Bad Things that can happen if Encryption Management Fails Session Details |
European Identity Conference 2011 |
|
May 11, 2011
14:00‑15:00 |
Combined Session Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer? Session Details |
May 11, 2011
15:00‑16:00 |
Combined Session Cloud Provider Assurance Metrics Session Details |
May 12, 2011
10:30‑11:30 |
Combined Session Finding the Right Approach to Cloud Governance Session Details |
May 13, 2011
09:00‑12:00 |
Workshop Information Security in the Cloud Session Details |
European Identity Conference 2010 |
|
May 04, 2010
09:00‑13:00 |
Pre-conference Event Cloud Computing - Answers to 10 Security Questions you Should Ask Session Details |
May 05, 2010
14:00‑15:00 |
Combined Session Cloud Computing – Identity and Security Smog? Session Details |
May 06, 2010
10:30‑11:30 |
Combined Session Identity Issues of Virtualization Session Details |
European Identity Conference 2009 |
|
May 06, 2009
08:30‑09:00 |
Keynote Risk, Reward and Compliance in Challenging Times Session Details |
May 06, 2009
15:00‑16:00 |
Combined Session Is the IAM Focus of Today’s GRC Platforms Sufficient? Session Details |
European Identity Conference 2008 |
|
Apr 23, 2008
16:30‑17:30 |
Combined Session Vendor Panel: Picking the Right Federation Software Session Details |
Apr 23, 2008
18:00‑18:30 |
Keynote Security, Privacy and Trust – Mission Impossible? Session Details |
Apr 24, 2008
16:30‑17:30 |
Combined Session Security by Design – Externalizing Authentication and Authorization Session Details |
Moderation
Title |
---|
Cybersecurity Leadership Summit 2019 |
Artificial Intelligence & Machine Learning for Cybersecurity Track Details |
Incident Response Track Details |
European Identity & Cloud Conference 2019 |
Artificial Intelligence & Machine Learning Track Details |
Artificial Intelligence & Machine Learning in Cybersecurity Track Details |
Artificial Intelligence & Machine Learning in Cybersecurity 101 Track Details |
Expert Stage Part IV Track Details |
Things, Robotics & Industrial Internet Track Details |
European Identity & Cloud Conference 2018 |
(Hybrid) Cloud Identity Track Details |
GDPR - Compliance Now Track Details |
GDPR - Compliance Now Track Details |
IAM 2020 Track Details |
Digital Finance World 2018 |
Blockchain, Trust, Identity Track Details |
Preparing for the EU General Data Protection Regulation (GDPR) Track Details |
PSD2: Seizing Opportunities through Innovation & Transparency Track Details |
European Identity & Cloud Conference 2017 |
Cyber Security Experts Stage Track Details |
Trusted Identities for the (Mobile) Digital Business - I Track Details |
Trusted Identities for the (Mobile) Digital Business - II Track Details |
European Identity & Cloud Conference 2016 |
Cloud Identity & Security Track Details |
Internet of Things & Industry 4.0 Track Details |
European Identity & Cloud Conference 2015 |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Track Details |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Track Details |
Securing Operational Technology (OT) and the Internet of Things (IoT) Track Details |
European Identity & Cloud Conference 2014 |
IAM Infrastructure Trends & Concepts Track Details |
Mobile Security Track Details |
Secure Cloud Track Details |
European Identity & Cloud Conference 2013 |
Cloud Governance Track Details |
Cloud Provider Assurance Workshop Track Details |
Managing Identities and Access to Information for Cloud, Mobile and Social Computing Track Details |
European Identity & Cloud Conference 2012 |
Cloud Identity & Access Track Details |
Cloud Security Track Details |
Cloud Security Track Details |
European Identity Conference 2011 |
Cloud Security Track Details |
Cloud Standards Adoption Track Details |
Directories & Federation Track Details |
European Identity Conference 2010 |
Cloud Computing: Compliance & Security Track Details |
Stay Connected
Top Event
European Identity & Cloud Conference 2021
Sep 13 - 16, 2021 in Munich, Germany
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.