English   Deutsch   Русский   中文    

Speaker details

Mike Small     Mike Small
Information Security Management Advisor, Fellow Analyst

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.

With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.

Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.


06/23/2016 Managing Risk through Cloud App Authentication and 360° Control
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud services to perform their jobs without reference to their employer. Line of business managers can acquire cloud services without performing risk assessment or considering the impact of these on compliance. To compound the problem mobile devices can be used to access these services from outside of the organizational perimeter anytime and anywhere.
09/22/2015 Access Governance in a Cloudy Environment
Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.
06/02/2015 Ground Control to Major CRO: Is Identity Governance a risky experience?
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
12/09/2014 Access Governance for today’s agile, connected businesses
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
11/11/2014 How to protect your data in the Cloud
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To meet these requirements it is necessary to protect data not only but especially in the Cloud. With employees using services such as iCloud or Dropbox, the risk of information being out of control and leaking is growing. Incidents such as the iCloud leakage of photos are just the tip of the iceberg.
11/05/2013 Negotiating the Cloud Standards and Advice Jungle
The cloud is a hot topic and most SDOs (Standards Defining Organizations) have at least one initiative in this area. This plethora of initiatives has confronted the users of cloud services as well as CSPs (Cloud Service Providers) with a jungle of frameworks, standards, advice and certifications. In this webinar, KuppingerCole´s Senior Analyst Mike Small will provide a summary of these and some practical advice on their relevance and usability.
07/03/2013 Cloud Assurance & Cloud Risk Awareness in the Light of PRISM
With the recent unveiling of systematic and large scale espionage activities conducted by US government agencies, the level of trust into cloud services run and controlled by 3rd parties has reached a new low. Google, Facebook, Skype, Apple, Verizon and many other service providers did open their databases to NSA and enabled them to search your mails and documents for information considered as valuable in whatever context. In this webinar, KuppingerCole´s Senior Analyst Mike Small will give you an introduction on how to identify the key assurance challenges of the different kinds of Cloud Computing and how to put into context the risk of becoming a victim of economic espionage through usage of KuppingerCole’s approach to selecting and assuring cloud services.
03/19/2013 Protecting Information in an Unstructured World
Join KuppingerCole Senior Analyst Mike Small and TITUS CTO Steph Charbonneau in this Webinar to learn the Major causes of information loss and leakage and how to avoid them by bringing structure to Information through Information Stewardship.
12/04/2012 Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity
Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.
12/02/2010 Cloud Computing Risk Areas
Before jumping into the cloud, you should know about the risks, so that you can ask the right questions to your provider. In this webinar session, we will discuss the main risk areas of cloud computing, such as data location, transparency, privileged user access, Recovery and data segregation, and how to keep them under control.


European Identity & Cloud Conference 2016
05/11/2016 14:30-15:30 Managing Cloud Risks
Cloud Risk and Opportunity
Best Practice: OSRAM’s way to a Private Cloud
05/13/2016 09:00-12:30 Cloud Security
Cloud Services Certification
05/13/2016 13:30-16:00 Measuring your Identity Management
Using Metrics to Measure IAM Success
European Identity & Cloud Conference 2015
05/06/2015 11:00-12:00 Cloud Identity & Security
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?
05/06/2015 15:30-16:30 Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
Dynamic Control Selection Framework for Onboarding Cloud Solutions
Dynamic Certification of Cloud Ecosystems
05/07/2015 14:30-15:30 IoT/OT Privacy & Security
Security and the Internet of Everything and Everyone
IoT Privacy Risks, Legislation and Solutions
05/08/2015 09:00-12:30 Cloud Risk Assessment
European Identity & Cloud Conference 2014
05/14/2014 14:30-15:30 Social & Mobile Login
Evaluating the Risks of Social Login
How to Enable Social and Mobile Login – and Beyond
05/15/2014 12:00-13:00 Software Defined Infrastructures - Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
05/15/2014 14:30-15:30 Cloud Identity
Cloud Identity & Access Management: Defining the Market
One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
05/15/2014 15:30-16:30 Cloud Encryption
Searching over Encrypted Data in Cloud Database as a Service Environments
Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
05/16/2014 09:00-12:30 Negotiating the Cloud Standards and Advice Jungle
05/16/2014 13:30-16:00 Internet of Everything and Big Data: Benefits and how to Manage Risk
Cloud Provider Assurance Workshop
05/17/2013 09:00-10:30 Introduction to cloud services
05/17/2013 11:00-12:30 Cloud Provider Selection
05/17/2013 13:30-14:30 Cloud Provider Assurance
European Identity & Cloud Conference 2013
05/14/2013 09:00-13:00 EIC Warm-Up
Getting Started: How to Find your Best Path through EIC 2013
05/16/2013 10:30-11:30 Big Data Opportunities and Risk
Big Data – the Need, the Opportunities
Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level.
05/16/2013 11:30-12:30 Smart Data
Information Stewardship: What does it mean for Big Data?
Big Data – Small Privacy?
05/16/2013 16:30-17:30 Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
05/17/2013 09:00-12:30 Understanding the Role of Cloud Computing for your Business - and Selecting the Appropriate Provider
05/17/2013 13:30-16:00 Cloud Provider Assurance - Get what you Pay for
European Identity & Cloud Conference 2012
04/17/2012 09:00-13:00 OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
04/19/2012 10:30-11:30 Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
04/19/2012 14:00-15:00 Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Secure Online Identity with Cloud Identity and Privacy Services
04/19/2012 16:30-17:30 Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
Cloud Security Depends on Effective Key Management
European Identity Conference 2011
05/11/2011 14:00-15:00 Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer?
Cloud Standardization: From Open Systems to Closed Clouds?
05/11/2011 15:00-16:00 Cloud Provider Assurance Metrics
Combating Online Fraud – BT’s Managed Fraud Reduction Service
05/12/2011 10:30-11:30 Cloud Governance Primer
Finding the Right Approach to Cloud Governance
Governance as a Cloud Service – Will that Work?
05/13/2011 09:00-12:00 Information Security in the Cloud
European Identity Conference 2010
05/04/2010 09:00-13:00 Cloud Computing - Answers to 10 Security Questions you Should Ask
05/05/2010 14:00-15:00 Cloud Computing – Identity and Security Smog?
What the Identity Industry Should do to Improve Security for the Cloud
05/06/2010 10:30-11:30 Virtualization Trends and Strategies – from Hype to Reality
Identity Issues of Virtualization
European Identity Conference 2009
05/06/2009 08:30-09:00 Risk, Reward and Compliance in Challenging Times
05/06/2009 15:00-16:00 Lessons that GRC and IAM could learn from ITIL - and where ITIL helps in defining IAM
Is the IAM Focus of Today’s GRC Platforms Sufficient?
European Identity Conference 2008
04/23/2008 16:30-17:30 Vendor Panel: Picking the Right Federation Software
04/23/2008 18:00-18:30 Security, Privacy and Trust – Mission Impossible?
04/24/2008 16:30-17:30 Application Security Infrastructures
Security by Design – Externalizing Authentication and Authorization
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole