Speaker details

Mike Small Information Security Management Advisor, Fellow Analyst

KuppingerCole

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.

With over 40 years in the information technology industry Mike's experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.

Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.

 Sessions

Date Title

European Identity & Cloud Conference 2016

May 11, 2016
14:30‑15:30
Managing Cloud Risks
Cloud Risk and Opportunity
Session Details
May 13, 2016
09:00‑12:30
Cloud Security
Cloud Services Certification
Session Details
May 13, 2016
13:30‑16:00
Measuring your Identity Management
Using Metrics to Measure IAM Success
Session Details
May 13, 2016
17:00‑18:00
European Identity & Cloud Conference 2016 Report
Session Details

European Identity & Cloud Conference 2015

May 06, 2015
11:00‑12:00
Cloud Identity & Security
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Session Details
May 06, 2015
15:30‑16:30
Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.
Session Details
May 07, 2015
14:30‑15:30
IoT/OT Privacy & Security
Security and the Internet of Everything and Everyone
Session Details
May 08, 2015
09:00‑12:30
Cloud Risk Assessment
Session Details

European Identity & Cloud Conference 2014

May 14, 2014
14:30‑15:30
Social & Mobile Login
Evaluating the Risks of Social Login
Session Details
May 15, 2014
12:00‑13:00
Software Defined Infrastructures - Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
Session Details
May 15, 2014
14:30‑15:30
Cloud Identity
Cloud Identity & Access Management: Defining the Market
Session Details
May 15, 2014
15:30‑16:30
Cloud Encryption
Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
Session Details
May 16, 2014
09:00‑12:30
Negotiating the Cloud Standards and Advice Jungle
Session Details
May 16, 2014
13:30‑16:00
Internet of Everything and Big Data: Benefits and how to Manage Risk
Session Details

Cloud Provider Assurance Workshop

May 17, 2013
09:00‑10:30
Introduction to cloud services
Session Details
May 17, 2013
11:00‑12:30
Cloud Provider Selection
Session Details
May 17, 2013
13:30‑14:30
Cloud Provider Assurance
Session Details

European Identity & Cloud Conference 2013

May 16, 2013
10:30‑11:30
Big Data Opportunities and Risk
Big Data – the Need, the Opportunities
Session Details
May 16, 2013
11:30‑12:30
Smart Data
Information Stewardship: What does it mean for Big Data?
Session Details
May 16, 2013
16:30‑17:30
Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
Session Details

European Identity & Cloud Conference 2012

Apr 17, 2012
09:00‑13:00
OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
Session Details
Apr 19, 2012
10:30‑11:30
Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
Session Details
Apr 19, 2012
14:00‑15:00
Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Secure Online Identity with Cloud Identity and Privacy Services
Session Details
Apr 19, 2012
16:30‑17:30
Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
Session Details

European Identity Conference 2011

May 11, 2011
14:00‑15:00
Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer?
Session Details
May 11, 2011
15:00‑16:00
Cloud Provider Assurance Metrics
Session Details
May 12, 2011
10:30‑11:30
Finding the Right Approach to Cloud Governance
Session Details
May 13, 2011
09:00‑12:00
Information Security in the Cloud
Session Details

European Identity Conference 2010

May 04, 2010
09:00‑13:00
Cloud Computing - Answers to 10 Security Questions you Should Ask
Session Details
May 05, 2010
14:00‑15:00
Cloud Computing – Identity and Security Smog?
Session Details
May 06, 2010
10:30‑11:30
Identity Issues of Virtualization
Session Details

European Identity Conference 2009

May 06, 2009
08:30‑09:00
Risk, Reward and Compliance in Challenging Times
Session Details
May 06, 2009
15:00‑16:00
Is the IAM Focus of Today’s GRC Platforms Sufficient?
Session Details

European Identity Conference 2008

Apr 23, 2008
16:30‑17:30
Vendor Panel: Picking the Right Federation Software
Session Details
Apr 23, 2008
18:00‑18:30
Security, Privacy and Trust – Mission Impossible?
Session Details
Apr 24, 2008
16:30‑17:30
Security by Design – Externalizing Authentication and Authorization
Session Details

 Moderation

Title

European Identity & Cloud Conference 2016

Cloud Identity & Security
Track Details
Internet of Things & Industry 4.0
Track Details

European Identity & Cloud Conference 2015

Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Track Details
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Track Details
Securing Operational Technology (OT) and the Internet of Things (IoT)
Track Details

European Identity & Cloud Conference 2014

IAM Infrastructure Trends & Concepts
Track Details
Mobile Security
Track Details
Secure Cloud
Track Details

European Identity & Cloud Conference 2013

Cloud Governance
Track Details
Cloud Provider Assurance Workshop
Track Details
Managing Identities and Access to Information for Cloud, Mobile and Social Computing
Track Details

European Identity & Cloud Conference 2012

Cloud Identity & Access
Track Details
Cloud Security
Track Details
Cloud Security
Track Details

European Identity Conference 2011

Cloud Security
Track Details
Cloud Standards Adoption
Track Details
Directories & Federation
Track Details

European Identity Conference 2010

Cloud Computing: Compliance & Security
Track Details

Stay Connected

Top Events

Conference

Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access Management (CIAM) is at the heart of Digital Transformation. The Consumer Identity Summit is here to get you kickstarted into the world of CIAM, where you learn from your customers while respecting their privacy needs and securing their personal information against cyber risks.

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Next Seminar

Workshop

Mastering the Operational Impacts of the EU General Data Protection Regulation (GDPR)

This 1-day intense training will provide you with a solid foundation on the new European Union Data Protection Regulation, improving your understanding on the legal requirements of processing and transferring personal information to and from the EU. The trainer of this GDPR-class is an experienced European lawyer and privacy expert, offering a practical approach on how to implement the EU General Data Protection Regulation (GDPR) into your everyday business.

Popular Webcast