English   Deutsch   Русский   中文    

Speaker details

Jackson Shaw     Jackson Shaw
Identity Management Expert
Dell

Jackson Shaw has been involved with directory, meta-directory and security initiatives for twenty five years. He has spoken at various industry events and writes a popular identity management blog. Jackson oversees product direction, strategy and go-to-market activities for Dell’s suite of identity and access management products.

Sessions

European Identity & Cloud Conference 2016
05/10/2016 18:00-18:20 The Internet of Things (#IoT) One Year Later – Damn the Torpedoes! Full Speed ahead!!
More 
05/11/2016 12:00-13:00 Securing Digital Disruption -Trend Scouting
Trends & Innovation Panel: What are the most important Innovations and who are the Innovators?
More 
European Identity & Cloud Conference 2015
05/05/2015 17:20-17:40 The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value
More 
05/06/2015 12:00-13:00 IRM & the Business Side
No Person is an Island: How Relationships Make the IT World More Manageable
The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
More 
05/07/2015 14:30-15:30 New Security Solutions for the Enterprise
What If the Future of Security Means Not Knowing It’s There?
User Discovery: Changing Best Practices and Protocol Convergence
More 
European Identity & Cloud Conference 2013
05/14/2013 14:40-15:00 Mortality & Morbidity Findings for Identity Management
More 
05/15/2013 10:30-11:30 Moving from Confusion to Clarity:
Next Generation Cloud and Mobile Identity Management
More 
05/15/2013 11:30-12:30 Going beyond static Assignments
Redefining Access Governance: Going well beyond Recertification
Access Governance: How to Govern all Access
More 
European Identity Conference 2011
05/10/2011 17:00-17:30 The Woods are Lovely, Dark, and Deep, But I have Promises to Keep, And Miles to go Before I Sleep
More 
05/11/2011 15:00-16:00 Managing Identities Once – Active Directory-Focused Centralization
More 
European Identity Conference 2010
05/05/2010 11:30-12:30 Access Governance: Tales from the Trenches
Risk & Identity Services – How do they fit?
Panel: Identity Management as a GRC Endpoint
More 
05/06/2010 09:30-10:00 The Most Valid Wins of IAM
More 
European Identity Conference 2009
05/06/2009 17:30-18:00 Identity Management & GRC - A Powerful Team?
More 
05/07/2009 14:00-15:00 Beyond Passwords: Tokens, Biometrics and Other Authentication Factors
More 
2nd European Identity Conference
04/23/2008 15:00-16:00 How to avoid internal Fraud I
Rogue Trading and the changing Face of Threats
Compliance Profiling for Finance Systems
More 
04/23/2008 17:30-18:00 Tenets of Identity Management
More 
04/24/2008 11:30-12:30 Virtual Directories and Beyond
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Information Classification and Secure Information Sharing
To stay competitive, modern businesses must be increasingly connected to their business partners, suppliers, current and future customers and even smart devices (or things). New digital businesses therefore have to be agile and connected.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole