English   Deutsch   Русский   中文    

Speaker details

Jackson Shaw     Jackson Shaw
Identity Management Expert

Jackson Shaw has been involved with directory, meta-directory and security initiatives for twenty five years. He has spoken at various industry events and writes a popular identity management blog. Jackson oversees product direction, strategy and go-to-market activities for Dell’s suite of identity and access management products.


European Identity & Cloud Conference 2015
05/05/2015 17:20-17:40 The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value
05/06/2015 12:00-13:00 IRM & the Business Side
No Person is an Island: How Relationships Make the IT World More Manageable
The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
05/07/2015 14:30-15:30 New Security Solutions for the Enterprise
What If the Future of Security Means Not Knowing It’s There?
User Discovery: Changing Best Practices and Protocol Convergence
European Identity & Cloud Conference 2013
05/14/2013 14:40-15:00 Mortality & Morbidity Findings for Identity Management
05/15/2013 10:30-11:30 Moving from Confusion to Clarity:
Next Generation Cloud and Mobile Identity Management
05/15/2013 11:30-12:30 Going beyond static Assignments
Redefining Access Governance: Going well beyond Recertification
Access Governance: How to Govern all Access
European Identity Conference 2011
05/10/2011 17:00-17:30 The Woods are Lovely, Dark, and Deep, But I have Promises to Keep, And Miles to go Before I Sleep
05/11/2011 15:00-16:00 Managing Identities Once – Active Directory-Focused Centralization
European Identity Conference 2010
05/05/2010 11:30-12:30 Access Governance: Tales from the Trenches
Risk & Identity Services – How do they fit?
Panel: Identity Management as a GRC Endpoint
05/06/2010 09:30-10:00 The Most Valid Wins of IAM
European Identity Conference 2009
05/06/2009 17:30-18:00 Identity Management & GRC - A Powerful Team?
05/07/2009 14:00-15:00 Beyond Passwords: Tokens, Biometrics and Other Authentication Factors
2nd European Identity Conference
04/23/2008 15:00-16:00 How to avoid internal Fraud I
Rogue Trading and the changing Face of Threats
Compliance Profiling for Finance Systems
04/23/2008 17:30-18:00 Tenets of Identity Management
04/24/2008 11:30-12:30 Virtual Directories and Beyond
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Cloud Risk & Security
Many organizations are concerned about the use of cloud services; the challenge is to securely enable the use of these services without negating and the benefits that they bring. To meet this challenge it is essential to move from IT Management to IT Governance.
KuppingerCole CLASS
Trusted Independent Advice in CLoud ASSurance including a detailed analysis of the Cloud Assurance management tasks in your company.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole