English   Deutsch   Русский   中文    

Speaker details

Gershon Janssen     Gershon Janssen
Member
OASIS Open Standards Group

Gershon Janssen is an independent consultant and member of the OASIS Open Standards Group. Gershon has a background in software and infrastructure architecture, distributed systems and integration technologies. Gershon works predominantly on projects, designing and building complex information technology architectures focusing on architecture, SOA, Cloud, Identity and Privacy.

Gershon is a strong promoter of open standards and believes in broad adoption of these and as such participates actively in standards efforts. In OASIS, he sits on the Steering Committee of the e-Government Member Section, and on the identity and privacy related Technical Committees ‘Identity in the Cloud' and ‘Privacy Management Reference Model'. Gershon also sits on the Coordination Committee of the Internet Technical Advisory Committee to OECD, focusing on Information Security and Privacy.

Sessions

European Identity & Cloud Conference 2015
05/07/2015 17:00-18:00 Integration
Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT
More 
European Identity & Cloud Conference 2014
05/13/2014 09:00-13:00 OASIS Workshop
Designing Privacy into our "Smart" Systems and Services
More 
05/15/2014 15:30-16:30 Security in a M2M & IoT World
Security in a World of 50 Billion Connected Devices
More 
European Identity & Cloud Conference 2013
05/14/2013 09:00-13:00 OASIS Workshop
Implementing Privacy by Design: Building Data Privacy into Applications to Meet Regulatory Requirements and Consumer Confidence
More 
05/15/2013 10:30-12:30 PbD - Stronger than the Big Data Players?
Privacy-by-Design in the Era of Big Data
Weaving Privacy into the Internet of Me and My Things
More 
European Identity & Cloud Conference 2012
04/17/2012 09:00-13:00 OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
More 
European Identity Conference 2011
05/11/2011 11:30-12:30 The Deployment of Large-Scale, Trusted Cloud Environments
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Adaptive Authentication & Authorization
It’s called “adaptive” because it adapts to the circumstances at the time of the authentication ceremony and dynamically adjusts both the authentication factors as well as the facet(s) of the factors chosen. This is all done as part of the risk analysis of what we call the Adaptive Policy-based Access Management (APAM) system.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole