Linking IdM & GRC to Corporate Performance

  •  TYPE: Track    START DATE: Wednesday, May 05, 2010     START TIME: 10:30    LOCATION:  Galaxis
Conference Agenda



Integrated Information Security, Risk and Compliance Management at Voith IT

Date: Wednesday, May 05, 2010 Time: 10:30-11:30

Integrated Information Security, Risk and Compliance Management at Voith IT
Rolf Strehle, Voith AG

IT Compliance and ISO 27001 Global IT-Security Strategy of Voith AG Success factor Awareness Campaign IT-Management System at Voith - field report

Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution
Darran Rolls, KuppingerCole / Cloud 10 • Peter Weierich, iC Consult GmbH • Alberto Ocello, Crossideas • Nishant Kaushik, Uniken • Gerlinde Zibulski, SAP AG

User provisioning promised to streamline authorization processes and deliver cost benefits to IT departments. By shifting the focus from the authorization processes to access policies, the governance and compliance benefits begin to outweigh the technical benefits. This shift fundamentally changes the ROI calculation for an investment in IAM and the market will shift accordingly.

Access Governance: Tales from the Trenches

Date: Wednesday, May 05, 2010 Time: 11:30-12:30

Access Governance: Tales from the Trenches
Drs. Dennis van Ham, KPMG Advisory N.V.

Getting in control with regard to users and their authorizations is probably one of the most mentioned goals of IAM projects in the last couple of years. It sounds good, it feels good and it fits the GRC business speak perfectly. But many IAM projects have been and probably are struggling. Execution requires perseverance and effective change management. Due to budget cuts, project scope changes and seemingly everlasting emerging technologies the desired business ability to prove being in...

Risk & Identity Services – How do they fit?
Keith Grayson, SAP

When does Identity Risk become material to the business? How do we know when such risks become realized? Where do IT GRC controls appear in a multi-level risk strategy? These are some of the questions that large organizations are starting to ask. We present some answers for debate on this topic.

Panel: Identity Management as a GRC Endpoint
Priska Altorfer, wikima4 AG • Deepak Taneja, Aveksa • Jackson Shaw, Clear Skye

Ships that pass in the night, and speak each other in passing, only a signal shown, and a distant voice in the darkness; So on the ocean of life, we pass and speak one another, only a look and a voice, then darkness again and a silence." Is this an accurate description of identity management and GRC projects? Or, are identity management and GRC projects so closely related that there are no identity management projects but just GRC projects? In this session Jackson Shaw will discuss the...


European Identity Conference 2010

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 04 - 07, 2010 Munich