Cloud Computing: Compliance & Security
- TYPE: Track START DATE: Wednesday, May 05, 2010 START TIME: 14:00 LOCATION: Helios
Date: Wednesday, May 05, 2010 Time: 14:00-15:00
Cloud Computing – Identity and Security Smog?
Mike Small, KuppingerCole
Cloud computing is an alternative model for acquiring and delivering IT-related services. The benefits of this approach are that the users of services do not need to own and manage the capital equipment involved. However does the cloud hype in fact conceal the security issues of the identity of users and the security of data. By the very nature of cloud computing, the data belonging to the organization using a cloud service will be held in a shared environment. A shared environment is...
What the Identity Industry Should do to Improve Security for the Cloud
Matthew Gardiner, Mimecast • Nishant Kaushik, Uniken • Dr. Barbara Mandl, FOSTER FORE • Ronny Bjones, Microsoft • Alberto Pricoli, Arcot GmbH
Historically every new wave of IT architecture from the mainframe, to client-server, to the Web, left security and related standards as an afterthought. Had appropriate security architectures been baked in from the start, the seemingly constant need for security catch-up would have been significantly reduced. Are we going to repeat these mistakes in the movement to the Cloud? This panel will leverage the combined expertise of software and cloud vendors as well as cloud consumers to help...
Date: Wednesday, May 05, 2010 Time: 15:00-16:00
Good Clouds and Bad Clouds
Liam Lynch, eBay Inc.
Malware guarantees that identities area at risk and there's a need, more than ever before, to ensure that identities are safe. I will introduce ideas and research that protects identities on enterprise platforms, home platforms, and mobile/consumer platforms (such as Televisions).
Panel: How to Efficiently Manage the Cloud
Martin Kuppinger, KuppingerCole • Martin Geier, BMC Software • Joe Baguley, Quest Software • Dr. Michael Pauly, T-Systems
Date: Wednesday, May 05, 2010 Time: 16:30-17:30
The Fundaments of Effective Identity in the Cloud
Pamela Dingle, Microsoft
Just how should enterprise identity management and outsource SaaS applications integrate securely? In this session Ping Identity’s Pam Dingle discusses ways to avoid the nightmare of maintaining multiple directories in the cloud by leveraging four basic areas of identity integration with SaaS: provisioning, authentication, Internet Single Sign-On and authorization.
Panel: Managing Privileged Identities in the Cloud
Peter Heintzen, Oracle • Philip Lieberman, Lieberman Software • Shlomi Dinoor, Cyber-Ark Software • Nimrod Vax, BigID
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 04 - 07, 2010 Munich