Track V: Managing Risk & Compliance II
- TYPE: Track START DATE: Wednesday, May 09, 2007 START TIME: 11:00
Date: Wednesday, May 09, 2007 Time: 11:00-12:00
IT Compliance and Auditing
Dr. Christoph Capellaro, Ernst & Young AG • Marko Vogel, KPMG • Björn Toemmler, ISACA • Hans-Jürgen Hohmeier, DATEV eG
What exactly do auditors expect from corporate IT? Which measures will help the company to achieve a clean bill of health from their assesor? This German-language panel will provide practical suggestions and insights into the way auditors assess IT security and compliance issues.
Date: Wednesday, May 09, 2007 Time: 12:00-13:00
IT and Basel II: Is IT Security already a rating factor?
Thomas Uhl, Topalis AG • Sonja Binder, Bayerischer Sparkassenverband
With Basel II banks and other financial services are required to examine all possible risk factors before grating loans to companies and organizations. In theory, at least, these include IT security and IT compliance. However, most banks lack quaified personnel to perform such checks. What must banks do to make sure they aren't overlooking important risks? How can companies increase their credit worthiness by investing in IT security and identity management?
Date: Wednesday, May 09, 2007 Time: 14:00-15:00
Legal framework for identity federation in Germany and Europe
Prof. Dr. Renate Dendorfer, Heussen Rechtsanwaltsgesellschaft mbH
This German-language presentation will cover the major regulatory systems and give a preview of possible new and stricter rules and laws being prepared by the German federal government and by the EU.
Date: Wednesday, May 09, 2007 Time: 15:00-16:00
Compliance & IT Outsourcing
Pierre Lestage, CGI/Bell Canada • Martin Riley, HP • Gonzalo Cuatrecasas, Approva • Dr. Peter M. Heij, Satyam Computer Services Ltd. • Andreas Binder, Sapient Ltd.
How do you remain compliant if your IT is suddenly being run in Bangalore? What are the issues in cross-border projects? Which best practices should companies follow is choosing an outsourcing partner? What are the threats, the opportunities?
Date: Wednesday, May 09, 2007 Time: 16:30-17:30
Enterprise Entitlement Management - Simplifying Management of Complex Authorization Policies
Hal Lockhart, BEA • Andreas Luther, Microsoft • Ralf Knöringer, Atos • Dr. Harald Meyer, Novell • Archie Reed, HP
Entitlement is one of many new buzzwords in the identity field, promising to offer the next layer of protection for applications in an Internet environment with much more fine-grained security through enterprise entitlement management, or EEM. KCP believes that the industry is heading toward implementing centralized services that are able to process complex and lengthy decisions so a business application doesn't have to incorporate all this internally. EEM can automate such tasks as...
- Registration fee:
- Contact person:
Mr. Joerg Resch
+49 (0)211 23707777
- May 07 - 10, 2007 Munich