Making Information Security a Strategic Priority

  •  TYPE: Track    START DATE: Wednesday, April 18, 2012     START TIME: 14:00    LOCATION:  Auditorium
Parent Track

Moderator(s):

Sessions:

IAM Governance in the New Commerzbank

Date: Wednesday, April 18, 2012 Time: 14:00-15:00

IAM Governance in the New Commerzbank
Dirk Venzke, Commerzbank AG

After integration of Dresdner Bank, which was completed successfully in spring 2011, a new IAM (Identity & Access Management) governance model has been set up and implemented. Components of this model are governance structures and responsibilities (including processes and raci-matrix); a recertification process for critical application on a risk based assessment and the design and implementation of a new workflow tool for the requesting and approval of access rights. After having...

Munich Re’s Identity & Access Management - Experience Report and Best Practices
Wolfgang Zwerch, MunichRe

In May 2010, Munich Re started a project to define, coordinate and establish compliant, sustainable and efficient IAM processes and policies based on best practices; to provide matching and appropriate IT support for the IAM processes to enhance efficiency and to provide reliable data on Digital Identities. The Quest One Identity Manager (Quest OIM – former Voelcker ActiveEntry V4.2) was implemented and customized to fit into Munich Re’s IAM architecture. One of the main...

Delivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation Process

Date: Wednesday, April 18, 2012 Time: 15:00-16:00

Delivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation Process
Berthold Kerl, KuppingerCole • Prof. Dr. Sachar Paulus, KuppingerCole • Dr. Waldemar Grudzien, Association of German Banks

Selling IT projects to the business is complex – even in situations with significant regulatory pressure. One of the reasons is that IT still tends to be too technical. This panel will talk about how to use risk identification and evaluation to translate what IT wants to do into business terms. It is about speaking the language of the business and thinking in risks. It is as well about setting the focus right by understanding the priority of actions to take. Based on that, IT can...

How to successfully get business to participate in IAM and Access Governance
Dr. Martin Kuhlmann, Omada • Edwin van der Wal, PwC

For introducing Access Governance and the underlying core IAM processes, business involvement is mandatory. This process requires guidelines, policies, role models, and especially the definition of ownerships and responsibilities in business. On the other hand, business is somewhat reluctant given that it has to do its business anyway, despite the need for requesting and recertifying access. Different stakeholders in the organization need to be involved to set up these policies: Auditors,...

Identity & Access Management as a Key Element for a Value focused Security Strategy

Date: Wednesday, April 18, 2012 Time: 17:00-18:00

Identity & Access Management as a Key Element for a Value focused Security Strategy
Ralf Knöringer, Atos • Hassan Maad, Evidian • Christian Patrascu, Symantec • Shirief Nosseir, CA Technologies

The myriad number of security incidents reported by the media keeps on reminding us, that the risk from being hit by such an attack is increasing and that the damage can be very high. At the same time, IT departments are faced with the need to develop their infrastructure away from purely defensive reactions on threats to a proactively open attitude, aligned with business needs and allowing user driven initiatives like BYOD (Bring Your Own Device) to take place. In this session, you will...

Access Governance Case Study: Friends Life Realizes Quick Time To Value
Julia Bernal, Friends Life

In order to meet access-related compliance requirements and reduce the risk of security breaches, enterprises around the world have made significant investments in access governance automation software solutions. Many of these companies have experienced fast time to value by implementing solutions that can be easily implemented enabling IT and the business to quickly realize the benefits of automating access governance processes. In this presentation you will hear from Julia Bernal, Group...


Congress

European Identity & Cloud Conference 2012

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Apr 17 - 20, 2012 Munich, Germany