Governance, Risk Management & Compliance (GRC)
- TYPE: Track START DATE: Thursday, April 19, 2012 START TIME: 10:30 LOCATION: Galerie
Moderator(s):
Sessions:
How to Mature GRC Processes Before you Buy a GRC Tool
Date: Thursday, April 19, 2012 Time: 10:30-11:30
How to Mature GRC Processes Before you Buy a GRC Tool
Berthold Kerl, KuppingerCole
• Prof. Dr. Sachar Paulus, KuppingerCole
GRC projects quickly tend to struggle once it becomes obvious that there is a lack of clearly defined processes and responsibilities. Unfortunately, that still happens in a large number of these projects. The session will focus on what you need to define before without ending up in endless organizational projects. It is about the balance between moving forward quickly (and moving into the right direction) without missing to build the organizational foundation for a successful GRC...
Best Practice: IAM in a Complex and Security-Driven Environment
T-Systems standardizes Identity and Account Management processes and thereby reduces costs. With this motto, T-Systems has established secure and optimum process handling by means of a new and integrated Identity and Access Management solution. This slot will show the background and success of the project.
T-Systems employees now have the option of requesting access to applications online via a Web front-end in a user management tool based on syscovery Savvy Suite. The introduced standard...
Identifying your Critical Information Assets. Moving from System Security to Information Security
Date: Thursday, April 19, 2012 Time: 11:30-12:30
Identifying your Critical Information Assets. Moving from System Security to Information Security
Prof. Dr. Sachar Paulus, KuppingerCole
Classical IT-Security is centered around the assets governed by the IT organization, and therefore in reality information security and IT security are used to describe that same thing. Protecting the assets of the IT organization is good, but at the end the real value of security is to protect the assets that are important for the overall organization. This becomes obvious when IT services more and more move into the Cloud, and users more and more bring their own devices to work with. Who...
Managing Cloud Computing Access Risks
Deepak Taneja, Aveksa
• Kurt Johnson, Courion Corporation
• Bruce Macdonald, Hitachi ID Systems
Today’s cloud architecture increases the risk of access to a company’s critical data, such as intellectual property, personal privacy information, cardholder data, health information, financial data, etc. As a result, companies are asking themselves how do they ensure that their organization's most critical information is in the hands of the right individuals and that they're doing the right things with it?
During this panel session, we’ll outline what organizations need...
European Identity & Cloud Conference 2012
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Apr 17 - 20, 2012 Munich, Germany