- TYPE: Track START DATE: Thursday, April 19, 2012 START TIME: 14:00 LOCATION: Alpsee
Date: Thursday, April 19, 2012 Time: 14:00-15:00
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Mike Small, KuppingerCole
Cloud computing provides an opportunity for organizations to optimize the procurement of IT services from both internal and external suppliers However - many organizations are sleepwalking into the Cloud. Moving to the cloud may outsource the provision of the IT service, but it does not outsource responsibility. This session will look at the issues that may be forgotten or ignored when adopting the cloud computing. These include: Ensuring legal and regulatory compliance Assuring...
Secure Online Identity with Cloud Identity and Privacy Services
Mike Small, KuppingerCole • Prof. Dr. David Chadwick, University of Kent / Verifiable Credentials Ltd. • Ronny Bjones, Microsoft
You will learn about a set of new capabilities under development for cloud identity platform. Aimed at governments and enterprises, this work, from Microsoft and the University of Kent, brings together advanced privacy features based on either the UProve or existing technologies, support for Trust Frameworks that simplify agreements between identity partners, support for delegation of authority to delegates whose identities are private, and a dramatically simplified programming environment...
Date: Thursday, April 19, 2012 Time: 15:00-16:00
Trusted Identity Information from the Cloud
Patrick Graber, Swisscom Ltd
In this Session a proof of concept for a IAM service from the cloud (IAMaaS) will be outlined. The proof of concept takes place in the field of eGovernment. The IAM service delivers trusted information about a user to a service provider. These informations are highly secure stored in the cloud. The service provider will be able to grant access to the user according this information. How can data security be ensured? How do users keep data sovereignty? How do service providers know who to...
Cloud Service Broker - Adopting cloud services in Multi-tenant Enterprise Scenarios
Andreas Carlsson, Nordic Edge • Haydar Cimen, KPN
Learn how the Dutch ICT company KPN developed a cloud service broker solution that reforms enterprise cloud integrations. The KPN cloud service broker aggregates services to multiple cloud providers and simplifies consumption of identity federation, authentication and data integration services for the enterprise. As a result, enterprises with high requirements can now efficiently integrate cloud services in complex scenarios.
Date: Thursday, April 19, 2012 Time: 16:30-17:30
The Bad Things that can happen if Encryption Management Fails
Mike Small, KuppingerCole • Gregory Webb, Venafi, Inc.
The recent surplus of security compromises is evidence of major encryption management failure across the IT landscape. Recent research has highlighted some alarming facts; companies have little idea how many of these security assets they have in their inventories, where they are deployed, who has access to them, or how they are managed. With little understanding of best management practices, enterprises are likely to experience significant security, operational, and audit risks. Drawing on...
Cloud Security Depends on Effective Key Management
Enterprises have amassed regulated and valuable data that flows within and beyond their networks, all of which must be protected. As a result, thousands of encryption keys and certificates have been deployed across their global infrastructures and in the cloud—to secure the data and authenticate systems. How are these critical security assets being managed? Organizations that fail to properly manage these assets subject themselves to security vulnerabilities, non-compliance and...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Apr 17 - 20, 2012 Munich, Germany