- TYPE: Track START DATE: Thursday, April 19, 2012 START TIME: 14:00 LOCATION: Ammersee 1
Date: Thursday, April 19, 2012 Time: 14:00-15:00
Best Practices for Lean, Efficient and Focused Information Security Projects
Dr. Horst Walther, SiG software Integration
From our Advisory Services, KuppingerCole has a long and comprehensive experience in how to do Information Security Projects in a lean, efficient, and focused way. This session will provide you advice on how to mitigate your project risks, how to solve the IT/Business alignment challenge in such projects, and how to ensure that you end up with the solution you need – and not the solution your auditor’s preferred consultants or the technology vendor have in mind. There is a lot of...
Identity and Security Intelligence
Kim Cameron, Convergence.tech • Robert Griffin, RSA, the Security Division of EMC • Edwin van der Wal, PwC
Security is now as much a question of visibility as it is of controls. Enterprises need to be able to see what’s happening throughout their physical and virtual environments, including both in house and in the cloud. This session discusses the role of identity management in security intelligence, including the kinds of information that enterprises need to collect, the kind of analysis that needs to be performed and the ways that the resulting security intelligence can be applied in...
Date: Thursday, April 19, 2012 Time: 15:00-16:00
Best Practice: Telekom Italia
Giovanni Ciminari, Telecom Italia
In order to comply with internal and external regulatory requirements, Telecom Italia had built a "Traceability & Secure Logging Framework." During this session we will cover this framework as a basis for a ‘best practice’ approch on how to implement a good Ideneity and Access solution.
Access & Entitlements - More than just Role Management
Martin Kuppinger, KuppingerCole • Gerry Gebel, Axiomatics • Marco Venuti, iWelcome
Access Management is a hot topic. It is about controlling who has access to what or, in other terms, who is entitled. Entitlements are what we need to manage. A common approach on that is Role Management. Role Management is established, there is a lot of experience. However, this experience led to two important learnings: 1) You need more than roles - you need to understand competencies, context, and the businesses processes. 2) Role Management approaches are typically to coarse grain for a...
Date: Thursday, April 19, 2012 Time: 16:30-17:30
Cloud Ready Authorization Archtitectures
Prof. Dr. Sachar Paulus, KuppingerCole • Gerry Gebel, Axiomatics
Authorization seems to still be one of the dirty secrets of IT. There is a lot of work around managing identities and accessing them. There are standards for that, like LDAP, SPML or SCIM. There is a lot of work done around managing authentication, with far too many standards like OAuth, OpenID, Kerberos, and all the others. Vendors are heavily investing, startups are popping up, and end user organizations are jumping on that topic. However, when it comes to authorization, there are only...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Apr 17 - 20, 2012 Munich, Germany