How to Build your IAM/IAG Infrastructure the Right Way – and Support Business Today

  •  TYPE: Track    START DATE:  Wednesday, May 15, 2013     START TIME: 10:30    LOCATION:  AMMERSEE 2
Parent Track

Moderator(s):

Many organizations currently are in the situation that they, on one hand, still have to do some homework in building their underlying IAM/IAG (Identity and Access Management/Governance) infrastructure. Implementing directories for internals and externals, implementing Identity Provisioning and Access Governance, Single Sign-On, etc. are things which frequently still need to be done. On the other hand there is the need to support new business requirements for instance for on-boarding of externals or managing access to cloud services today. This leads to the art of supporting business needs and agility today without losing focus.


Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • List the Four P´s of IAM/IAG in the Extended Enterprise and explain why these are important to success
  • Explain how to move forward with IAM/IAG to support the enterprise requirements and to deal with all types of third parties in a consistent way
  • Describe how and organization created customer portals with sensitive personal data without compromising security
  • Describe specific ways in which organizations can improve their DLP practices in order to help prevent both accidental and malicious losses of sensitive information
  • Describe the important old and new ID protocols and explain the pros and cons of each of them
  • Explain whether, how, and with which systems to integrate Privilege Management from both a technical and process perspective
  • List the major Open Source products that are useful in IdM projects and describe their functionality
  • Describe a system used for the Federation of non-Web-based Services in the State of Baden-Württemberg

This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attend.

Sessions:

People, Process, Product, Partner - the Four P´s of IAM/IAG in the Extended Enterprise

Date: Wednesday, May 15, 2013 Time: 10:30-11:30

People, Process, Product, Partner - the Four P´s of IAM/IAG in the Extended Enterprise
Ralf Knöringer, Atos • Henk van der Heijden, CA Technologies • Dr. Silvia Knittl, PwC

Although, Identity and Access Management (IAM) is the security backbone of an organization, it is often seen as a mere technical implementation. The four P’s comprise people, process, product and partner and are a main concept within IT service management. In this session the four P’s of IAM are applied to the context of extended enterprise. An extended enterprise is a network of firms which cover supply chains but also loosely coupled collaborations as for example arise in...

Supporting the Extended Enterprise: Partners, Customers, Mobile Users, and all the Others
Peter Cummings, KuppingerCole

The most pressing demand from business to the IAM departments today is about the “extended enterprise”. Business wants new services. They want to access services and systems of business partners. They want to onboard external partners. They want to use cloud services. All this has to be done quickly but still in a secure way. This session will explain how to move forward when it comes to supporting the enterprise and to deal with all types of third parties in a consistent way. It...

Creating Customer Portals with Sensitive Personal Data without Compromising Security

Date: Wednesday, May 15, 2013 Time: 11:30-12:30

Creating Customer Portals with Sensitive Personal Data without Compromising Security
Sebastian Goodrick, SUVA

This is a real life case study about how CSS implemented the security for a customer and sales portal using a Federated Identity Provider, 2 factor SSO with SAML, and attribute based access control on the SOA mediator between portal and backend using XACML. CSS has a well established SOA backend with Role Based Access Control: Employees are assigned to one or more roles, based upon which access to varying levels of customer data is granted. However, when opening up such an IT system to...

G4S Bulgaria: Identify and Protect Critical Information and Prevent Data Leaks
Boris Goncharov, G4S Secure Solutions Bulgaria EAD • Stephane Charbonneau, TITUS

For organizations that deal with sensitive information on a daily basis, and work with people and organizations located around the world, preventing information leaks is a top priority. There are many ways that sensitive data can leak from organizations, however the insider threat remains the hardest to quantify and resolve. G4S discovered that before they could improve their data loss prevention efforts and effectively protect sensitive information, they needed to be able to answer other...


Congress

European Identity & Cloud Conference 2013

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2013 Munich/Germany