Managing Identities and Access to Information for Cloud, Mobile and Social Computing

  •  TYPE: Track    START DATE: Wednesday, May 15, 2013     START TIME: 14:00    LOCATION:  ALPSEE
Parent Track


Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now, is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers and to run our enterprises. It is all about the shift of control into the hands of users, far beyond of what we used to call consumerization. Identity and access is the key element in this paradigm shift and there is no better place to get the right input for your strategy than EIC 2013. It is about protecting corporate information while enabling business agility.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • Describe how Cloud Computing, Mobile Computing and Social Computing are creating new business opportunities but also new challenges to protect information
  • Explain the concepts behind the emerging approaches to managing identity and access to the cloud and when using mobile devices
  • Explain how to evaluate authentication methods in order to reduce security risks such as insider threats and external threats
  • Discuss the state of secure customer identities that work well for both customers and enterprises
  • Explain why IAM needs to change and why it will still be needed into the future
  • Describe the different ways IAM functionality can be provided as cloud services
  • Describe the strategies for moving existing IAM deployments to the cloud
  • Describe how to use IAM to protect you from Advanced Persistent Threats and Auditors
  • Discuss the impact of allowing employees to use third party identities (like Facebook) to access services
  • Discuss whether Identity as a Service will help to solve the problems of cloud, mobile and social computing

This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attend.


The Future of IAM: Do not kill IAM, improve and extend it!

Date: Wednesday, May 15, 2013 Time: 14:00-15:00

The Future of IAM: Do not kill IAM, improve and extend it!
Martin Kuppinger, KuppingerCole

IAM has to change. It has to support more and other users than ever. It has to support internal and external (Cloud) services. It has to support logins from social networks and the transition of these users to “regular” users once they become real customers. It has to support the move from traditional, system-centric and static approaches of identity and access management to flexible, distributed, and dynamic approaches. However, instead of following a recent proposal made in...

Extending your existing IAM to the Cloud: Leverage your Investments
Rudolf Wildgruber, Atos IT Solutions and Services GmbH • Jörn Dierks, NetIQ • Hila Meller, BT • Mike Neuenschwander, iC Consult Americas • Ramses Gallego, Dell • Shawn Keve, Simeio Solutions

There are many ways to extend your existing IAM to the Cloud: Migrate to a cloud-based deployment model. Support simple sign-on to cloud services and provisioning of users for these services based on your existing on-premise environment. Complement the solution with new tools and features for the cloud. Add cloud-based strong authentication. And many more… But clearly there is neither the holy grail of cloud support for IAM nor the one and only approach of deploying IAM. In this...

Using IAM to protect you from Advanced Persistent Threats and Auditors

Date: Wednesday, May 15, 2013 Time: 15:00-16:00

Using IAM to protect you from Advanced Persistent Threats and Auditors
Martin Kuppinger, KuppingerCole • Ramses Gallego, Dell

Identity & Access Management has become a lot more than just single sign-on. There are real threats which effective IAM can solve. For example access certification can bring you in line with regulations while removing attack vectors. Controlling privileged account access can reduce insider threats and take the sting out of APTs that rely on sloppy admin access. And simply giving the business visibility into who has access to what at the right time can empower the business to control the...

Plugging "Cloud Identity Leaks" - Should your Business become an Identity Provider?
Mark O'Neill, Axway

Third party identity providers such as Facebook and Twitter make it easy to perform "Social Login", enabling users to log into third-party services using a Facebook ID or a Twitter ID. This is convenient for consumers, but it is a potential problem for businesses whose employees may now log into business services using third-party IDs, rather than using a corporate ID. This results in an "identity leak for the organization, where Cloud services begin to manage your employees identity. A...

Identity Management as a Service (IdMaaS) - the Dope or are we Duped?

Date: Wednesday, May 15, 2013 Time: 17:00-18:00

Identity Management as a Service (IdMaaS) - the Dope or are we Duped?
Kim Cameron, • Marco Rohrer, IPG AG • Jörn Dierks, NetIQ • Dr. Laurent Liscia, OASIS • Craig Burton, KuppingerCole • Wolfgang Strunk, Atos IT Solutions and Services GmbH • Brian Spector, CertiVox

Big players like entering the market: Will this redefine the way we do IAM and solve our challenges in the days of Cloud Computing, Mobile Computing, and Social Computing? Two identity behemoths—Microsoft and Salesforce—bucked the trend of cornering your identity in a silo and announced general purpose Identity Metasystems. Microsoft with its Azure Active Directory and Salesforce with its Salesforce Identity. Sounds too good to be true? This webinar brings...


European Identity & Cloud Conference 2013

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2013 Munich/Germany