Authentication & Authorization

  •  TYPE: Track    START DATE:  Thursday, May 16, 2013     START TIME: 14:00    LOCATION:  AMMERSEE 2
Conference Agenda

Moderator(s):

Clearly, there is a trend towards strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. It is all about understanding the bigger picture. Look at this to understand the future of authentication and authorization, not at a point approach.


Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • List the important approaches to consider when looking at the future of authentication and authorization in your organization.
  • Describe how cloud-based authentication delivery models will affect enterprise security strategies and what the ultimate authentication service should offer.
  • Describe the concepts of Versatile Authentication, Risk- and Context-Based Authentication and explain why these are important.
  • Describe the relative merits of using Authoritative Identity vs Social Footprint as a way of identifying people accessing services via the internet.
  • Describe how a project achieved more thorough integration of backend transactional systems with IAM, with a focus on real-time compliance analysis and SAP access management.

This block qualifies for up to 2.5 Group Learning based CPEs depending on the number of sessions you attend.

Sessions:

The Future of Authentication and Authorization

Date: Thursday, May 16, 2013 Time: 14:00-15:00

The Future of Authentication and Authorization
Dave Kearns, KuppingerCole

Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. It is about understanding the bigger picture. Look at this to understand the future of authentication and...

Is it Time to say Goodbye to Old-School Authentication Delivery Models?
Sebastian Goodrick, SUVA • Doron Cohen, SafeNet • Dr. Ravindar Bindra, Novartis AG • Brian Spector, CertiVox • Marc Bütikofer, Ergon Informatik AG • Frederik Kerkhofs, VASCO Data Security

Strong authentication is becoming more ubiquitous, more commoditized and more heavily consumed within the enterprise and of course beyond. This session will discuss the inter-connection between these trends, the cloud-social-mobile computing troika and the way strong authentication is delivered. Is the   commoditization and consumerization of authentication driving the adoption of  cloud-based authentication services, or is authentication as a...

Versatile Authentication, Risk- and Context-Based Authentication: Why you need these Concepts

Date: Thursday, May 16, 2013 Time: 15:00-16:00

Versatile Authentication, Risk- and Context-Based Authentication: Why you need these Concepts
Martin Kuppinger, KuppingerCole

Versatile Authentication, i.e. the ability to flexibly use and combine different authentication mechanisms, and risk-/context-based authentication and authorization are key technologies for not only the future IAM infrastructure, but your future Information Security approach. This session will explain these concepts and how they help to solve business challenges like social logins, access from mobile devices, etc. The session provides an overview of these technologies and insight into the...

Authoritative Identity vs Social Footprint - Identity´s "The Tortoise and the Hare"
Andrew Nash, CapitalOne • Colin Wallis, Kantara Initiative

While authoritative sources of identity information support the mainstream use case for identity proofing and subsequent credential binding to authenticate to an online service, there is a large proportion of the online population who are excluded because they have no social footprint - younger people and students, recent immigrants and so on. Applying Big Data capabilities to the social networking spaces offers up a social footprint that some might consider "good enough" for a low risk...

Hartmann AG: Focussing on Realtime Compliance Analysis and SAP Access Management.

Date: Thursday, May 16, 2013 Time: 16:30-17:30

Hartmann AG: Focussing on Realtime Compliance Analysis and SAP Access Management.
Johannes Liffers, PricewaterhouseCoopers • Stephan Hörger, HARTMANN Group

Where classical Identity Management (IdM) seems to get more and more a commodity, a convincing and userfriendly Access Management and Compliance Integration seems still to be more a vision than reality. With our current project at Paul Hartmann AG we will show you our path into a more thorough integration of backend transactional systems with IAM, focussing on realtime compliance analysis and SAP access management. Our aim is to make requests and approvals not only a good solution for to the...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2013

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2013 Munich/Germany

Partners

The European Identity & Cloud Conference 2013 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00