Beyond BYOD, IT Consumerization & Mobile Enterprise

  •  TYPE: Track    START DATE:  Thursday, May 16, 2013     START TIME: 14:00    LOCATION:  AMMERSEE 1
Conference Agenda

Moderator(s):

With the shift of control to the user and the rapidly increasing diversity of devices, Organisations have to be able to learn how their employees wantto work and how their customers want to interact, and provide an infrastructure that is flexible enough to support their current and future preferences. At EIC 2013, we will discuss with you the building blocks of such an infrastructure.


Continuing Education Credits

Prerequisites: None
Advance Preparation:
None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • Describe the pitfalls of managing IAM for Enterprise, Cloud and Mobile
  • Explain the OpenID connect-based model for the interactions between the enterprise, SaaS providers, authorization agent, and native apps on the employee device.
  • Describe how leveraging standards can help to combat threats in mobile environments.
  • Explain why authentication and authorization on mobile devices needs to take context into account.
  • Describe the opportunity for mobile network service providers around the area of identity.

This block qualifies for up to 2.5 Group Learning based CPEs depending on the number of sessions you attend.

Sessions:

Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile

Date: Thursday, May 16, 2013 Time: 14:00-15:00

Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile
Fulup Ar Foll, IoT.bzh • Darran Rolls, KuppingerCole

Cloud, mobile and bring-your-own-app are new realities for today´s enterprises. Faced with growing business unit and end-user autonomy, IT organizations must re-evaluate how to address the security and compliance requirements of mission-critical applications and data that span enterprise datacenter, cloud and mobile environments. Without the right strategies and tools for managing the new "hybrid", organizations leave themselves exposed to greater risk. Fortunately, next generation-IAM...

SSO for Native Mobile Applications
Dr. Paul Madsen, Ping Identity

This session will summarize the current reality of native application authentication to native SaaS applications & present its implications on employee productivity. We will introduce the concept of a device ‘authorization agent’ installed on mobile devices and examine how this concept resolves SaaS application access challenges - enabling a SSO experience for native applications as is now possible for web applications. We will present an emerging industry-defined...

OASIS Panel: Leveraging Standards to Combat Threats in Mobile Environments

Date: Thursday, May 16, 2013 Time: 15:00-16:00

OASIS Panel: Leveraging Standards to Combat Threats in Mobile Environments
Anthony Nadalin, Microsoft • John Sabo, OASIS Idtrust • Robert Griffin, RSA, the Security Division of EMC • Sven Gossel, Charismathics

Industry experts will come to the table to discuss the significant security, privacy and operations issues within mobile environments, approaches to addressing these issues, and the ways in which standards efforts can contribute to the solutions. Each speaker, an expert in a critical aspect of mobile, will weigh-in with opinions on topics including:  threats and other security operational issues for mobile; privacy concerns and solutions, and their implications specific to the...

The Key to Mobile Security: Take the Authentication and Authorization Context into Account

Date: Thursday, May 16, 2013 Time: 16:30-17:30

The Key to Mobile Security: Take the Authentication and Authorization Context into Account
Martin Kuppinger, KuppingerCole

Organizations today understand the need to mitigate risks for corporate systems and information through access via mobile devices. However, the point solutions for MDM (Mobile Device Management) etc. don’t really solve this problem – especially when understanding the bigger picture of Information Security in these days of the Computing Troika, where Cloud Computing, Social Computing, and Mobile Computing are game changers for Information Security. It is about understanding that...

Facing The Future: Identity Opportunities for Mobile Operators
Jörg Heuer, Deutsche Telekom Laboratories • Prof. Dr. Kai Rannenberg, Goethe University in Frankfurt

With the advent of 4G/LTE, mobile operators are facing challenges and opportunities that will shape the future direction of communications for at least the next five to ten years. Faced with the erosion of revenues from the rapid encroachment of the so-called OTT (over the top) players, such as Apple, Google and many others, into their traditional market strongholds, operators are coming to the increasing realisation that data – ‘big data’ – represents their most...


Congress

European Identity & Cloud Conference 2013

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2013 Munich/Germany