IAM/IAG Strategic Planning

  •  TYPE: Track    START DATE:  Wednesday, May 14, 2014     START TIME: 14:30    LOCATION:  AUDITORIUM
Parent Track

Moderator(s):

IAM (Identity and Access Management) and IAG (Identity and Access Governance) have evolved to key topics within both Information Security and IT Infrastructure. Their central role in enabling the new ABC (Agile Businesses – Connected) by allowing controlled access of all types of users to all types of services, but also the key role they play in achieving regulatory compliance and implementing governance, drives the evolution of IAM/IAG. Most organizations have already made some investment in IAM and IAG. Many of these investments are focused on the on-premises infrastructure. With the need to support external users such as customers and business partners and both Cloud applications and on-premise applications, IAM/IAG must move to the next level. There are many new opportunities such as Cloud IAM, risk- and context-based authentication and authorization, Dynamic Authorization Management, etc. On the other hand, IAM still must work well for the existing on-premises infrastructure.

In other words: It is time for IAM/IAG Strategic Planning. This track provides the information required for IAM/IAG Strategic Planning. It looks at how to evolve the existing infrastructure in an “embrace and extend” approach instead of “rip and replace”. It looks at the role of peoples and processes, the IAM/IAG Vendor Landscape, and new evolutions within IAM/IAG that will help you get a better grip on the underlying system-level entitlement management.


Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block of sessions you will be able to:

  • Explain how to balance existing investments in IAM/IAG with your future needs.
  • Describe the approach taken by a bank to maturing the people, processes and solutions for IAM/IAG.
  • Describe how the IAM/IAG market is evolving to include Data Governance, Cloud Access Governance, integration of Privilege Management features, Access Intelligence and others.
  • Define the 5 Critical Tenets of Identity and Access Management.
  • Define the level of detail that IAM solutions need to cover to satisfy audit requirements without being disproportionate.

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attend.

Sessions:

IAM/IAG: Balancing Existing Investments with your Future Needs

Date: Wednesday, May 14, 2014 Time: 14:30-15:30

IAM/IAG: Balancing Existing Investments with your Future Needs
Prof. Dr. Sachar Paulus, KuppingerCole

Balancing existing investments with future needs – this is a tough challenge to solve. This is even more true for IAM/IAG, where organizations face a number of new challenges such as onboarding business partners and customers, collaborating in industry networks, or managing access to Cloud services securely. Clearly, there is the need of having a big picture in mind, defining a roadmap, and executing this step-by-step, while regularly adjusting the vision, strategy, and roadmap to new...

People, Processes, Solutions: Maturing IAM/IAG at Commerzbank AG
Dirk Venzke, Commerzbank AG

Refering to the core message in the keynote ´Mastering the IAG Challenge´, the focus here is on the main steps to be taken in setting up and maturing an IAM/IAG program. What are the key lessons in such an approach? What does it mean in detail to focus on people, process and only finally on solutions and why is it critical for that focus to be exactly in that order?

Access Governance Vendor Panel

Date: Wednesday, May 14, 2014 Time: 15:30-16:30

Access Governance Vendor Panel
Marco Venuti, iWelcome • Ramses Gallego, Dell • Sebastian Kornblueh, G+H Netzwerk-Design • Morgan Holm, empowerID • Roy Peretz, Whitebox Security • Pervez Goiporia, Oracle

The Access Governance market is maturing – and changing. While there are many vendors now that have a strong offering for IAG (Identity and Access Governance), there are various new features provided by the one or other vendor. Data Governance, Cloud Access Governance, integration of Privilege Management features, Access Inteliigence, etc. Aside of that, there is the more fundamental question of whether the better approach is integrating Identity Provisioning and Access Governance or...

The 5 Critical Tenets of Identity and Access Management
Darran Rolls, SailPoint • Mike Neuenschwander, iC Consult Americas • Amar Singh, KuppingerCole

The IAM market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service.  At the same time most organizations are struggling with how to best utilize the IAM solutions they have to manage their changing world of IT infrastructure.  New technologies like cloud and mobile are being mixed...

What Is the Level of Detail, an IAM Solution Must Cover?

Date: Wednesday, May 14, 2014 Time: 17:30-18:30

What Is the Level of Detail, an IAM Solution Must Cover?
Darran Rolls, SailPoint • Niels von der Hude, Beta Systems Software • Andrea Rossi, IBM • Thomas van Vooren, Everett

The question about the level of detail, an IAM solution must cover, has been around since some time. But more than ever before, it is one of the most challenging questions in many IAM projects. On the one hand, audits are requesting end-to-end coverage (from the user to the individual file, document, folder). On the other hand, the amount of data is growing disproportionately with each implemented level. Some implementations stop the IAM administration at group-level in general in order...

Entitlement & Access Governance: How to do Data Governance Right?
Amar Singh, KuppingerCole • Pervez Goiporia, Oracle • Borja Rosales, Druva

Entitlement & Access Governance defines an approach that combines the cross-system view of Access Governance with system-level management of entitlements. However, there are various ways to keep your data under control. While some vendors address the challenge by expanding their Access Governance solutions, others tackle it from the system and data level. Which approach works better? And for whom? In this discussion, Borja Rosales of Druva and Pervez Goiporia of Oracle will discuss...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2014

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 13 - 16, 2014 Munich, Germany

Partners

The European Identity & Cloud Conference 2014 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00