Mobile Security

  •  TYPE: Track    START DATE: Wednesday, May 14, 2014     START TIME: 14:30    LOCATION:  AMMERSEE I
Conference Agenda



Evaluating the Risks of Social Login

Date: Wednesday, May 14, 2014 Time: 14:30-15:30

Evaluating the Risks of Social Login
Mike Small, KuppingerCole

While Information Security people have been rather reluctant regarding social logins, there always has been pressure from Marketing, Sales, and Business Development departments. The reasons given by InfoSec people to be more careful have been aspects such as the authentication strength and assurance of these services. Marketing on the other hand has seen this as a "must have" feature for customer convenience and to be "modern". There is a value in BYOI (Bring Your Own Identity), enabling the...

How to Enable Social and Mobile Login – and Beyond
Don Schmidt, Microsoft • Christian Patrascu, Symantec • Daniel Raskin, ForgeRock • Dr. Michael B. Jones, Microsoft • Ian Glazer, IDPro

In this thought leadership panel, the panelists will discuss the various options for securely enabling social and mobile logins in existing on-premise IAM infrastructures and by adding Cloud-based services. Supporting these environments is a common requirement and IT organizations have to be able to react on this. They especially must support mobile security as part of this, in the context of secure access to information (and not only by protecting devices). However, today’s approaches...

Extending Identity and Access to the Mobile World

Date: Wednesday, May 14, 2014 Time: 15:30-16:30

Extending Identity and Access to the Mobile World
Hans Zandbelt, OpenID Foundation • Stephan Schweizer, AdNovum Informatik AG • Niklas Brask, Pointsharp AB • Bart Renard, VASCO Data Security • Avi Yehuda, Nativeflow

During this panel, we will take a deep dive into the world of mobile data security with an emphasis on how enterprises data need to ensure the security of corporate data as more employees are relying on mobile devices to get their work done and access corporate data on the go.

Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World
Thomas van Vooren, Everett • Per Hägerö, neXus

In today’s world, more and more is moving beyond control of the enterprise. Apparent examples are the adoption of Cloud technologies, BYOD (bring your own device) and BYOI (bring your own identity). At the same time there is increased regulatory pressure and a growing internal demand for better fraud prevention and protection of intellectual property. A detective approach to access governance and the help of distributed control mechanisms can help enterprises to stay in control in this...

How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem

Date: Wednesday, May 14, 2014 Time: 17:30-18:30

How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem
Dominic Schmidt-Rieche, AirWatch by VMware • Pavlos Makridakis, Aurionpro Solutions plc • Chris England, Okta • Dirk Wahlefeld, CYFIRMA

The evolutionary nature of mobile presents a security-centric challenge for businesses with corporate content on these devices. Enterprises put themselves at risk when users access sensitive information through email and applications across smartphones and tablets, while mobile. Organizations can choose to ignore this security threat or enhance employee productivity through secure access to sensitive corporate content. The Panelists will discuss best practices and strategies to ensure...


European Identity & Cloud Conference 2014

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 13 - 16, 2014 Munich, Germany