Identity Defined Security

  •  TYPE: Track    START DATE: Thursday, May 07, 2015     START TIME: 14:30    LOCATION:  ALPSEE
Parent Track


The number of digital Identities and the complexity of authorizations is strongly rising, especially if we start adding the identity of billions of things which will be connected in the coming years. Exploding data quantities will be the result, making it more and more necessary to use new approaches, like big data analytics or behavioral analytics, to identify threats in nearly realtime. The challenge is that these approaches are young disciplines and as such immature. In this track, we will explore the current status  and create an adoption roadmap for the next 3 years. 

After attending this block of sessions you will be able to

  • Describe behavioral intelligence and its role in preventing cyber-attacks
  • List the different methods of risk-based security in relation to behavioral intelligence

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attended.


What If the Future of Security Means Not Knowing It’s There?

Date: Thursday, May 07, 2015 Time: 14:30-15:30

What If the Future of Security Means Not Knowing It’s There?
Christian Patrascu, Symantec • Kim Cameron, • Jackson Shaw, Clear Skye • Nishant Kaushik, Uniken • Dr. Sridhar Muppidi, IBM Security

For the modern enterprise, agility is the name of the game. What does that mean for enterprise security? How can security practices and policies evolve at the same rate as the business, while simultaneously adapting to an anywhere, anytime, any device IT environment that faces an increasing number of increasingly complex security threats?  As the real world becomes more real-time, security will need to adjust by transitioning from a highly structured, policy-based,...

User Discovery: Changing Best Practices and Protocol Convergence
Pamela Dingle, Microsoft

The simple question of "who are you" is a problem with changing importance in the identity industry. Reigning best practice in authentication has favored a stateless model, where all users are treated as strangers when a session is not detected, regardless of high likelihoods of recurring usage by a single person on a given browser or device. This best practice is now under challenge, as multifactor authentication more tightly binds user identity to devices, and as security context, identity...

IAM as a Service Best Practice: B.Braun Melsungen AG

Date: Thursday, May 07, 2015 Time: 15:30-16:30

IAM as a Service Best Practice: B.Braun Melsungen AG
Martin Oberlies, B.Braun Melsungen AG

Experiences with IAM as a Service and/or IAM Managed Service
Darran Rolls, KuppingerCole / Cloud 10 • Peter Weierich, iC Consult GmbH • Maarten Stultjens, OneWelcome • Theo Punter, PostNL • Martin Oberlies, B.Braun Melsungen AG • Yso Vonk, NXP Semiconductors

Many organizations today raise the question whether they could and should move their IAM infrastructure to the cloud (IAM as a service) or run it as a managed service. However, many IAM infrastructures still primarily support on-premise applications, thus this would be about connecting back to the on-premise IT infrastructure. So, does IAM in the cloud or as managed service only work well for organizations that run most of their IT in the cloud anyway? And what about customizations? IAM...

The Anthem Breach and how it could have been Avoided

Date: Thursday, May 07, 2015 Time: 17:00-18:00

The Anthem Breach and how it could have been Avoided
Dave Kearns, KuppingerCole

In January, Anthem Healthcare, the US’s second-largest health insurer, reported that the personal records of as many as 80 million individuals were compromised. Many so-called "security gurus" quickly called out the company for two flaws that were felt to be the major causes of the breach. The gurus were wrong. Kuppinger-Cole analyst Dave Kearns will guide you through the most likely vector for the attack, why the gurus’ recommendations wouldn’t have stopped the attack and...

Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions
Martin Kuppinger, KuppingerCole

Real Time Security Intelligence is one of the red hot topics in Information Security these days. There are a growing number of solutions that allow analysis of security-related incidents in real time, but can also detect anomalies in what is happening in the network. We also observe strong innovation in the field of IAM (Identity and Access Management) and IAG (Identity and Access Governance), moving from preventive-mode to detective-mode incorporating responsive solutions as well as...


European Identity & Cloud Conference 2015

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 05 - 08, 2015 Munich, Germany