- TYPE: Track START DATE: Thursday, May 12, 2016 START TIME: 11:00 LOCATION: CHIEMSEE
Date: Thursday, May 12, 2016 Time: 11:00-12:00
IAM + Big Data + Privacy by Design = Consumer Identity?
Ivan Niccolai, KuppingerCole
Imagine an ideal world where you own your digital identity. It exists in one place, is globally accessible, private by default and simple to maintain. You may want to show parts of it to others, but the choice is yours. Vendors dealing with you would never get into conflict with ever-tightening privacy regulations. They wouldn´t necessarily need to know who you are, as long as there is a relationship in place which allows the vendor to know your needs. ...
Customer Identity Management: What makes the Difference?
Jackson Shaw, Clear Skye • Martin Sandren, AholdDelhaize • Markus Weber, ForgeRock • Bram Neuteboom, Qiy Foundation • Thorsten Niebuhr, WedaCon • Jason Rose, Gigya • Amanda de Jong, PwC Technology Consulting
Over the last few years there has been a shift from internal employee focused (B2E) IAM installations towards partner and customer focused (B2C) external facing IAM systems. This means that the job market is shifting and many IAM practitioners are taking on roles in the B2C space. If you are an experienced B2E manager that has been given the job of running a B2C IAM program what should you think about? What are the main differences between B2E and B2C? Key Takeaways: The key...
Date: Thursday, May 12, 2016 Time: 12:00-13:00
IDaaS needs another S for Security
Jackson Shaw, Clear Skye • Nishant Kaushik, Uniken • Barry Scott, Centrify • Jan Johannsen, IPG Information Process Group GmbH
The Identity-as-a-Service solutions of today are helping many businesses address the password management problem, enabling a seamless experience for end users, and delivering IT efficiencies. But as more and more enterprises put Cloud at the center of their enterprise IT, is that enough? Join this session to learn about the security challenges of a SaaS-first world, and the transformation needed in Identity-as-a-Service to address these challenges.
BYOI (Bring Your Own Identity): Me, Things and the Relationship between. The Claim for a Frictionless Security World
Alessandro Festa, One Identity
Frictionless IT is a simple term to understand, it's about an IT ecosystem focused on give the end user a continuous user experience where there’s not friction, hence the term, while using different devices, application, programs, networks or at higher level any on premise/cloud environment. It's an IT that just work anywhere, anytime with any device for any user. Embracing a journey toward a frictionless IT ecosystem need to embrace an equivalent and inclusive journey toward a...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 10 - 13, 2016 Munich, Germany