Identity Aware Cybersecurity

  •  TYPE: Track    START DATE:  Thursday, May 12, 2016     START TIME: 14:30    LOCATION:  AMMERSEE I
Parent Track

Moderator(s):

Sessions:

Recertifications - What's Possible Today, Limitations and the Future Potential for Access Governance

Date: Thursday, May 12, 2016 Time: 14:30-15:30

Recertifications - What's Possible Today, Limitations and the Future Potential for Access Governance
Niels von der Hude, Beta Systems Software • Paul Simmonds, KuppingerCole

Recertifications are one of the established concepts in IAM today. However, you will rarely find any organization that is really happy with the way recertification works. Recertification initiatives cause a lot of work, friction, and frustration. However, the biggest challenge of recertification is that it is more than questionable whether it delivers on its target, which is is risk mitigation, concretely access risk mitigation. By running regular recertification campaigns, organizations...

Beyond Recertification
Niels von der Hude, Beta Systems Software • Andy Land, IBM • Christian Himmer, KuppingerCole • Frank Böhm, FSP

Very few companies, if any, are satisfied with the outcomes of their recertification efforts, because intelligence on risks come too late to be of real value. In this panel session we will discuss on how to get better and what possible alternative strategies are.  

Building structures for IAM automation

Date: Thursday, May 12, 2016 Time: 15:30-16:30

Building structures for IAM automation
Ralf Knöringer, Atos • Dr. Martin Kuhlmann, Omada • Dr. Juergen Spitzner, Micro Focus • Gianluca Brigandi, Atricore Inc. • Patrick Parker, EmpowerID

Technically, automated access management based on attributes, rules and roles has become a no-brainer. But missing organizational structures and unstructured service and resource management are a barrier for tapping the full automation potential. Uncontrolled access management procedures have often led to intransparent environments where the implementation of policies is difficult. The panel will discuss where automation makes sense and where not. Clean-up strategies are discussed, and...

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections

Date: Thursday, May 12, 2016 Time: 17:00-18:00

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
Darran Rolls, SailPoint

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls will present the anatomy of a typical...

The Future of On-Premise AD in the days of Azure AD
Kim Cameron, Microsoft

Azure AD is here. It can act as a domain controller. It helps you managing your partners. It is ready-made for managing your customers. The application proxy builds the bridge back to your on-premise applications. That raises an important question for all organizations running AD on-premises: What is the future role for on-premise AD? What is the right strategy? Who can and should get rid of on-premise AD now or in the near future, who should focus on a hybrid strategy? Where is the overlap?...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 - 13, 2016 Munich, Germany

Partners

The European Identity & Cloud Conference 2016 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00