Next Generation Identity Based Security – on-Site and in the Cloud - II

  •  TYPE: Track    START DATE: Wednesday, May 10, 2017     START TIME: 14:30    LOCATION:  ALPSEE
Parent Track


Considering the complex and distributed nature of cloud-based platforms, traditional, perimeter-based security models are not enough and identity-based security models are a better fit. This is a fundamental shift in thinking -- and in technology.

  • Authentication Trends: Adaptive Authentication & Risk Based Authentication; eIDAS for PSD2 compliant online customer-boarding; Multifactor-Authentication (MFA)
  • Privileged Account Management (PxM): Improving Cybersecurity through implementing state-of-the-art Management for privileged users
  • Cloud Access Security Brokers (CASB) : Ensuring secure and compliant access to cloud services without losing the agility and cost benefits that these services provide
  • Machine Learning & Artificial Intelligence based threat detection
  • Choosing the best possible solution for your Access Management & Single Sign-on
  • Legacy IAM Modernization – dos and don'ts


Market View: Results from a Recent KuppingerCole Leadership Compass on Privilege Management

Date: Wednesday, May 10, 2017 Time: 14:30-15:30

Market View: Results from a Recent KuppingerCole Leadership Compass on Privilege Management
Martin Kuppinger, KuppingerCole

Strategies for Effective Privileged Access Management in Cloud Environments
Idan Shoham, Hitachi ID Systems • Patrick Parker, EmpowerID • Christian Götz, CyberArk • Barry Scott, Centrify • William Culbert, Bomgar • Rajesh Ganesan, ManageEngine, a division of Zoho Corp • Scott Carlson, BeyondTrust

As server and application infrastructures move to the cloud, one of the critical challenges for the enterprise IT organizations is to ensure they effectively and securely manage high privilege access to those systems. This requires having full visibility over who has access to what, how to enable and revoke access reliably, enabling access to users regardless of their location or device type, automate rotation of sensitive account passwords, SSH keys and SSL certificates and having...

Building a Unified Authorization Framework with RBAC & ABAC

Date: Wednesday, May 10, 2017 Time: 15:30-16:30

Building a Unified Authorization Framework with RBAC & ABAC
Dan Blum, KuppingerCole • Kevin D. Hendricks, International Finance Corporation

Authorization frameworks comprise run-time policy enforcement, administration-time policy models, and IAM governance. Groups are the dominant policy model in the enterprise today. Easy to manage from the bottom up, the problem is that groups tend to sprawl. Turning to RBAC, some organizations have a good set of positional roles, but others don't. Either way, RBAC easily succumbs to role proliferation if practicioners layer too many special cases and exceptions onto the model. Fortunately,...

Best Practices in Enterprise Authorization
Gerry Gebel, Strata Identity, Inc • Dan Blum, KuppingerCole

Designing the Next-Generation IAM Architecture in a Multi Tenancy Private Cloud

Date: Wednesday, May 10, 2017 Time: 17:30-18:30

Designing the Next-Generation IAM Architecture in a Multi Tenancy Private Cloud
Peter Blauth, Fiducia & GAD IT AG • Torsten Vogt, Fiducia & GAD IT AG

The Fiducia & GAD IT AG is one of the leading IT service providers in Germany as well as an IT Competence Centre and IT service provider in the Cooperative Financial Group. Fiducia & GAD provides their customers with a comprehensive range of services in the field of information technology. The core competencies of Fiducia & GAD are in computer center operations requiring a high level of security using state-of-the-art mainframe, open system and Unix technologies as well as in...

Identity Deconstructed -- Graphically
George Fletcher, Capital One

Much of identity access management is based on relationships between entities with in the system and this maps very well to a graph based data model. This talk will describe a proposed set of objects and relationships that will support use cases for managing people and things. The goal is to provide a baseline and framework for building more complex and vertical solutions. Key Takeaways Core entities of an identity graphical model How the model applies to common use cases...

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany