Cyber Security Experts Stage

  •  TYPE: Track    START DATE: Wednesday, May 10, 2017     START TIME: 14:30    LOCATION:  WINTER GARDEN
Parent Track



Where Cybersecurity Strategy (Risk Management) and Practical Deployment meet

Date: Wednesday, May 10, 2017 Time: 14:30-15:30

Where Cybersecurity Strategy (Risk Management) and Practical Deployment meet
Peter Allor, IBM Security

A Risk based Strategy is in great demand for all organizations, but how do you formulate a risk approach that can realize a practical deployment? Are there practical examples of how to do this and can I use them to be effective in stopping the wide array of threats facing my organization? Where do you start and what tools and customized frameworks can help you to move beyond compliance to risk-based strategy that your management understands and supports? Learn how in the discussion of what...

Achieving Enhanced Security While Driving Business Growth with the Power of Identity
Darran Rolls, KuppingerCole

The world today is more advanced and interconnected than it ever has been before. The channels for information and systems access are now many and varied. In today’s IT environment, it is far easier to gain information and access through these new channels and much harder to protect it. Every business today walks the fine line between business-enabled access and appropriate security and privacy. Information security investment involves a complex set of competing priorities. Most...

RBAC to ABAC – a Pragmatic Scenario
André Koot, Nixu Cybersecurity

Securing Privileged Accounts in the Cloud

Date: Wednesday, May 10, 2017 Time: 15:30-16:30

Securing Privileged Accounts in the Cloud
Christian Götz, CyberArk

Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data. Introducing a real challenge, privileged accounts in cloud environments are at a critical...

Protecting Privileged Active Directory and Local Accounts
Michael Breier, n3k Informatik GmbH

Privileged Account Management Roadmap
Patrick Parker, EmpowerID

Privileged accounts are at the heart of all major recent breaches and traditional IAM techniques are ineffective in stopping these attacks. Novel hybrid IAM/PAM and Cybersecurity techniques are required to contain the ever-evolving persistent threats we operate under. In this session, we will walk through a realistic roadmap for increasing an organization’s overall security around the management of Privileged Identities. A multi-phased approach will be outlined which addresses key...

Identity & Access Management out of the Cloud

Date: Wednesday, May 10, 2017 Time: 17:30-18:30

Identity & Access Management out of the Cloud
Dietmar Krüger, Telekom Security

Traditional enterprise perimeters are vanishing due to the sourcing of computing resources and applications from heterogeneous multi-cloud environments. Business processes and sensitive business data are leaving the enterprise domain. Meanwhile, new decentralized identity silos are emerging in the Cloud and have to be managed in order to maintain full access governance. Moreover, the proliferation of mobile devices and the need to collaborate on a global scale are challenging existing...

Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses
Alessandro Festa, One Identity

Many organisations that are confident that they have protected themselves from data breaches, have a false sense of security. In fact, they have a dangerous blind spot when it comes to privileged access governance. Many organisations are managing identity and access for regular users and privileged users in separate silos, blind to the risks of their failure to address privileged access governance (PAG) as part of a unified approach to governance. Join this session to identify the...

SSH Keys. Trusted Access out of Control
Rami Raulas, SSH Communications Security

SSH user keys provide access to your most critical infrastructure and applications, both on premise and in the cloud. Unlike other access credentials they are the ONLY form of access that can be self-provisioned without oversight, never expire, & are not clearly linked to identity and governance polices or systems. In this session we will demonstrate for you the challenge enterprises face today and how to gain visibility, control & governance of this unharnessed access.

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany