Cyber Security Experts Stage
- TYPE: Track START DATE: Thursday, May 11, 2017 START TIME: 14:30 LOCATION: WINTER GARDEN
Date: Thursday, May 11, 2017 Time: 14:30-15:30
Things Gone Wild: Security in an IoT World
James Murphy, IBM Watson
How long can we continue to place trust in the everyday devices we rely on? In an age of growing connectedness for everything from manufacturing robots to toothbrushes, the Internet of Things has the potential to morph from a helpful productivity enhancer into a cover for malicious infiltration of your home and office. Learn how makers can build secure "things" and the security controls operators can implement. We’ll present a simple model for assessing threats to the IoT ecosystem...
IAM for Industry 4.0
Ralf Knöringer, Atos • Uwe Bloecher, Siemens AG Corporate Technology
Digital Identity in the World of Connected Cars - Live Demo
Victor Ake, ForgeRock • Hanns Nolan, ForgeRock
How relationships bring clarity to complexity and how to solve authentication and authorization with a innovative Identity Relationship Platform from ForgeRock.
Date: Thursday, May 11, 2017 Time: 15:30-16:30
Full-Stack OAuth Security
Pamela Dingle, Microsoft
The OAuth 2.0 stack has matured but it involves a whole bunch of IETF RFCs. Join Pamela Dingle in a run through of the actual protocols involved in creating an OAuth identity ecosystem that might meet PSD2, Open Banking or high-assurance corporate standards. The goal will to be to see the big picture of how all the bits combine to make a working ecosystem.
Privilege Management and IAM Considerations in Hybrid Environments
Barry Scott, Centrify
As traditional definitions of privileged and end users become blurred, privileged identity management extends to much more than managing on-premises and cloud system-level logins. More users outside our companies access our systems and applications, and most data breaches are caused by compromised credentials. It’s therefore vital to: Reduce risk and enforce consistent least-privilege access security across increasingly hybrid infrastructure Understand the options for...
The Future of Cybersecurity: Giving your business Leadership the Confidence of Control
Suresh Sridharan, CA Technologies
IT Security professionals today are charting a new course. The techniques used to prevent attacks in the last decade are not working. Today the systemic monitoring aimed at securing information, detects less than one percent of all data breaches. Business leaders need a new approach to secure the future of commerce and address new regulations, specifically when mitigating risks as part of digital transformation projects. In this session, we will talk about the techniques and approaches used...
Date: Thursday, May 11, 2017 Time: 17:00-18:00
Why we Should Stop Riding a Dead Horse
Dr. Amir Alsbih, KeyIdentity
Amir will talk about the problems that we are facing as community with passwords. He will explain some facts how and why we failed to protect the real world applications with passwords and how we can solve a lot of that issues with multi factor solutions. Then he will go over and explain why we can’t stop there and must think a step further towards securing transactions that really hurts us to catch up with today’s demand for increased digitalization as well as the full connected...
Consumer Identity Management, Mobile and New Services Driving Innovation at Insurers to Increase Customer Interaction
Denis Joannides, Onegini
Insurance companies need to reinvent themselves to stay ahead of the curve, stay current with compliancy laws and regulations and redefine the way they do business. Digital transformation for insurers means getting your customers online, knowing who the customer is and engaging with them in a meaningful way. To be successful, the customer journey is essential with a focus on mobile and social solutions. Which results in the delivery and accessibility of services across all channels. With...
Industry 4.0: IGA (Identity Governance & Administration) in Hybrid Environments
Wolfgang Berger, Identity Maestro
Given the fact, that information is the critical resource within organizations combined with current trends such as Internet of Things (IOT) technology, artificial intelligence and cloud computing in the age of Industry 4.0 lead to major challenges for IGA (Identity Governance and Administration) in hybrid environments. Referring to Gartner, 63% of corporations will be replacing one or more IAM (Identity and Access Management) solutions within the next two years. The main reason is that...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 09 - 12, 2017 Munich, Germany