Experts Stage I

  •  TYPE: Track    START DATE: Wednesday, May 16, 2018     START TIME: 11:00    LOCATION:  WINTER GARDEN
Parent Track



Starting Real Cybersecurity Means Protecting Credentials

Date: Wednesday, May 16, 2018 Time: 11:00-12:00

Starting Real Cybersecurity Means Protecting Credentials
Jonathan Sander, STEALTHbits Technologies

Read about all the breaches and you will find one common theme, attackers used a weak credential to gain access. Organizations that learn to protect credentials in services like AD are the more likely to be secure, operate with the least risk, and ensure they meet their compliance goals. Protecting credentials is about having visibility into where they are at risk, and automating mechanisms to mitigate or even remove those risks. We will discuss where the typical weaknesses are found, how...

Evolution of security perimeter. Why IAM is becoming the last Frontier
Joseph Carson, Delinea

The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices. This meant that a traditional perimeter...

Policy Management – The New Challenge
Niels von der Hude, Beta Systems Software

After ‘user lifecycle’ and ‘role management’, governance aspects of another IAM object entered the focus of auditors: Policy Management - More and more the definition of and compliance with policies are assigned to the business layer. In addition to this, new dimensions for SoD like the ‘cooling-off’ periods in the revised MaRisk regulation are increasing the complexity for the implementation, transparency and recertification of adequate policy management...

GDPR Technology. The Next Big Bet after 25 May 2018

Date: Wednesday, May 16, 2018 Time: 12:00-13:00

GDPR Technology. The Next Big Bet after 25 May 2018
Bram van Tiel, PwC

CIAM & API Management - The New IT Dream Team!
Andre Priebe, iC Consult Group GmbH

Customer Identity & Access Management and API Management are known to be business enablers. But in combination they are even more than the sum of their parts. Key takeaways: API Management is the key technology to become part of your customers' digital ecosystem Most important actors of an API Management solution are external developers Customer Identity & Access Management and API Management accelerate each other

The Business Value of CIAM and how to measure it
Allan Foster, Chief Evangelist

As global competition continues to intensify and customer expectations keep rising, companies are increasingly looking for ways to win and keep customers happy. Many companies are realizing that keeping a customer happy in this hyper competitive world means serving her in a very personalized manner while protecting her identity. As companies strive to become more customer centric, some of them have started to see the critical role customers’ digital identity can play. In this...

Munich, Germany


European Identity & Cloud Conference 2018

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 15 - 18, 2018 Munich, Germany