Experts Stage I

  •  TYPE: Track    START DATE:  Wednesday, May 16, 2018     START TIME: 11:00    LOCATION:  WINTER GARDEN
Parent Track

Moderator(s):

Sessions:

Starting Real Cybersecurity Means Protecting Credentials

Date: Wednesday, May 16, 2018 Time: 11:00-12:00

Starting Real Cybersecurity Means Protecting Credentials
Jonathan Sander, STEALTHbits Technologies

Read about all the breaches and you will find one common theme, attackers used a weak credential to gain access. Organizations that learn to protect credentials in services like AD are the more likely to be secure, operate with the least risk, and ensure they meet their compliance goals. Protecting credentials is about having visibility into where they are at risk, and automating mechanisms to mitigate or even remove those risks. We will discuss where the typical weaknesses are found, how...

Evolution of security perimeter. Why IAM is becoming the last Frontier
Joseph Carson, Thycotic

The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices. This meant that a traditional perimeter...

Policy Management – The New Challenge
Niels von der Hude, Beta Systems Software

After ‘user lifecycle’ and ‘role management’, governance aspects of another IAM object entered the focus of auditors: Policy Management - More and more the definition of and compliance with policies are assigned to the business layer. In addition to this, new dimensions for SoD like the ‘cooling-off’ periods in the revised MaRisk regulation are increasing the complexity for the implementation, transparency and recertification of adequate policy management...

GDPR Technology. The Next Big Bet after 25 May 2018

Date: Wednesday, May 16, 2018 Time: 12:00-13:00

GDPR Technology. The Next Big Bet after 25 May 2018
Bram van Tiel, PwC


CIAM & API Management - The New IT Dream Team!
Andre Priebe, iC Consult

Customer Identity & Access Management and API Management are known to be business enablers. But in combination they are even more than the sum of their parts. Key takeaways: API Management is the key technology to become part of your customers' digital ecosystem Most important actors of an API Management solution are external developers Customer Identity & Access Management and API Management accelerate each other

The Business Value of CIAM and how to measure it
Allan Foster, ForgeRock

As global competition continues to intensify and customer expectations keep rising, companies are increasingly looking for ways to win and keep customers happy. Many companies are realizing that keeping a customer happy in this hyper competitive world means serving her in a very personalized manner while protecting her identity. As companies strive to become more customer centric, some of them have started to see the critical role customers’ digital identity can play. In this...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2018

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 15 - 18, 2018 Munich, Germany

Partners

The European Identity & Cloud Conference 2018 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00