Experts Stage I
- TYPE: Track START DATE: Wednesday, May 16, 2018 START TIME: 11:00 LOCATION: WINTER GARDEN
Date: Wednesday, May 16, 2018 Time: 11:00-12:00
Starting Real Cybersecurity Means Protecting Credentials
Jonathan Sander, STEALTHbits Technologies
Read about all the breaches and you will find one common theme, attackers used a weak credential to gain access. Organizations that learn to protect credentials in services like AD are the more likely to be secure, operate with the least risk, and ensure they meet their compliance goals. Protecting credentials is about having visibility into where they are at risk, and automating mechanisms to mitigate or even remove those risks. We will discuss where the typical weaknesses are found, how...
Evolution of security perimeter. Why IAM is becoming the last Frontier
Joseph Carson, Thycotic
The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices. This meant that a traditional perimeter...
Policy Management – The New Challenge
Niels von der Hude, Beta Systems Software
After ‘user lifecycle’ and ‘role management’, governance aspects of another IAM object entered the focus of auditors: Policy Management - More and more the definition of and compliance with policies are assigned to the business layer. In addition to this, new dimensions for SoD like the ‘cooling-off’ periods in the revised MaRisk regulation are increasing the complexity for the implementation, transparency and recertification of adequate policy management...
Date: Wednesday, May 16, 2018 Time: 12:00-13:00
GDPR Technology. The Next Big Bet after 25 May 2018
Bram van Tiel, PwC
CIAM & API Management - The New IT Dream Team!
Andre Priebe, iC Consult Group
Customer Identity & Access Management and API Management are known to be business enablers. But in combination they are even more than the sum of their parts. Key takeaways: API Management is the key technology to become part of your customers' digital ecosystem Most important actors of an API Management solution are external developers Customer Identity & Access Management and API Management accelerate each other
The Business Value of CIAM and how to measure it
Allan Foster, ForgeRock
As global competition continues to intensify and customer expectations keep rising, companies are increasingly looking for ways to win and keep customers happy. Many companies are realizing that keeping a customer happy in this hyper competitive world means serving her in a very personalized manner while protecting her identity. As companies strive to become more customer centric, some of them have started to see the critical role customers’ digital identity can play. In this...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 15 - 18, 2018 Munich, Germany
The European Identity & Cloud Conference 2018 is proud to present a large number of partners
How can we help you