Enterprise IAM: Challenging the Future

  •  TYPE: Track    START DATE:  Wednesday, May 16, 2018     START TIME: 14:30    LOCATION:  ALPSEE
Parent Track

Moderator(s):

Many Enterprise IAM implementations are well-aged. They serve to the traditional needs, sometimes better, sometimes worse. Challenges frequently found include complex customization; performance issues; outdated user interfaces; and the inability to serve new requirements, from efficient access recertification to consumer identities/CIAM integration or GDPR support. This holds true for both Enterprise IAM that is build on COTS software and implementations that are home-grown.

On the other hand, there rarely is a place for a rip-and-replace approach to a new IAM. It is not that everything is bad. It is not that nothing is there. It is about modernizing the Enterprise IAM and moving to the next level, ensuring that this evolution works smoothly and is not disruptive to the business and all the applications relying on the Enterprise IAM today.

This track will look in depth at the various aspects to consider in this journey, from the big picture for all of IAM including Consumer IAM to selecting the right tools, finding the right talent, and running the transition program. It is about providing the information you need to leverage what you have to the next level of IAM.

Sessions:

The Supply Chain of Identity in Transport and Logistics

Date: Wednesday, May 16, 2018 Time: 14:30-15:30

The Supply Chain of Identity in Transport and Logistics
Amarpal Attwal, Maersk

In an industry where the majority of transactions from shipping quotes to customs papers to payments is largely legacy and manual, we'll take a closer look at how long of a supply chain there is for Identity. Explore challenges in a largely legacy industry when striving for digitalisation, unveil opportunities for the industry and beyond and take a peek into the future in a world where decentralised identity is adopted and what this would mean for global trade.

How to Eat an Elephant - An Agile Approach Towards an Enterprise IAM Migration Project
Sebastian Goodrick, SUVA • Dr. Jacek Jonczy, Innovation Process Technology AG

Successfully running a centralized Identity and Access Management system in a large enterprise isn’t easy. But how about migrating from a long existing and grown IAM tool into a new consolidated one? In a traditional IT environment? In an agile project? We tackled the challenge and offer an insight into our findings and successful outcome. In particular, we focus on some architectural pitfalls when moving from an existing system to a completely new, consolidated enterprise IAM. Finally...

Suites or Best-of-Breed: The Current State of the Identity Management Market
Martin Kuppinger, KuppingerCole

Aside from entirely new deployments of IAM solutions, we observe a growing number of organizations renovating and modernizing their IAM infrastructures. This leads to a series of questions in such programs and projects. One is if to better go for best-of-breed solutions or a suite. Martin Kuppinger will provide his answers on this questions and the criteria for making the right decision for either best-of-breed, a suite, or a strong primary tools provider together with some best-of-breed...

Privilege Management & Access Governance: Dream Team or Estranged Couple?

Date: Wednesday, May 16, 2018 Time: 15:30-16:30

Privilege Management & Access Governance: Dream Team or Estranged Couple?
Matthias Reinwarth, KuppingerCole

In most organizations, Privilege Management (Privileged Access Management, Privileged Identity Management, etc.) is still considered being a distinct technical discipline within IAM. On the other hand, we observe more and more organizations thinking about how to connect Privilege Management with Access Governance. There are good reasons to do so: Every privileged account must have an accountable manager. And if that manager changes his job, ownership must change as part of the "mover"...

The Anatomy of a Privileged Account Hack
Joseph Carson, Thycotic

It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money. It explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security. Compromising a privileged account, therefore, can be the difference...

Panel: How to Establish Governance and Scalability for a Comprehensive Enterprise IAM Program
Dr. Martin Kuhlmann, Omada • Dr. Angelika Steinacker, IBM Security Europe • Jonathan Sander, STEALTHbits Technologies • Rajesh Ganesan, ManageEngine • Ivaylo Markov, PATECCO

In enterprise IAM, the classical boundaries between different types of users are blurring. IAM teams that have been dealing with office employees and subcontractors for years are realizing that factory personnel, partner companies or consumers need access to on-premises and cloud-based resources. What is the right approach to manage these different user populations? How can we get from silo approaches to structured enterprise IAM? How can scalability and governance be achieved? After a short...

Top 10 Lessons from Disasters in Identity Management

Date: Wednesday, May 16, 2018 Time: 17:30-18:30

Top 10 Lessons from Disasters in Identity Management
David Lundell, Identity Managed

With great automation capability comes great responsibility! Come discuss and learn vital lessons gleaned from disasters in Identity Management. Key Takeaway: Learn the importance of testing, consent and privacy

The Missing Element
Nishant Kaushik, Uniken

When did the acronym PEBKAC become a commonly accepted trope in security? Blaming users for security failures may be a convenient out, but it is also misguided. Identity and access management, at the center of bringing people into the security equation, should be making things better. But all too often we suffer from the same bad habit of thinking technology can solve all problems - if only the users would listen and do as told. But times, and expectations, are changing. Shifting from...

The SoD Modeling Gotcha: Roles Are Like Hammers to Screws
Andrea Rossi, IBM

Why Role-based SoD modeling has proven to be a train wreck in every Identity Governance Project. So what can be done? Why do organizations continue to struggle with entitlement risk modeling? It boils down to risk being aligned to roles and role-based access. The irony is that roles were never intended to be risk models. They were once low-hanging fruit, a logical way to provide an early means of grouping users to entitlements and later associating risk to such groupings.

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2018

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 15 - 18, 2018 Munich, Germany

Partners

The European Identity & Cloud Conference 2018 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00