Identity for the Digital Enterprise II

  •  TYPE: Track    START DATE:  Wednesday, May 15, 2019     START TIME: 14:30  
Parent Track

Moderator(s):

Nowadays, gaining access to almost every type of service requires a cumbersome login and authentication procedures.
On the other side of the 'fence', enterprises are having a hard time managing these processes. The enterprise environment poses additional layers of complications when having to deal with various parties like employees, consumers, and the multitude of devices, which all need to be identified and authenticated. Dealing with these challenges requires a precise and well scalable identity and access management platform. Various new technologies, like blockchain, look promising but the reality is still different. This track will be dedicated to the strategies and implementation ways of identity management for the digital business.

Continuing Professional Education Credits:

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org


After attending this track you will be able to:

  • List common business challenges that are solved by authorization.
  • Learn practical examples of RBAC implementation.
  • Describe what is role modelling.
  • Describe the ways which mobile industry explores to help customers safely transact online.
  • List architectural challenges of PAM integration into enterprise IAM.
  • Describe potential PAM roadmap for an enterprise.

You can get 3 CPEs for this track.

Sessions:

Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases

Date: Wednesday, May 15, 2019 Time: 14:30-15:30

Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases
Eve Maler, ForgeRock • Gerry Gebel, Axiomatics • Patrick Parker, EmpowerID • Gal Helemski, PlainID

Authorization has become a critical component of the Identity & Access Management landscape. Where identity lays the foundation, dynamic authorization helps ensure the right access at the right time to the right resources, ensuring secure collaboration between the IAM teams and the business. With the rapid change in business models and technology trends, it is imperative that authorization services keep pace to meet evolving requirements. This panel of experts should provide a...

Implementation of Role-Based Access Control in a Mid-sized Financial Institution
Dimitri Chichlo, UBP

Managing accesses represents an incredible organizational challenge. The usual way is to grant rights on a case by case basis, complicating the task of security administrators, often by copying rights that similar employees currently have or had in the past. Over time, risk is that employees accumulate undue privileges or that accounts are forgotten and not deactivated, leading to a higher insider risk or account hijacking by external attackers. The risk is even higher with IT employees who...

Why Prevention No Longer Works? A New Approach Using AI for Identity Management
Raghu Dev, BNY Mellon


A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry

Date: Wednesday, May 15, 2019 Time: 15:30-16:30

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry
David Pollington, GSMA

In these tempestuous times, Mobile Operators (MNOs) and the mobile industry are increasingly exploring ways in which they can help customers transact more safely online, and in particular through the provision of: - Authentication services - Identity claims verification (GDPR) - PSD2-compliant authorisation services - Network signals for mitigating fraud - Secure conversational commerce (chatbots) - Identity wallet/agent services This presentation will provide an update on the...

Bring-Your-Own-Identity to the Digital Enterprise
Eleni Richter, EnBW

BYO-Scenarios promise borderless collaboration at low cost for employees, external staff, partners, customers and guests. We will take a brief look at these promises and do some reality-check on limitations and consequences. Key topics: Short check: Usability of Bring-your-own-Identity Compliance and some legal aspects: How much do we need to know? Some limitations given by cloud-providers and license agreements From encapsulated micro-environments to zero-trust-patterns:...

Clustering Methods Used for IAM Role Mining
Thomas Aagren Jensen, PwC

Have you ever thought of a better way to do role modelling? The goal of this presentation is to show how Big Data analysis can be used to obtain a different and effective way of role modelling. Just like in traditional role mining, we take entitlement data from the source applications, but apply tools from the Big Data “world” and use these for analyzing the data. By comparing accounts and entitlements by definition of their similarity, it is possible to make a visual...

Stealing the Crown Jewels

Date: Wednesday, May 15, 2019 Time: 17:30-18:30

Stealing the Crown Jewels
Martin Sandren, Nixu • Jur Huisman, Ahold Delhaize

Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi. This talk looks at the result from penetration testings of PAM systems at major enterprises and...

Panel: Leveraging Privileged Access Management Solutions for Enterprise
Morey J. Haber, BeyondTrust • Didier Cohen, WALLIX • Vibhuti Sinha, Saviynt • David Lieberman, Semperis • Anil Bhandari, ARCON

Compromising privileged accounts can lead to loss of valuable information. Therefore,  Privileged Access Management is becoming a top priority for enterprises.  Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00