Secure Identity II

  •  TYPE: Track    START DATE: Wednesday, May 15, 2019     START TIME: 14:30  
Parent Track


With the growing number and new vectors of cyber attacks, identity and access management is taking a center stage and is becoming a new defence outline. Furthermore, increased number of connected devices and employee mobility are making the job of cybersecurity professionals more difficult. In this context, only perimeter-based safeguarding measures are no longer meeting the security needs and implementation of adequate IAM and cybersecurity tools is necessary. Identity-based technologies like User Behavior Analytics can help in identifying anomalous behavior and detect internal and external threats. By utilizing a combination of already existing IAM, authentication and other technologies, Zero Trust security approach is also gaining popularity.

This session will highlight the new cybersecurity challenges and the role which identity management plays in solving them.

Continuing Professional Education Credits:

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website:

After attending this track you will be able to:

  • Understand current cybersecurity challenges.
  • Describe the role of Trust in business interactions.
  • Understand NIST SP-800-63-3 guidelines and list main points of it.
  • Understand the ways to limit malware's ability to infiltrate a network and exfiltrate data.
  • Discuss the cyber risks facing financial institutions.
  • Understand and describe the term of cloud governance and the need.
  • Learn how to effectively utilize user behavioral analytics to reduce cyber risk.

You can get 3 CPEs for this track.


Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition

Date: Wednesday, May 15, 2019 Time: 14:30-15:30

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition
Dr. Ahmad Atamli, Mellanox Technologies

The complexity and sophistication of modern malware are evolving rapidly. Malwares today are able to exploit both hardware and software to infiltrate systems and tamper with data used for management. The revelation of several attacks on host machines, highlights that anything with shared resources can be attacked.  In cloud environment, data management is done by a centralised server that maintains the state of each platform. However, this is not...

Navigating NIST Sp-800-63-3 Thanks to Practical xAL Cheat Sheets
Jean-François Lombardo, EXFO

Trust. Trust is the most fundamental notion in every one of our business interactions, whatever our needs are: low or high assurance. Do you know that, by June 2019, NIST SP-800-63-3 will celebrate its second birthday? It is a framework that improved lots of points over the previous LoA scale and gained a lot of maturity thanks to implementers, researchers, and confrontations to other Trust frameworks. Still you may find it hard to find your way wherever you try to be a compliant IAL2...

Fight Cyber Risks with Risk Aware DevOps Engineers!
Jan-Joost Bouwman, ING • Leon Janson, ING

To keep a customer’s trust risk and security is key for Financial Enterprises like ING. At the same time we want to work Agile in an BizDevOps format, because we know it gives us the increased velocity and quality of software we need. And this way of working leads to happier and therefore more productive employees. A separate security team that has to check all software before it goes into production would be a huge bottleneck, especially if you have...

The Anatomy of an IAM Cyber Kill Chain

Date: Wednesday, May 15, 2019 Time: 15:30-16:30

The Anatomy of an IAM Cyber Kill Chain
David Lee, Sailpoint

In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to...

The POWER HACKER – Don’t Let the Lights Go Out – A Look Inside the MIND of a Hacker
Joseph Carson, Delinea

Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes. This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to...

At the Intersection of API Security, Cybersecurity and IAM: the Next Wave of Intelligent Solutions
Loren Russon, Ping Identity

Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of...

Common Sense in the World of Cloud Governance and Security

Date: Wednesday, May 15, 2019 Time: 17:30-18:30

Common Sense in the World of Cloud Governance and Security
Tom Janetscheck, Microsoft

Planning for security and governance is essential for building robust cloud environments! Join Microsoft Azure MVP Thomas Janetscheck for this session to learn about how to secure Azure environments and how to circle around snares. We will first focus on cloud governance, what it is and why you need it and then dive deep into Azure Security Center, an AI and ML-based solution for securing IT infrastructures in the cloud and on premises. After this session you will have a good understanding...

Panel: How Cloud Access Control Enables Innovation & Security In the Digital Age
Nelson Cicchitto, Avatier • Paul Heaney, ProofID Ltd • Dr. Ina Nikolova, PATECCO • Tom Janetscheck, Microsoft

The transformation of the digital business world requires moving forward to new technologies and shifting the focus to agile and flexible environments. As the number of digital identities rises, the need to protect and manage how personal information is collected, used and distributed is higher than ever. Security technologies such as IoT, cloud access control, user behaviour analytics, multifactor authentication, and mobile threat defence are on the rise. Obtaining the cloud is not only...

Munich, Germany


European Identity & Cloud Conference 2019

Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2019 Munich, Germany