Expert Stage II
- TYPE: Track START DATE: Wednesday, May 15, 2019 START TIME: 14:30
Date: Wednesday, May 15, 2019 Time: 14:30-15:30
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Morey J. Haber, BeyondTrust
Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage. Based on strategies developed...
Privileged Access Management: Operational Burden or Enabler for Protection Against Targeted Attacks?
Dr. Svilen Ivanov, T-Systems International GmbH, Telekom Security Division
Securing the use of privileged accounts, i. e. service accounts, accounts used for administration and accounts having the ability to access critical data and perform unauthorized changes, is one of the basic security measures. However, the practice shows that the implementation of privileged access security is a challenge for many organizations and opens critical cyber security vulnerabilities. Within this presentation, the speaker will build a bridge between privileged access management and...
Get the Most out of PAM: How to Make Privileged Access Management Meaningful and Effective
Rajesh Ganesan, ManageEngine, a division of Zoho Corp
Date: Wednesday, May 15, 2019 Time: 15:30-16:30
Schroedinger View on Identity: It is Consolidated and is not Consolidated
Dirk Wahlefeld, COGNITUM Software
Digital Hybriditity, or: Greetings from the Outer Rim
Thorsten Niebuhr, WedaCon
Why Identity Management is Broken and What Can Be Done to Fix It
Nelson Cicchitto, Avatier
Ever tried to deploy a legacy, on-premise ID management solution? They are hard to deploy and even harder to upgrade and maintain. Cloud-based solutions are no picnic either. In addition to their lack of security and shared resources like memory and data, costs for licensing and maintenance can make cloud-based solutions cumbersome and a resource drain. If you could remove the resource strain, improve security, integrate back-office systems while saving costs, wouldn't it make sense to at...
Date: Wednesday, May 15, 2019 Time: 17:30-18:30
Increase the Odds - How to Make your IoT Project a Business Success
Gerhard Zehethofer, ForgeRock
The Internet of Things - managed or unmanaged devices - plays a significant role across all industries and has the potential to disrupt entire businesses. Even though many IoT projects are being implemented as we speak, many businesses are too late to the game. One of the main challenges during the project planning phase is the value quantification. The business value increases with the degree of process digitization. Digital Identity solutions, and IoT combined, help to make Information...
Data-Driven Compliance with Privacy Laws
Jens Kettler, BigID
Privacy laws such as GDPR require organizations to know whose data they have, where it is stored, and how they use it. They also have to match consent or agreements for use of the data, and the actual use of their customers’ data. In this presentation, we will show how privacy compliance can be based on data analytics, and how to automate that, so that continuous compliance can be achieved. Key takeaways: - How to build a map of personal data in the enterprise - Use the...
IDAM Controls to Detect and Prevent insider Fraudulent Access
Bala Bhaskar Gurram, Wipro Limited
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 14 - 17, 2019 Munich, Germany