Event Recording

Andre Priebe - CIAM & API Management

Show description
Speaker
Andre Priebe
Chief Technology Officer
iC Consult Group GmbH
Andre Priebe
Andre Priebe is Chief Technology Officer of the iC Consult Group, a vendor-independent system integrator specialized in Identity & Access Management with more than 500 employees around the globe. With over 15 years of experience in managing IAM projects focussing on workforce, customer, and...
View profile
Playlist
Cybersecurity Leadership Summit 2018 Europe
Event Recording
Paul Simmonds - From Network Protection to Data Security
Dec 18, 2018

"Zero Trust" is the latest security buzzword from the vendors marketing department; but what it actually means for you means should vary depending on your business requirements.

Properly aligning security architecture to enable the business strategy of the organisation is the key to deliver a Zero Trust architecture. But the solution could be anything from implementing identity-aware firewalls to the extremes of "BeyondCorp"; Google's firewall-less global network when the security posture is identical whether you are in Starbucks or on the Google campus.

Event Recording
Marko Vogel - Cyber Security as Part of Industry 4.0
Dec 18, 2018

 - More aggressive, complex and well organized: Cyber threat landscape on the rise

- Cyber Security – added value for industry 4.0?

- Industry 4.0 needs company-specific security strategies

Event Recording
Peter Dornheim - Build Up a Security Operation Center and Provide Added-Value to Business Operations
Dec 18, 2018

Make or buy? Budget annihilator or business driver? Only 2 questions which must be answered when building up a Security Operation Center. How to address these questions and how to start a project to establish a Security Operation Center in a traditional German manufacturing company is content of this session.

- Start small, think big: Understand how to start a SOC project and deliver an added-value fast - Think big: Identify a SOC target vision which maps to your individual company situation - Be prepared: Learn about typical challenges during the SOC ramp-up process

Event Recording
Dr. Andre Kudra - Dezentrale Digitale IDs und die Vorzüge der Blockchain Technologie
Dec 04, 2018

Um den Dschungel von Authentifizierungsverfahren und digitalen Identitäten zu bändigen, werden oftmals Single Sign-on (SSO) Strukturen geschaffen. Dadurch wird es Nutzern ermöglicht viele Logins mit nur einer digitalen Identität zu verwalten und Authentifizierungsverfahren je nach  Bedarf  einer Applikation anzupassen. SSO-Applikationen haben jedoch einen entscheidenden Nachteil: Sie setzen ein Vertrauen in nur eine Instanz, z. B. den Entwickler der Applikationen, oder mehrere Instanzen voraus. Was wäre, wenn wir für jeden Onlinedienst oder berufliche Anwendungen nur einen einzigen Account bräuchten, der zudem noch ohne zentrale kontrollierende Instanz auskommt und ein hohes Maß an Sicherheit bietet?  Blockchains erlauben mit inhärenter Sicherheit und Kryptographie die Entwicklung völlig neuartiger Identitätsstandards, die durch andere Lösungen wohl nur schwer zu realisieren sind. In diesem Vortag werden die Vorzüge der Blockchain Technologie dargestellt.

Event Recording
Gal Helemski - How a Policy Based Approach Dramatically Improved Access Control and Authorization
Dec 18, 2018

Hear how a leading multinational Financial institution was able to evolve from Role Based Access Control (RBAC) to the new paradigm, Policy Based Access Control (PBAC), and learn what challenges this solved, and the ROI they were able to see from using PBAC.

Event Recording
Martin Zeitler - Your Move to “the Cloud” Secured
Dec 18, 2018

There is a tremendous amount of business value that you can get from “the cloud”. But, there are a lot of challenges in adopting these services securely. The real question is how we can approach “the cloud” from a security perspective in order to really get that full benefit of the offerings.

Event Recording
Dragan Pendic - Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Dec 18, 2018

Businesses are more data-driven than ever, but inaccurate and manipulated information threatens to compromise the insights that companies rely on to plan, operate, and grow. Unverified digital resource is a new type of vulnerability - one that is 

chronically overlooked by digital enterprises. With autonomous, data-driven decision making, the potential harm from unverified digital resources become an enterprise-level existential threat. And then, there's a wider cybersecurity aspect and how to address the following:

- Data provenance verification - the history of data from its origin throughout its lifecycle (cradle to grave)

- Data Integrity verification - continually maintain good health  and predictable state of data

- Data context usage - keep an eye on behaviour and context around data's use

Event Recording
Tim Hobbs - DevOps & Service Layers
Dec 18, 2018

IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can be adjusted at the same pace. Modern data centers are configuration-driven, resilient environments designed to meet rapidly changing application needs, and modern IAM solutions must be in line with this paradigm.

Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's micro-service-enabled, service-mesh-oriented infrastructure expects simple, resilient, self-discovery services instead of brittle monoliths that rely on manual configuration.

Operating IAM products with a DevOps setting in terms of automation, repeatability, and continuous improvement is possible through close collaboration between IAM, application, and infrastructure experts.

Event Recording
Dimitri Chichlo - What is the Role of a CISO in 2020?
Dec 18, 2018

In the past years, a CISO would mainly be chosen among the IT staff who expressed his interest for information security or by arbitrarily promoting someone from the inside to please the auditors with filling a headcount gap. Tasks and skills were mainly technical, focusing on patching, administering firewalls and installing antiviruses. With the years though, companies have made their IT systems the backbone of their businesses. Similarly, criminality has shifted to exploit online systems. Combination of both realities now requires that CISOs possess and demonstrate core competencies that allow them transforming the essence of their job from infrastructure protector to business enabler. In this keynote, we will explore how and why CISOs should now focus on value creation instead of value protection, getting from a defensive to a proactive approach.

Event Recording
Matthias Reinwarth - CIAM as a Building Block of an Online-Success Story
Dec 18, 2018

Consumer Identity and Access Management (CIAM) encompasses many aspects. On the one hand, it is about optimizing the usability of services through technologies and practices to make it easier and secure for users sign up for a service. For the service providers, CIAM is all about lifecycle management of identities of many kinds - ensuring that accounts are set up, changed, and deactivated (or deleted) in a timely, accurate and secure manner. And for even more people, it focuses on security and compliance through technologies and practices that facilitate auditing and governance activities, such as recertification, easily and comprehensively.

Choosing and using the right components and services are critical to a successful CIAM deployment.

Event Recording
Klaus Hild - Predictive Governance – Leveraging the Power of Identity Analytics
Dec 18, 2018

In this presentation, SailPoint will explain why Identity Analytics will change the way companies will think about CyberSecurity, by adapting ‘Predictive Governance’.

Predictive Governance will enable organizations to be more effective and efficient at governing access without increasing the risk.

Event Recording
Maximilian Möhring - Die Zukunft Digitaler ID ist Dezentral – Aber Nicht Blockchain
Dec 04, 2018

Die Identitätslandschaft ist voll von IAM-Systemen, Identifikations- und Authentifizierungsanbietern, verschiedenen Technologiestandards und wird durch nationale sowie branchenspezifische Normen geregelt.

Die Lösung für dieses Problem ist die Interoperabilität der Lösungen indem der Markt vereint wird und die Integration bestehender Identitätsanbieter vereinfacht wird. Obwohl Blockchain neue ID-Lösungen liefern kann, löst sie nicht die Kernproblematik des Identitätsmarktes. Revolution wird durch die Evolution des bestehenden Marktes erreicht, nicht durch einen Big Bang.