Event Recording

Do We Need to Put Secrecy Back in to Security?

Show description
Speakers
John Bradley Senior Architect
Yubico
John Bradley
Mr. Bradley is an Identity Management subject matter expert and IT professional with a diverse background. Mr. Bradley has over 15 years experience in the information technology and identity management field. Mr. Bradley advises Government Agencies and commercial organizations on the policy and...
View profile
Steven Hope CEO
Winfrasoft
Steven Hope
IT security expert and respected speaker, Steven is a pioneer in the development, implementation and adoption of authentication software. He has led the development of SC Awards Europe winning, PINgrid, introducing a new generation of two factor authentication solutions that transform mobile...
View profile
Anthony Nadalin Chief Security Architect
Microsoft
Anthony Nadalin
Anthony Nadalin is a partner architect in the Government Engagement Team leading the Standards and Public Policy practice. Anthony had spent the last 27 years with IBM where he was the Chief Security Architect responsible for the security strategy for software group products. Anthony...
View profile
Mike Neuenschwander CEO
iC Consult Americas
Mike Neuenschwander
I've worked in the digital identity space for 17 years, and I was involved in creating some of the early products in the market. At iC Consult, I direct a team of seasoned professionals to work on cutting-edge projects related to digital identity. At Oracle, I was responsible for strategic...
View profile
Bart Renard Business Development Director
VASCO Data Security
Bart Renard
Bart has worked for VASCO since 1998 and has served in different roles within the company. He started by building the Customer Services department and was responsible for all pre- and post-sales activities at VASCO. After that he switched to a sales position heading the company’s...
View profile
Playlist
European Identity & Cloud Conference 2014
Event Recording
Kim Cameron - Applied Information Stewardship: Protect your Jewelry
Event Recording
How Strong could Privacy in Internet Communication be - and where are the Legal Barriers?
Event Recording
Stefan Van Gansbeke - Governance and Awareness
Event Recording
How to Enable Social and Mobile Login - and Beyond
Event Recording
Mike Neuenschwander - Why the Future of IDM Still Needs Us
Event Recording
The Next Generation of Privacy Tools: What can we expect?
Event Recording
Dirk Venzke - Mastering the IAG Challenge
Event Recording
Roman Chaplygin - Developing a Strategy for Business-Aligned Information Security
Event Recording
Dr. Barbara Mandl - Endconsumerization Requires Agile Risk Management
Event Recording
Impressions from the European Identity & Cloud Conference 2014