Event Recording

Kim Cameron - Identity Services 2020

Show description
Speaker
Kim Cameron
Chief Identity Officer
Convergence.tech
Kim Cameron
Kim Cameron is a Canadian computer scientist and engineering leader who has worked since the emergence of the Internet to create a humanistic system of Digital Identity. Kim moved to Seattle to join Microsoft in 1999 when it acquired Toronto-based Zoomit Corporation, a software company dedicated...
View profile
Playlist
European Identity & Cloud Conference 2015
Event Recording
Hanns Proenen - Digital Risk & the Analog World
May 14, 2015

It seems that the Internet of Everything and the convergence of IT and OT (Operational Technology) are on their way to take control over the analogue part of our world, with digital threats not only affecting our companies and each of us as individuals, but also public life as a whole. How real are those threats and how serious are the risks evolving from them?

Hanns Proenen shows in his keynote, why mitigation and remediation of digital risks evolving from this new threat landscape are requiring new skills from IT security professionals and how these new skills will look like.

Event Recording
John Hermans - "Guiding" the Management and Supervisory Boards to Choose the Right Investment Priorities for Cyber Risk Mitigation
May 14, 2015

Cyber security has been under the spotlight for the past few years. Due to the number and seriousness of cyber incidents, the media’s focus on such incidents and the importance of tackling cyber issues in the extensive digitization of most organisations, this area requires the attention of C-level executives and supervisory boards. John discusses in his talk some lessons learned on how to engage C-level executives and board members to take well-informed, business risk driven decisions on handling the cyber risk.

Event Recording
Louis-Marie Fouchard - Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM
May 15, 2015

Identity and Access Management is one of the core building blocks to address IT/OT challenges. The specific situation of OT solutions and critical infrastructures, however, entails a set of functional and non-functional requirements which cannot be fulfilled by off-the-shelf IAM products available in today’s marketplace. New cost-efficient deployment methods, nearly unlimited scalability and light-weight APIs and protocols must be defined and implemented to shape the IAM architectures and services of the future.

In this keynote we give a short overview of the current technology landscape for IAM, the new requirements and some design principles and promising technologies and standards.

Event Recording
Ravi Bindra - Moving the Security Perimeter: What Needs to be Done Before the Internet Firewalls are Removed?
May 14, 2015

If you announced “we will remove the internet firewalls” different people will hear different things. However, to ensure continued security (confidentiality, availability and integrity) of your information assets you will need to re-prioritise your budget spend, fit out your team with different skill sets, and paugh wholeheartedly at your peers. This presentation discusses all the considerations you may want to take before setting yourself down the path of removing the external barriers, which by itself will lead you to re-define your vision, strategy and roadmap. 

Event Recording
Impressions from the EIC 2015
May 08, 2015

Thank you for attending the EIC 2015. See you next year!

Event Recording
Ian Glazer - Stop Treating your Customers like your Employees
May 15, 2015

Enterprise identity management has been primarily focused on serving the correct access to employees and contractors. But as the industry has been perfecting how to serve employees, consumer identity has presented itself as a growth opportunity for businesses and identity professionals alike. Unfortunately, the industry has tried to apply employee-centric techniques for consumer and citizen identity scenarios. In this talk, Mr. Glazer highlights the difference between employee- and customer-centric identity and proposes techniques that identity professionals need to employ to delight customers.

Event Recording
Martin Kuppinger's EIC 2015 Summary
May 11, 2015

Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, outlines the hottest topics and most important takeaways from the European Identity & Cloud Conference 2015.

Event Recording
Patrick Parker - How to Manage Authorizations in Cloud Services: Getting a Grip on Both Microsoft Azure and Amazon AWS
May 14, 2015

As organizations race to transplant onsite infrastructure and applications to the Cloud, strong yet flexible control over authorization will play a critical role. Each Cloud vendor approaches the challenge of role and attribute-based authorization in a completely different manner and the facilities they offer are undergoing a rapid evolution. This session offers an overview of the authorization capabilities offered by the Microsoft Azure and Amazon AWS platforms and include best practice suggestions.

Event Recording
Mapping the Changes in Data and Identity Risk Landscapes
May 16, 2015

Well-managed organizations address unique and emerging risks, such as networked data and identity-related risks in the context of their overall risk profile, and seek to implement solutions that can cost-effectively address organizational risk at multiple levels. As new online and networked system risks associated with data and identity handling systems have surfaced, pre-existing risks still remain relevant; and together they vie for the attention of managers around the world, causing them many sleepless nights. How are emerging risks similar to and different from traditional risks faced by enterprises? How can traditional risk mitigation strategies inform, or mislead, managers seeking to address emerging risks?

Event Recording
Nick Tuffs - The Good, the Bad and the Ugly of IAM: An Enterprise View
May 15, 2015

Vodafone’s Workforce Identity and Access Management (WIAM) platform treads the line between Security - being a guardian of the Vodafone brand – and a Business Enabler – providing an agile, cost-effective, simple method of allowing 350,000 users to access IS and telecom systems. Based on their recent experiences, successes and failures, Nick provides practical insights to delegates on the programme methodologies, design principles and business decisions, which can help future-proof your enterprise-class IAM solutions.

Event Recording
Bringing it All Together – Distributed Strategy Solutions for Distributed Risk
May 16, 2015

In evaluating distributed systems risk, the attention to data is misdirected. Rather it is the distributed nature of data management systems (and the increase in interaction volume) that increase the perception and actuality of risk. Distributed problems need distributed solutions. Applying the community of interest approach – how can your organization more effectively reduce and manage risk?

Event Recording
Understanding and Dealing with Macro-Level Risks that Affect your Institution’s Risk Profile
May 17, 2015

The concept of "think globally, act locally" has new meaning in the context of business organization risk from IoT, the cloud and other networked information system functions. The local instances of information functions on which businesses increasingly rely are part of data and identity “supply chains” that are hybrids of technology and policy that are themselves increasingly part of vast global networks where individual businesses often perceive a loss of leverage and control and increased risk. In effect, federated and cloud based data and identity functions are enabling these functions to be outsourced, like shipping, payroll, accounting and other company functions that have previously been outsourced to global networks.