Event Recording

Henning Christiansen - Driving Digital Expansion at Axel Springer while improving Cybersecurity through Identity & Access Management

Show description
Speaker
Henning Christiansen
CISO
Axel Springer SE
Henning Christiansen
Henning Christiansen has more than 15 years of experience in Information Security and IT Risk Management. He is Chief Information Security Officer for Axel Springer SE (AS SE) since August 2012. Before his current assignment, he held a similar position at Bombardier Transportation (BT) for...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Jackson Shaw - The Internet of Things One Year Later
May 23, 2016

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In this session Jackson will highlight how the IoT landscape has changed from a risk & security perspective for both consumers and enterprises, how it is driving digital transformation and why it is even more important for you to be planning your IoT strategy now.

Event Recording
Impressions of the European Identity & Cloud Conference 2016
May 12, 2016

Thank you for attending the European Identity & Cloud Conference 2016. See you next year!

Event Recording
Lessons learnt from the Ukraine's ‘Lights Out’ Attack
May 11, 2016

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change.

Michael Kleist of CyberArk explains more.

Event Recording
Dimitra Kamarinou - From Suppliers to Consumers: Issues of Liability in Industry 4.0
May 25, 2016

This session looks at the responsibilities and liabilities of organisations involved in the ‘smart manufacturing’ process both internally (e.g. towards employees) and externally (e.g. other organisations, suppliers, consumers, the environment) and at the difficulties of attributing liability in a complex web of stakeholders that might include cloud service providers. We also discuss the importance of contractual and non-contractual liability as well as statutory and common law liability, including fault-based and strict liability. This session also looks at why these legal questions are important and at potential ways to clarify issues of attribution of liability in Industry 4.0.

Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
May 25, 2016

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both manufacturing and non-manufacturing. That’s why it’s important to understand the differences between Industry 4.0 and the "Industrial Internet of Things" and where our mindset and approaches best fit.

Event Recording
What’s so special about the EIC?
Oct 29, 2015

What’s so special about the EIC? This is what our attendees say!

Event Recording
Sebastien Meunier - Blockchain – a New Compliance Paradigm?
May 24, 2016

One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Event Recording
John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway
May 22, 2016

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Event Recording
Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
May 25, 2016

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls presents the anatomy of a typical cyber attack and explains where and how IAM controls should be applied to better enable close-loop cyber protection for enterprise systems. You may not be able to prevent an attack, but you can minimize the damage and your exposure.

Event Recording
Isabel María Gómez González - The Secret Keys for the New Age of the CISO
May 22, 2016

How many times do you change your hat per day? In the new age, the CISOs will change their roles as much as they can for making decisions about how to affront new risks. Compliance, Governance, legislation, data protection, cybersecurity, intelligence, cyberdefense, cyberfusion…. how can we deal with them?

Event Recording
Dr. Jutta Steiner - Blockchains Beyond the Hype
May 24, 2016

For the last few months, every day there has been a new announcement of a major corporate (successfully ?) trialing blockchain technology in a Proof-of-Concept. For anyone outside of the blockchain space and hype, it has become difficult to discern the signal from the noise. We give a brief introduction into the true technical innovation of these open multi-user platforms and present several use cases where businesses can benefit: From IT security to data privacy to IoT.

Event Recording
Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity
May 24, 2016

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things, identity and the need for privacy "collide". Has blockchain been the missing link to put the "platform" thought away from "Life Management Platforms" to make it a universally available privacy by design representation of humans in a digital world?