Event Recording

John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway

Show description
Speaker
John Worrall
Chief Marketing Officer
CyberArk
John Worrall
John Worrall is the Chief Marketing Officer at CyberArk. He is responsible for the company’s global marketing efforts including product marketing, branding, corporate communications and all lead generation activities including the inbound, channels and field marketing. He brings over...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
May 25, 2016

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint's CTO Darran Rolls presents the anatomy of a typical cyber attack and explains where and how IAM controls should be applied to better enable close-loop cyber protection for enterprise systems. You may not be able to prevent an attack, but you can minimize the damage and your exposure.

Event Recording
European Identity & Cloud Awards 2016
May 12, 2016

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security. Do not miss this glamorous ceremony where KuppingerCole honors the winners of seven categories and one Special Award.

Event Recording
Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience
May 23, 2016

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building blocks of cyber attack resilience through better collection and analysis of very large sets of log and transaction data, real-time analysis of current events and potentially also prediction of future behavior.

Event Recording
Dr. Karsten Kinast - Making Sense of the EU General Data Protection Regulation
May 12, 2016

The cloud is coming to your business, like it or not. With cloud-based systems come inherent challenges. These are further complicated as personal data subject to privacy regulation inevitably moves into the cloud. This combination, putting private information into the cloud, creates risk which must be understood and managed. Is data privacy in the cloud a business issue? We will de-mystify the complexity of cloud-based systems and their inherent risks, enabling appropriate technical and administrative safeguards to be put in place.

Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower
May 23, 2016

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.

Event Recording
André Durand - Navigating a Moment of Change, Disruption & Inflection in Identity & Security
May 11, 2016
Event Recording
Paul Grassi - From Digital Transformation to Perpetual Disruption
May 22, 2016

Transitioning the NSTIC from the 2nd goal to the 4th and how we plan to finish the job, as, US President Barack Obama stated it, NSTIC was really a 10-year effort. In this keynote, Paul Grassi talks about modularization and performance-based standards, future proofing by leveraging a diverse marketplace, transition to the next phase of Connect.gov which will be moving from pilot to production, and landing high-risk, large user volume of transactions.

Event Recording
What’s so special about the EIC?
Oct 29, 2015

What’s so special about the EIC? This is what our attendees say!

Event Recording
Martin Kuppinger - The new role of the CI(S)O 2020: Enable disruptive innovation
May 12, 2016

Don’t only survive the Digital Transformation. Become the Transformational Leader.

There rarely has been so much disruptive change driven by innovations in IT ever before. Distributed Ledgers and Blockchain are at the forefront of these changes and will massively impact the business models of many organizations, well beyond the Finance industry and FinTechs. IoT is becoming a standard element, closely connected to Smart Manufacturing and Industry 4.0. Again, business processes and business models will change massively in the hyper connected world.

Event Recording
How to Make the Blockchain a Reality
May 24, 2016

Blockchain is not yet ready to support industrial use cases. In this panel session we discuss the requirements across industries and how to improve and accelerate the maturity of this shared ledger technology through an open and coordinated approach.

Event Recording
Kim Cameron - The Future of On-Premise AD in the days of Azure AD
May 25, 2016

Azure AD is here. It can act as a domain controller. It helps you managing your partners. It is ready-made for managing your customers. The application proxy builds the bridge back to your on-premise applications. That raises an important question for all organizations running AD on-premises: What is the future role for on-premise AD? What is the right strategy? Who can and should get rid of on-premise AD now or in the near future, who should focus on a hybrid strategy? Where is the overlap?