Event Recording

Sebastien Meunier - Blockchain – a New Compliance Paradigm?

Show description
Speaker
Sebastien Meunier
Management Consultant
Chappuis Halder & Co.
Sebastien Meunier
Sebastien Meunier is a management consultant at the consulting firm Chappuis Halder & Co. (CH&Co) with more than 12 years of experience in leading business transformations at the intersection of Technology and Financial Services. He studied at Ecole Polytechnique (France) where he got...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Ian Glazer - The Moments Ahead for Identity
May 11, 2016

Remember when we used to pay for a TCP/IP stack? It’s hard to believe that companies used to pay for networking stacks, but we did. And once network stacks became free, the networking profession didn’t die out… instead it flourished. Today, the identity industry is going through a similar transformation, one which will present a series of moments upon which we must capitalize.

Event Recording
Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience
May 23, 2016

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building blocks of cyber attack resilience through better collection and analysis of very large sets of log and transaction data, real-time analysis of current events and potentially also prediction of future behavior.

Event Recording
Lessons learnt from the Ukraine's ‘Lights Out’ Attack
May 11, 2016

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change.

Michael Kleist of CyberArk explains more.

Event Recording
European Identity & Cloud Awards 2016
May 12, 2016

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security. Do not miss this glamorous ceremony where KuppingerCole honors the winners of seven categories and one Special Award.

Event Recording
Martin Kuppinger - The new role of the CI(S)O 2020: Enable disruptive innovation
May 12, 2016

Don’t only survive the Digital Transformation. Become the Transformational Leader.

There rarely has been so much disruptive change driven by innovations in IT ever before. Distributed Ledgers and Blockchain are at the forefront of these changes and will massively impact the business models of many organizations, well beyond the Finance industry and FinTechs. IoT is becoming a standard element, closely connected to Smart Manufacturing and Industry 4.0. Again, business processes and business models will change massively in the hyper connected world.

Event Recording
Dr. Emilio Mordini - In a Wilderness of Mirrors: Do we still need Trust in the Online World?
May 11, 2016

Trust always involves some level of vulnerability on the actions of another. When we trust others, we are relying on them and consequently we are making ourselves more vulnerable. A bit naively, some scholars argue that trust decisions are based on a cost/benefit analysis, which is maybe theoretically true but it rarely happens in real life. In reality, many other elements play an important role, and they are critical in the case of the blockchain.  "In a wilderness of mirrors. What will the spider do?" (Gerontion, T.S. Eliot 1920)

Event Recording
Paul Grassi - From Digital Transformation to Perpetual Disruption
May 22, 2016

Transitioning the NSTIC from the 2nd goal to the 4th and how we plan to finish the job, as, US President Barack Obama stated it, NSTIC was really a 10-year effort. In this keynote, Paul Grassi talks about modularization and performance-based standards, future proofing by leveraging a diverse marketplace, transition to the next phase of Connect.gov which will be moving from pilot to production, and landing high-risk, large user volume of transactions.

Event Recording
How to Make the Blockchain a Reality
May 24, 2016

Blockchain is not yet ready to support industrial use cases. In this panel session we discuss the requirements across industries and how to improve and accelerate the maturity of this shared ledger technology through an open and coordinated approach.

Event Recording
Dr. Jutta Steiner - Blockchains Beyond the Hype
May 24, 2016

For the last few months, every day there has been a new announcement of a major corporate (successfully ?) trialing blockchain technology in a Proof-of-Concept. For anyone outside of the blockchain space and hype, it has become difficult to discern the signal from the noise. We give a brief introduction into the true technical innovation of these open multi-user platforms and present several use cases where businesses can benefit: From IT security to data privacy to IoT.

Event Recording
Jackson Shaw - The Internet of Things One Year Later
May 23, 2016

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In this session Jackson will highlight how the IoT landscape has changed from a risk & security perspective for both consumers and enterprises, how it is driving digital transformation and why it is even more important for you to be planning your IoT strategy now.

Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
Thom Langford - Making Security the Competitive Advantage for your Enterprise
May 11, 2016

Security is as Security does. It is it’s own benefit and it’s own justification. We need to use shock and awe tactics to get the business to do what we want to ensure the security of the business.
Right?

NO! We are not the special flower of the business, we are just one part of it, working in harmony with the others. We help the business do more, better, and for less just like everyone else. So if we can’t shock and awe, and if we no longer have special privileges, how can we be more effective?