Event Recording

Dr. Jutta Steiner - Blockchains Beyond the Hype

Show description
Speaker
Dr. Jutta Steiner
COO
Ethcore Ltd.
Dr. Jutta Steiner
Dr. Jutta Steiner is a founder and COO of Ethcore Ltd – a London based start-up that is spearheading the development of free-trust technology. She oversaw the IT security audit for the Ethereum foundation (CH) before the launch of the public blockchain. She is also a co-founder of...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
Christian Loeffler - From Shadow IT to an IDaaS Solution
May 22, 2016

In this keynote session, Christian Loeffler talks about: project conduction, architecture definition, IDaaS election and implementation,key challenges for business and IT, lessons learned.

Event Recording
Isabel María Gómez González - The Secret Keys for the New Age of the CISO
May 22, 2016

How many times do you change your hat per day? In the new age, the CISOs will change their roles as much as they can for making decisions about how to affront new risks. Compliance, Governance, legislation, data protection, cybersecurity, intelligence, cyberdefense, cyberfusion…. how can we deal with them?

Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
May 25, 2016

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry and the goal of ensuring its competitiveness in a highly dynamic global market. The IIC is more focused on enabling and accelerating the adoption of Internet-connected technologies across industries, both manufacturing and non-manufacturing. That’s why it’s important to understand the differences between Industry 4.0 and the "Industrial Internet of Things" and where our mindset and approaches best fit.

Event Recording
Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience
May 23, 2016

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building blocks of cyber attack resilience through better collection and analysis of very large sets of log and transaction data, real-time analysis of current events and potentially also prediction of future behavior.

Event Recording
Kim Cameron - The Future of On-Premise AD in the days of Azure AD
May 25, 2016

Azure AD is here. It can act as a domain controller. It helps you managing your partners. It is ready-made for managing your customers. The application proxy builds the bridge back to your on-premise applications. That raises an important question for all organizations running AD on-premises: What is the future role for on-premise AD? What is the right strategy? Who can and should get rid of on-premise AD now or in the near future, who should focus on a hybrid strategy? Where is the overlap?

Event Recording
Dr. Sridhar Muppidi - Security Starts with Identity and Access
May 11, 2016

People are the weak link in security. Most data breaches start with bad actors using stolen user credentials and this is fundamentally an identity problem. For too long Identity & Access Management has been viewed as silo often walled off from the security group but this must change. Now, more than ever Identity & Access Management must be viewed as a key security control that can help minimize and mitigate security intrusions.

Event Recording
Sebastien Meunier - Blockchain – a New Compliance Paradigm?
May 24, 2016

One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Event Recording
André Durand - Navigating a Moment of Change, Disruption & Inflection in Identity & Security
May 11, 2016
Event Recording
Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower
May 23, 2016

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.

Event Recording
PATECCO's Thoughts on IAM in Relation to B2B and B2C
May 11, 2016

Tune in to PATECCOs interview with Martin Kuppinger in regards to managing Customer and Partner Identities in a hybrid world.

Listen to some Do’s and Don’ts out of previous projects.

Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
What’s so special about the EIC?
Oct 29, 2015

What’s so special about the EIC? This is what our attendees say!