Event Recording

Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections

Show description
Speaker
Darran Rolls
Research and Advisory Fellow
KuppingerCole / Cloud 10
Darran Rolls
Mr. Darran Rolls is a research and advisory Fellow at KuppingerCole and an independent consulting advisor. He has a long history in Identity Management and Security at companies ranging from Tivoli Systems - IBM, Waveset Technologies, Sun Microsystems and SailPoint...
View profile
Playlist
European Identity & Cloud Conference 2016
Event Recording
The Need to Destroy in the Era of Populous Data and Cloud
May 25, 2016

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the cloud? By end-user we mean the consumer and the cloud administrators.

Event Recording
Sebastien Meunier - Blockchain – a New Compliance Paradigm?
May 24, 2016

One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your customer’ data about individuals or companies, with concrete examples. We will also highlight the difficulties of such approaches and discuss the possible scenarios of evolution in this domain.

Event Recording
Isabel María Gómez González - The Secret Keys for the New Age of the CISO
May 22, 2016

How many times do you change your hat per day? In the new age, the CISOs will change their roles as much as they can for making decisions about how to affront new risks. Compliance, Governance, legislation, data protection, cybersecurity, intelligence, cyberdefense, cyberfusion…. how can we deal with them?

Event Recording
Paul Grassi - From Digital Transformation to Perpetual Disruption
May 22, 2016

Transitioning the NSTIC from the 2nd goal to the 4th and how we plan to finish the job, as, US President Barack Obama stated it, NSTIC was really a 10-year effort. In this keynote, Paul Grassi talks about modularization and performance-based standards, future proofing by leveraging a diverse marketplace, transition to the next phase of Connect.gov which will be moving from pilot to production, and landing high-risk, large user volume of transactions.

Event Recording
Henning Christiansen - Driving Digital Expansion at Axel Springer while improving Cybersecurity through Identity & Access Management
May 22, 2016

Axel Springer becoming a truly digital publisher and further investing in digital expansion. Meaning and selling of Identity and Access Management in a media company like Axel Springer. A way to bundle forces and gain buy-in from related parties and sponsors. Increasing importance of Identity and Access Management to manage cloud services.

Event Recording
Sebastien Meunier - From Exploration to Implementation – Preparing for the Next Steps of Blockchain
May 22, 2016

Blockchain technology is certainly at the peak of the hype cycle. In this keynote, Sebastien will give you the keys to understand the reality of blockchain beyond the myths and anticipate the next steps.

Event Recording
PATECCO's Thoughts on IAM in Relation to B2B and B2C
May 11, 2016

Tune in to PATECCOs interview with Martin Kuppinger in regards to managing Customer and Partner Identities in a hybrid world.

Listen to some Do’s and Don’ts out of previous projects.

Event Recording
Jackson Shaw - The Internet of Things One Year Later
May 23, 2016

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In this session Jackson will highlight how the IoT landscape has changed from a risk & security perspective for both consumers and enterprises, how it is driving digital transformation and why it is even more important for you to be planning your IoT strategy now.

Event Recording
Ivan Niccolai - Blockchain, Identity, Cybersecurity
May 24, 2016

How is trust established without trusted third parties? Although it is not possible to offer a prediction of how distributed ledger technology with change society, the assertion that new and publically-accessible technology such as the internet, file sharing and social networks would empower individuals and lead to a more transparent and equitable society has been made before. While the advent of the internet has led to unparalleled global communication capabilities, it has also allowed for a situation of total, mass surveillance. The blockchain offers a trustless information security model, replacing human judgement with proof-of-work algorithms and perimeter security with total transparency.

Event Recording
Kim Cameron - The Cloud is Rewiring the World: What Does it Mean for Identity?
May 23, 2016

The Cloud is turning out to have important “emergent properties” – features not previously observed in computing systems, never imagined by cloud architects, and not yet widely discussed or understood.  They will be key to determining which strategies prevail in meeting cloud era challenges. Kim Cameron discusses how this impacts the world of identity – leading to better applications and simpler identity solutions for people and things.

Event Recording
Martin Kuppinger's EIC 2016 summary
May 18, 2016

KuppingerCole's Founder and Principal Analyst Martin Kuppinger provides his summary of this year's European Identity & Cloud Conference.

Event Recording
Dr. Jutta Steiner - Blockchains Beyond the Hype
May 24, 2016

For the last few months, every day there has been a new announcement of a major corporate (successfully ?) trialing blockchain technology in a Proof-of-Concept. For anyone outside of the blockchain space and hype, it has become difficult to discern the signal from the noise. We give a brief introduction into the true technical innovation of these open multi-user platforms and present several use cases where businesses can benefit: From IT security to data privacy to IoT.