Good evening. Can you
Just shortly introduce yourself, Jenny
Please. Yes, of course. My name is Jennifer has I'm the communications manager at KuppingerCole. I'm responsible for PR social media and I'm supporting the event team in case of agenda and connecting to speakers,
Rob, and good evening to you. I have to look at my notes to say who I am. So my name is Rob McCabe and I'm a product director here at the cupping. Nicole, my role is developing or helping to develop global events, new innovation, new ideas for cupping Nicole events. I work with an awesome team of events, people, as you can imagine, from what we've seen over the past couple of days and together, we're introducing some really good innovations for the future for the future. So it's exciting times for us.
So what is yours?
I was thinking just before we have the award ceremony and I'm sorry to interrupt this. I was thinking quite deeply today. I was in all of the, the executives we've got here, the level of executives I was in all of the topics, such interest in the great talking points that we've all had at the summit. And I was thinking, what can Rob bring to the event? What can I bring to the conference? Cuz we're all sharing. We're all learning. And I've had the fortunate time over the past few years, I've probably organized it and attended about 30 of these similar to these every year traveled the globe. And often when I'm in another country or another city people have said to me, here's some good facts about our town or our city or our country. And I go, oh, okay. That's that's really good. So what I can bring tonight is a couple of, couple of fun facts about Munich as we are in a learning situation. So that's how we got to this three fun facts about Munich. Number one, as you can see the Bavaria statue, it's 18.5 meters tall, it weighs 87 tons and it has a bra size of treble Z.
So that's interesting, isn't it? It
Is. Do you get breath for that?
Somebody has to make it I'm sure, but, but there we are. That's fine. So number two Olympic games were here. The major streets of the, the old town were pedestrianized back in 1972 and they've stayed the same ever since. So here's just an example. What's good. Isn't it keep tradition and
Yeah, looks great.
Third and final point. And you'll like this in central Munich, there is an English garden and I, I thought while I'd be in English, I thought I would, I would explore this English garden. So this is a double attraction.
Attraction? Number one, there are beer tents. So refreshments, nice summer day, lots of drinking of beer, second attraction. And the one that interested me the most, there is a new dissection in the summertime and this is for office workers. So office workers in this part of the, of the English garden can sun bath naked. Can you imagine this afternoon, my Google naked naked sunbathing in Munich images. Can you imagine that looked
That? Yes. This one had, I had to censor this. So my advice to you is don't do that. I almost went blind, check out the dog's face. The dog's face is clearly embarrassed, thereby what it says. So the dog's face says everything. So there we are. We are learning some information about Munich over to Jennifer.
Thank you well for that insights now. So now we come over through the water ceremony. It gives us both a great pleasure to host this important part of the conference. Over the past 10 years, we have developed the awards into what we have today. Rewarding, outstanding contributions and innovations in the industry.
We certainly have, there's been some incredible work done over the past 12 months, but here to share some of the finer details of the awards is Mr. Martin Berger. Martin is chair of the awards jury and is very much key to the success. So welcome Martin.
So like Rob said, you are the head of the jury. Maybe you can talk a bit about the criteria for the awards. How do winner get the price?
So to get it here? Yeah.
Okay. But what,
Why, how do we choose the winners? Yeah, we, this year we received, I think a record breaking number of nominations, which makes me proud. And so we go through them, we look at them and basically there are couple of criteria. It needs to be something. So it helps if it's something we have never seen before. And if it's not only something we haven't seen before, but if something groundbreaking innovative or something which has been done at an exceptional scale and speed. So in a way where a lot of the, sort of the common problems have been avoided, then it's what we are in fact looking for. So these projects where we, which we see a really big number of projects where we say, okay, that's really cool. That's something we didn't see multiple times. It's always difficult to, to make this decision because sometimes to say, okay, that's pretty much a head to head competition, but that's our tr then to decide on that. And that's what we did this year again.
Great. Lovely. Thank you very much for that insight, Martin. Thank you very much.
So now we come through the first category, which at the award for the best approach on improving governance and mitigating risks
And to share this detail, we'd like to introduce KA Cole, senior Analyst, Mr. Dan Dan's come all the way from the us. So please put your hands together for Mr. Dan, please.
Hi, Dan. Welcome. H
Dan, can you say some words about your role at ER, call Soly? Well,
I am a senior Analyst and I write reports come to events like this. And, and when I'm in Munich, I sometimes drink beer at the event
Really? So then cheers. The,
So it will be my pleasure to describe a highly successful project in governance and risk mitigation or identity access governance. The business drivers for this project were to improve operational effectiveness and things like access reviews, and also to improve regulatory compliance. It was a global environment that the project went into. It included four active directory domains over 2,500 identities it and five initial apps just at the start, the deployment, although IEG deployments can be difficult. This one was described as occurring over an 18 day period, which is perhaps some kind of record the success to that was attributed to the fact that it was based on a cloud-based form factor. It was using the Ida solution, the I IA governance and life cycle management service SA based service. Some of the benefits that came out of this project were shorter access review times also reductions in the manual administration times and flexibility eventually to expand the scope of the project so that it grew to cover 69 applications and also to handle over 40 roles and thousands of groups and accounts. So with all that said the winner for the best approach on improving governance and mitigating risk is Mitubishi U F J securities.
Unfortunately, the winner is unable to attend in person. And so they have sent over a short video statement.
MD securities is honored to be nominated with RSA for the category best IAM project, 2017 at the Al conference in Munich,
We regret that we can't be there in person to accept the award we're actively working with RSA on the next phase of our multi-year IAM strategy. We thank, we'd like to thank RSA for the continued support and we look forward to seeing you in person's conference.
Thank you Dan, for that. Thank
So now the second award is for the best consumer identity project
And to give us some details on this, we'd like to introduce KA Cole lead Analyst, Mr. John Tolbert. John has also come from the us to be with us at this conference. Please. Welcome. Put your hands together for John.
Hi, John. Welcome. Hi,
So we heard you had a long travel. How's the jet lag going?
Speaker 10 00:11:42 I'll let you know tomorrow.
Great. So it's you over
Speaker 10 00:11:48 So consumer identity and access management is a fairly new and exciting field. Something that's evolved out of traditional identity and access management, where we're all familiar with, you know, using directories and all sorts of fancy authentication mechanisms to get access to corporate data or government data consumer has developed to meet the needs of the consumer market instead. And that can be very different in both the kinds of data, the processes, the authentication mechanisms that are necessary to support, you know, a large, large base of consumers. Typically we see some of the goals with consumer identity management are to make the, the customers digital experience, a pleasant one all the way through and most consumer identity systems do that by providing things like social media, registration, social logins, and a variety of different multifactor authentication methods. The information that can be gleaned from that's useful to companies who are interested in pulling marketing statistics to be able to guide marketing campaigns, marketing automation, and then on the regulatory compliance side we have in the EU GDPR, as we've all heard about coming up next year, where it will become imperative, that we collect the consent from users for the use of their information.
Speaker 10 00:13:16 So the various cm solutions that are out there today, address these needs in different ways. Another major driver besides GDPR is PSD two, the revised payment services directive. And when it goes into effect, it will drastically alter the banking and financial landscape in Europe. And for that reason, we believe that consumer identity and access management systems will become very, very important. Not only for offering things like strong customer authentication, but then simply for banks to be able to get more information about their customers, to help them retain customers. And then also for the third party providers as a means of gaining competitive advantage and the recipient meets most of these objectives. And in fact, they have over half a million live users in Netherlands, Belgium, Germany in Australia, and they're particularly targeted to PSD two enablement. So without further ado, the winner for the best consumer identity project is money. You please welcome to the stage Mr. Hugo,
Would you like
Speaker 12 00:14:54 To
Say a few words about your project?
Speaker 12 00:14:58 Sure. Thank you. Well, we're editing, it's a, it's a team effort. So this is the, the team that did it with me. I've got Hugo Lowinger. He's our strategic business architect. I've got no idea what that means. So you've got to ask him yourselves. I think we've got Josh she's responsible fraud, product management for fraud, security, authentication, and compliance. And we have got Chris from die from PWC. He helped us set up the system based on fraud, rocket NCAP. So we have to ask Chris what actually was built and what we think what was built. Hugo will give a speech tomorrow about the actual solution. So not going into the details. I recommend heading off to his session and to learn why we won this award. Thank you very much for it. It's a pleasure. And thank you.
Thank you. So thank you, John. And congratulations.
We now come the come to the ke for the best IEM project.
Fantastic. And next step, we'd like to put our hands together for senior Analyst Analyst with copying a call Mr. Matthias Reinwarth please welcome Matthias
Matthias. This is your third loud issue.
Speaker 13 00:16:33 I thought, yeah,
It is. Are you nervous?
Speaker 13 00:16:36 Of course.
Okay. So you don't get used to it
Speaker 13 00:16:39 A bit, but it's talking to great people and with great experience. So yeah, of
Course, but I think they are nice. So don't be
Speaker 13 00:16:46 Afraid. Okay. Thank you. Good answer.
Speaker 13 00:16:53 Okay. Best IAM project, difficult task, but nevertheless, let's find somebody who's worth receiving the price. When we talk about large scale ID and access management systems in 2017, we usually mean, and John talked about that custom identities within internet facing systems. Many people say enterprise IAM is a solved problem, but that is surely a big mistake to ignore corporate enterprise identity and access management systems, large and very large organizations. Many of them with global reach are distributed across almost any country of the world. And to think of legislations behind that, they are dealing with large numbers of internal identities, their relationships and profiles. This task becomes even bigger when it comes to achieving compliance to all of the legal and regulatory requirements across the world. Many of those organizations, because they are long in the game, started out as early adopters for identity and excess management.
Speaker 13 00:18:01 And they are now challenged with retiring early incarnations of such systems and replacing them with matured state-of-the-art technologies and newly designed robust and compliant processes, which is the bigger challenge. Most probably having a quarter million of customers in a C IAM system is challenging. And so is having 250,000 corporate users in an IAM system. This year's winner of best IAM project goes far beyond the traditional project scope with a strong focus on interoperability and automation. It replaced an existing in enterprise IAM system. And while doing this, the team among other features added privilege management and B2B functionality, and they implemented strong compliance features like management of segregation of duties. First look at some of the large figures just to impress you more than 300,000 users, more than 5 million identity lifecycle transactions per month, and 100,000 joiners movers and levers. But for me, the small figures are more impressive. The project had an average of 20 staff members throughout the overall project 20, and it was done within 10 months. The winner of this year's EIC award for best I am project is Nestle. Please. Welcome on stage Mr. Ryan, and Zo you again. Congratulations. You wanna say a few words?
Speaker 14 00:20:15 Yeah. Let me catch my breath first. Well first thank you for, for nominating us and, and allowing us to, to win this award. It was it's truly an honor to be recognized by KuppingerCole and the industry, all the ID pros out there. I'm gonna give some special thanks to the Nestle team. Lots of hours, lots of determination went to this project, especially my colleague MI Zo here without your hard working dedication, we couldn't have done this couple other thank yous. I like to give to our partners CTP, specially Intergen. You got us through the dark days without your support. We wouldn't have done this. The one identity team, keep making great software, help us solve those identity challenges we have. And last thing is, this is just the beginning. We have a long roadmap, lots of initiatives. So hopefully we'll be back next year. Great. Thank you. Thank you.
Thank you. And congratulations again.
Yeah. Thank you. So the next award is for the best I O T everything.
Yeah, something dropped at the vere. Oh,
But not your bra, right? No. Triple says so the best. So the next award for the best T security project,
And we'd like to welcome on stage copping, a cold lead Analyst Alexei Balaganski. So hands together for Alexei, please.
Hi Alexei. Hey.
Speaker 15 00:21:55 Hello.
Speaker 15 00:21:56 Thanks.
So you were the moderator of today's expert date. How was it?
Speaker 15 00:22:03 It was out there say unexpectedly. Amazing. We really had to had not thought that we need so many chairs. So next year we will definitely build more places to sit more people cause there were so many interested, great
Speaker 15 00:22:19 Thank you.
Speaker 15 00:22:25 So first of all, I would like to set one record straight, the internet of things. Isn't really a thing anymore. As technology behind this buzzword has evolved past the so called peak of inflated expectations. The divide between consumer and industrial IOT segment is really no longer just in the terminology. Well, consumers are increasingly disillusioned with promises of everything smart, which are they've actually delivered on time and is expected. The industrial IOT segment is actually doing great. And the last year, the 2016 was really decisive year for the industrial OT because windows finally stopped thinking about the buzzwords and turned towards more mundane, but also important things like return of investment or interoperability or security. In fact, quite a few projects last year were devoted exactly to that. Delivering a IOT as secure is possible from the very start. And this is why this year we have our first IOT security award and the first project to win this award has to do on deals with drives and not hard drives mind you with AC drives, which are specialized electronic devices for controlling torque speed and rotation of electric motors.
Speaker 15 00:23:54 Hundreds of thousands of such devices are produced each year and refined, widespread use, not in typical industrial environments like pumps and mining manufacturing or energy producing industries, but actually much closer to the consumers in the fields like water supply, air conditioning, or even food and beverage production. The goal of this particular project was to create a unique cryptographic identity for each such a device for each drive in production and to enable secure communications with those devices over standard industry standard communication protocols. This of course enables the multitude of use cases from remote management and monitoring to over the air page delivery, continuous monitoring, temporary detection and everything conforming to the strictest industrial compliance regulations. We should also have in mind that in the OT, in the industrial systems, the upgrade cycles are noticeably longer than in it, not what we are used to normally. So by combining state of the art cryptographic methods, the most current security best practices and clever ways to overcome hardware limitations, the resulting solution promises to stay relevant for at least 30 years until the next upgrade cycle, which is typical in such environments. Even more impressive is that this project has been developed and delivered, developed from scratch and delivered to the customer in just 10 months. So without further ado, the winner of our first
Speaker 15 00:25:32 Based IOT security project is 10 force. And please welcome on stage. And I hope I don't Cher that name. Mr. Chik Toki, would you like to say,
Speaker 16 00:26:07 Can
Speaker 15 00:26:08 I avoid this? No.
Speaker 16 00:26:10 Sorry. Okay. I'm very proud to be here. Thank you for the award. I'm a software architect, part of the software, a architecture team that initiated the project, small corrections done first drives. So we producing frequency converters. That's correct. We wouldn't achieve that without our partnership with NSU would actually help us to do it. So thank you very much.
Yes. Congratulations. Thank
Like you. I thank you actually.
So last but not least, we have another first award and the next award for the future technology award.
Yes. As you said last but not least. Please will you welcome back on the stage cupping, a coal founder, Mr. Martin Kuppinger and also principal Analyst, please put your hand together for Martin again.
So I think everybody knows you, so let's go ahead.
Okay. Oh, sorry. I gather a little bit more of introduction here. So finally you had, could have asked me about being nervous. Finally. I'm more nervous ahead of the, the awards ceremony than I'm ahead of my opening keynote. So anyway, let's start. And what, what do you have here is special award? So it's one we give away on certain, various special, special occasions. You might have noticed if you have listened to my opening keynote, that I'm a strong believer in the benefits cognitive technologies can bring to the field of information security in general and identity and access management specifically, and even more to consumer identity management. So I think it's really one of the fields I strongly believe in that it will change a lot of things we are doing. And I also think I have managed in one or two talks. I gave that I have a little, a very little bit of personal history in that field.
So back in the days, which nowadays are called new economy. So it's all the dot coms. And so on. I was part of a company which have an offering in the field of pattern, analyzed pattern matching based on D on CDs back in these days. So, but really interesting stuff, cool technology, even back then. And I learned in these days without understanding the mathematics behind. So I understood probably which type of mathematics is behind, but I don't understand the algorithms. I don't understand the details, but I understood that there's a huge potential. And let's say like this I've been waiting some 17 or 18 years since then to finally see broader adoption of that starting. And yes, and this was one of the questions which came up at the end of my keynote. Yes, there is a trade off between privacy and the new business models based on cognitive technologies potentially.
So there is not only a positive thing, helping us in security, there's also risk. And so if a 3000 worth text, you enter into a system results in a psychological profile. It's scary. On the other hand, if you look at the details you learn, okay, there's some natural language processing, there's some other appli methods and it's just using well known age old methods that are well established in psychology. So at the end of the day, yes, the scale the speed can scare and we all need to act responsible. On the other hand, there are a lot of fantastic opportunities. And what we see here is things like cognitive technologies, wishing computing app, natural language processing all day, help us doing things and supporting people better in doing their daily drops.
So we have to be careful using such technologies, but as I've stated in my keynote, the target of all this stuff is not replacing humans. We are very, very, very far away from any scenario of that, what it is, it can help doing humans that tr help humans doing their chops better. And there's a huge potential, there's huge potential in many areas. So if you look at augmented reality in manufacturing environments, it's a totally different field. If you look at what I've talked about, cognitive security, it's a very important field. And we talked about how can we close or solve this K gap? And that's one of the areas where we have to look at such type of technologies. So the company I talk and the solution I talk about obviously has been a list from my perspective, a huge entrepreneurial risk. So a lot of money, a real lot of money invested in, but also we see a growing number of services being available in many fields.
So security, IOT, marketing automation, connected many, many more based on a variety of technology, such as natural language, understanding, analyzing the tone of conversations. So sometimes it's not only what you say, but how you say visual recognition discovering data. So these big data lakes and finding what you're looking for. So to speak the needle in the haystack and security, it would be this which hints us to an attack. And we had an interesting conversation in a panel today, which was about where to start with these things. And clearly, if you say machine learning for itself, if you just learn from there was an attack and we associated pattern, then it's delayed. But if you understand there are anomalies in behavior and we try them to figure out what caused this and might this be an attack. Then at some point of time, we also might be able to really identify the unknown attack patterns, the real, unknown, not only the ones which are somewhat similar, but the real unknown attack patterns.
And maybe in a couple of years from now, we rate the innovation which we received this award at the same level as the introduction of the first IBM PC. What it brings to us is what I would, if I would use passwords, I would say it's AI for the masses or AI as a service. So it makes it available on broad scale for easy use for everyone in fact, more or less. And this is from my perspective, really ground breaking, because it helps us moving away from solving a certain problem with a very specific use of technology for only that problem towards saying, I have these cognitive services and I can use them for whatever business problem over time. I feel I need such technology. So it's from what I see, it's groundbreaking. And I believe what we have here is what has the potential of moving AI and cognitive technologies, maybe not from ology practice. That wouldn't be correct because we see a lot of practical implementations, but it's has the potential for moving it from isolated solutions to large scale use. And this is why we grant this award a special award to IBM Watson.
And so I have to open the envelope right now. The winner, as I've said for the future technology award is IBM Watson. So please come, please. Welcome on stage Dr. RAR, who is a IBM fellow.
Speaker 17 00:35:17 Thank you Martin. And thank you. Kaja for nominating us as well as selecting us for this award. There's a lot of people behind this. I want to thank everybody. I don't wanna go through the roll call. That's gonna take rest of the evening, but there's a number of partners as well as some universities, which went into creating the Corpus for the data. As, as Martin said, when you combine things like security data, right? With some of the human generated data, some amazing things happen for me personally. I think the first scenario that got me excited and make it more personal was when we saved the life of the first patient. This was, this was in Adelaide Australia. And this gentleman was very, very sick and really couldn't figure out what's going on until we used that case as an example for Watson, and we were able to put together information about the case itself, the diagnosis, as well as the human generated information about what was the gentleman doing the last six weeks, we were able to piece together a specific situation.
Speaker 17 00:36:31 And then it was a question of solving that, right? We applied that to security. We, we have been able to solve some amazing problems of not just understanding threats, but fraud. And we are now applying it to identity and access management to help address a problem of skills, not, not to replace human beings for sure, but to augment them, to be able to provide additional context, to be able to do it in an expedited manner so that we don't have to deal with some of the mundane processes that we have to deal with an IM. So thank you.
Thank you, Martin. Congratulations
And congratulations too.
Yeah. So ladies and gentlemen, this was the 10 European identity and cloud award ceremony. Thank you for being part of the event. And for all of you who are participating in the gamification, the code word is celebrate.
Thank you for that, Jennifer. We did say it would be like the Oscars didn't we? We did. We did say we tried. Yeah. Yeah.
I think we were
Better except we get it right. We'd like to invite you to join us after the award ceremony. Now in the expo area, this is kindly sponsored by Vicom. So there is plenty of food, plenty of drink to enjoy, have a super rest of the evening together. Use the time to continue networking, building those relationships and enjoying our time together here at the cupping a cold event. So thank you very much to everyone and a good evening.