Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Big Data - The Holy Grail for Information Security?
Dec 19, 2013
With an increasing number of fraud incidents, customer data losses and other breaches on one side, and the disappearance of the classical perimeter because of the need to finally extend the enterprise to partners and customers on the other side, introducing Big Data for Security Analytics seems to be the logical next level for your information security strategy. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will talk about the benefits and challenges using Big Data for security analytics, and he will draw your attention to the additional risk that may come along with...
Webinar Recording
Business Ready IAM with Sony Computer Entertainment and Simeio Solutions
Dec 10, 2013
In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important to have a sound foundation that aligns with your business strategy, while keeping pace with market trends and customer needs.
Webinar Recording
Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?
Dec 04, 2013
Many organizations have started their journey into the world of IAM several years ago.
Webinar Recording
Moving Access Governance to the Next Level: Beyond Check-box Compliance
Nov 19, 2013
Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It is not sufficient to govern access in SAP environments or some few other IT systems to really tackle all of today’s Information Security challenges. The threat landscape is changing and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who...
Webinar Recording
Negotiating the Cloud Standards and Advice Jungle
Nov 05, 2013
The cloud is a hot topic and most SDOs (Standards Defining Organizations) have at least one initiative in this area. This plethora of initiatives has confronted the users of cloud services as well as CSPs (Cloud Service Providers) with a jungle of frameworks, standards, advice and certifications. In this webinar, KuppingerCole´s Senior Analyst Mike Small will provide a summary of these and some practical advice on their relevance and usability.
Webinar Recording
Identity Information Quality
Oct 23, 2013
Identity Information Quality has been a challenge since the early days of IAM, and it remains top of the list in many projects. Good quality of identity information is the foundation of any information security initiative. In this webinar, we will discuss strategies and solutions to improve identity data quality.
Webinar Recording
Extended Enterprise - The New Scope of Information Security
Oct 18, 2013
Managing access to information and services deployed anwhere for employees, partners and customers in any context on any type of device owned by any party involved - there couldn´t be a much more challenging task. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce you into the new concept of managing the "explosion" of identities and devices.
Webinar Recording
Strategic Information Security Investment Planning - The Legal Perspective
Oct 16, 2013
The ever increasing challenge of meeting regulatory compliance is putting more and more pressure on your information security budget? Then it may be time to include some legal arguments to convince your management that you need to spend more on information security. In this webinar, KuppingerCole´s Fellow Analyst, Lawyer and Data Protection expert will help you finding these arguments.
Webinar Recording
Approaches and Elements of Maturity Benchmarking in Information Security
Oct 09, 2013
Information Security is hard to measure. If your security strategy fits well into your organization´s needs, then the risks are low and there is hardly anything happening that you could measure. Or, the other way round - the more you can measure, the more your job is at risk. True? Join us in this webinar to find out.
Webinar Recording
Wie Sie Ihre Daten unausspionierbar transportieren und speichern
Oct 09, 2013
Die neuesten Enthüllungen über die Angriffe westlicher Geheimdienste, allen voran der NSA, auf kryptografische Implementierungen sorgen verbreitet für Unsicherheit darüber, wie man sich mit welchen heute verfügbaren Werkzeugen noch wirksam vor dem Ausspionieren schützen kann. In diesem Webinar sprechen KuppingerCole Senior Analyst Prof. Dr. Sachar Paulus und Lutz Emrich vom SIZ über die Auswahl und den Einsatz solcher Werkzeuge. Dieses Webinar baut auf unser einführendes Webinar mit dem Titel "Verschlüsselung richtig einsetzen" auf.
Webinar Recording
Verschlüsselung richtig einsetzen
Oct 09, 2013
Die NSA und ihre Helfer in Europa und Deutschland haben gewaltige Möglichkeiten, sich in Ihr berufliches und privates digitales Leben unbemerkt einzuschleichen. Die jüngsten Enthüllungen zur Entschlüsselungspraxis der NSA und den Zugriff auf Smartphones steigern einerseits die Beunruhigung. Andererseits aber liefern sie genügend Details über die Praxis staatlichen Hackertums, um eine Verteidigungslinie definieren zu können. Prof. Dr. Sachar Paulus, Krypto-Experte und KuppingerCole Senior Analyst, gibt Ihnen 5 Tipps, wie Sie einen wesentlichen Teil staatlich organisierter Angriffe auf Ihre...
Webinar Recording
How Mature is Your Cloud?
Oct 04, 2013
Cloud services are outside the direct control of the customer organization and their use places control of the IT service and infrastructure in the hands of the CSP (Cloud Service Provider). A structured approach is essential to ensure organizational readiness for the cloud, to select the right service to meet business needs and other non-functional requirements like security and compliance and to enable that service to be assured. This webinar gives an introduction into cloud maturity assesment basics and is a great preparation for the KuppingerCole Information Risk & Security Summit...
Webinar Recording
Authorization as a Calculated Risk
Sep 26, 2013
Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for the level of security of the connection. In the first part of this webinar, KuppingerCole Senior Analyst Dave Kearns, along with guests from Nok-Nok Labs and Certivox, will show you how going beyond passwords to a risk- and context-based authentication and authorization would help you to reach the...
Webinar Recording
The Business Side of the API Economy: Enabling the Agile, Connected Enterprise
Sep 24, 2013
Today’s businesses have to be far more agile than ever before. Competing on global scale, economic turmoil, rapid innovation and other factors put pressure on organizations. One of the results is that businesses have to be better connected with other businesses and customers than ever before. They have to be faster in their own business processes and the processes that connect them with others. They have to make more out of information, by combining information from various sources, including openly available data. Smart information that is based on combining information from various...
Webinar Recording
The Future of Authentication and Authorization
Jul 23, 2013
Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. In this webinar, KuppingerCole Senior Analyst Dave Kearns will talk about the bigger picture on the future of authentication and authorization.
Webinar Recording
PRISM: Wie schütze ich mein Unternehmen wirksam vor Wirtschaftsspionage?
Jul 10, 2013
Das organisierte und systematische Ausspionieren von Privatpersonen und Unternehmen durch staatliche Einrichtungen ist zwar nicht neu und keineswegs auf US-Einrichtungen beschränkt. Aber es ist durch die jüngsten Enthüllungen in Zusammenhang mit dem PRISM Projekt der US-Sicherheitsbehörde NSA einmal mehr in unser Bewußtsein gerückt, dass wir durch solche Übergriffe verwundbarer geworden sind und der anrichtbare Schaden nicht selten existenzbedrohliche Ausmaße annimmt. In diesem Webinar gibt Ihnen KuppingerCole Gründer Martin Kuppinger Empfehlungen, wie Sie Ihre wirklichen Gefahren erkennen...
Webinar Recording
Cloud Assurance & Cloud Risk Awareness in the Light of PRISM
Jul 05, 2013
With the recent unveiling of systematic and large scale espionage activities conducted by US government agencies, the level of trust into cloud services run and controlled by 3rd parties has reached a new low. Google, Facebook, Skype, Apple, Verizon and many other service providers did open their databases to NSA and enabled them to search your mails and documents for information considered as valuable in whatever context. In this webinar, KuppingerCole´s Senior Analyst Mike Small will give you an introduction on how to identify the key assurance challenges of the different kinds of Cloud...
Event Recording
European Identity & Cloud Awards 2013: Lifetime Achievement Award
Jun 18, 2013
This year, the “ Lifetime Achievement ” award has been presented again, and this time it went to Kim Cameron, who has greatly contributed to the Identity Management field with his “Seven Laws of Identity” and who continues to shape the IAM field with new ideas.
Event Recording
Marcel van Galen - Qiy Foundation´s Infrastructure
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 17:00
Event Recording
James Baker, William Lovegrove - Architecture and functionality of the "EIC App"
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 16:30
Event Recording
Panel Discussion - From Risk to Value: The Future of Social Media and their Role as Catalysts in Enterprise IAM
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 15:30
Event Recording
Nadya Onishchenko - Secure Communication Ecosystem as Part of the Life Management Infrastructure
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 15:00
Event Recording
Mario Hoffmann - Roadmap to Life Management Platforms
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 14:30
Event Recording
Mike Small - Top Ten Tips for Negotiating and Assuring Cloud Services
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 17:00
Event Recording
Mark Evans - The Reason why RLB Moved to the Cloud
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 15:30
Event Recording
Wolfgang Schmidt - Compliance in Hybrid Clouds: Integrated Process Management Despite Regulatory Requirements?
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 14:30
Event Recording
Dr. Karsten Kinast, LL.M. - Big Data – Small Privacy?
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 12:00
Event Recording
Martin Kuppinger - Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 11:00
Event Recording
Prof. Dr. Sachar Paulus, Mike Small - Big Data: the Need, the Opportunities
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 10:30
Event Recording
Mike Small - Information Stewardship: What does it mean for Big Data?
Jun 07, 2013
Session at the European Identity & Cloud Conference 2013 May 16, 2013 11:30
Webinar Recording
Quo Vadis SAP?
Jun 06, 2013
Martin Kuppinger and Craig Burton will discuss about how the "Computing Troika" Cloud, Mobile and Social Computing will necessarily influence SAP´s products and Services strategies.
Event Recording
Marcel van Galen - Qiy Independent Trust Framework
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:30
Event Recording
Jörg Heuer - The Wallet and Life Management
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:00
Event Recording
OASIS Panel - ID Protocols: Out with the Old and in with the New?
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:00
Event Recording
Panel Discussion - Next Generation Cloud and Mobile Identity Management
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 10:30
Event Recording
Panel Discussion - EU´s General Data Protection Regulation: 10 uneasy Truths for any Business
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 11:30
Event Recording
Panel Discussion - Access Risk Management: Continuously Identifiying and Tracking Access Risks
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 17:00
Event Recording
Daniel Frei - Risk-based Access Management @Swiss Re
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:30
Event Recording
Panel Discussion - Access Intelligence: The New Standard Feature of Access Governance?
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:00
Event Recording
Ulrich Haumann - IAM Governance Outside IT
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:30
Event Recording
Dr. Carsten Mielke - A Success Story Introducing User Access Management for an Energy Trading Company
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:00
Event Recording
Panel Discussion - Access Governance: How to Govern all Access
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 12:00
Event Recording
Martin Kuppinger - Redefining Access Governance: Going well beyond Recertification
Jun 06, 2013
Session at the European Identity & Cloud Conference 2013 May 15, 2013 11:30
Event Recording
Prof. Dr. Sachar Paulus - Software Integrity and Active Defense: The Future of Information Security
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Prof. Dr. Kai Rannenberg - Can “App” Phones Help Users to Manage their Identity and Privacy?
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Ralf Knöringer - ONE Identity – Heaven or Hell? Do we need more than one “ME”?
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Peter Boyle - If Your Customers Don´t Feel Safe, They Will Leave You
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
European Identity & Cloud Awards 2013
Jun 05, 2013
The European Identity Awards honor projects that promote the awareness for and business value of professional Identity Management and Cloud Security. May 15, 2013 at Munich, Germany
Event Recording
Craig Burton - Life Management Platforms Evolution
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Marcel van Galen - Life Management Platforms: Examples, Prototypes, Best Practices
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Doc Searls - The Internet of Me and My Things
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Dr. Karsten Kinast, LL.M. - Post-Privacy: Yet to come or has it already arrived?
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Prof. Dr. Reinhard Posch - European Cloud Partnership: Shaping a Competitive Strategy
Jun 05, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Jonathan Cogley - Don’t Let Password Mismanagement Land Your Company in News Headlines
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Peter Weierich - Consumer IAM: Business Drivers and Challenges
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Dr. Laurent Liscia - You can Shelve your Big Data Startup Plans if you don´t have Privacy Covered: A Standards Perspective
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Kim Cameron - Tackling the Identity Explosion: Getting a grip on Customers and Partners
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Dr. Wojciech Wiewiórowski - Personal Data Protection and eID: Bringing two Reforms of EU Legislation to a Common Denominator
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Hila Meller - The Day After Tomorrow: Security Challenges of the Future
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Philip Lieberman - Securing Privileged Identities in the Real World: A Proposed Maturity Model of Competence and Capabilities
Jun 04, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Alessandro Musumeci - Moving to the Cloud to Improve Customer Experience: Lessons Learnt
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Karl Markgraf - Compliance Driven Identity & Access Governance
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Pamela Dingle - Analog Identity
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Jackson Shaw - Mortality & Morbidity Findings for Identity Management
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Panel Discussion - The Future of IAM
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Martin Kuppinger - EIC 2013 Opening Keynote
Jun 03, 2013
Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany
Event Recording
Craig Burton - Life Management Platforms
May 31, 2013
Recorded during the European Identity & Cloud Conference 2013
European Identity & Cloud Conference 2013
51 videos
Keynotes, interviews, and selected sessions from the European Identity & Cloud Conference 2013. Please note that most of these videos are only available for the conference participants or users having a KuppingerCole Research subscription.
Webinar Recording
The Common Credentials Dilemma - How to Get a Grip on Password Sprawl for Privileged Accounts
May 10, 2013
A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as administrator, dba, or root – not to speak of all the admin accounts of network equipment etc. Unfortunately, a large portion of accounts with highly elevated privileges is shared. To manage these accounts, to avoid password sprawl, and to in consequence mitigate risks, both guidelines and technologies...
Webinar Recording
Benutzer- und Berechtigungsmanagement für den Mittelstand leicht gemacht
Apr 30, 2013
Das Benutzer- und Berechtigungsmanagement ist ein Thema für Unternehmen jeder Größenordnung. Während große Unternehmen meist schon seit längerer Zeit den Schritt hin zu einer zentralen Infrastruktur für IAM (Identity and Access Management) gemacht haben, ist die Situation im Mittelstand häufig noch durch das Fehlen einer Gesamtlösung geprägt. Systeme wie das Active Directory, SAP, Produktionssysteme und andere wichtige Business-Systeme werden unabhängig voneinander verwaltet. Das Risiko für die Informationen ist entsprechend hoch – gerade auch für das geistige Eigentum, das Firmenwissen,...
Webinar Recording
Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!
Apr 25, 2013
Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Identity Management lectures, but ultimately treated as different technologies and implementation projects.
Webinar Recording
Rapidly Evolving Identity & Access Management to Meet Today´s B2C & Cloud Challenges
Apr 17, 2013
The world of Identity and Access Management is growing in scope, and must change and adapt faster than ever before. CIOs are under pressure to shift from employee-centric IAM to consumer-facing IAM that drives top-line revenue. As a result, they are quickly learning that legacy enterprise IAM solutions are not designed to solve today´s web challenges (enterprise, cloud, social, mobile).
Webinar Recording
European Identity & Cloud Conference 2013 Preview
Apr 10, 2013
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s key topics and speakers.
Webinar Recording
Extending Data Governance Beyond the Database
Mar 22, 2013
Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.
Webinar Recording
Protecting Information in an Unstructured World
Mar 20, 2013
Join KuppingerCole Senior Analyst Mike Small and TITUS CTO Steph Charbonneau in this Webinar to learn the Major causes of information loss and leakage and how to avoid them by bringing structure to Information through Information Stewardship.
Webinar Recording
SAP Identity Management und GRC: Miteinander statt nebeneinander!
Mar 15, 2013
In diesem Webinar beschreibt KuppingerCole Principal Analyst Martin Kuppinger unterschiedliche Architekturkonzepte, verfügbare Produkte und deren mögliche Rolle in IAM / GRC-Gesamtlösungen im SAP-Umfeld. Richtig gemacht, können Unternehmen durch einen integrativen Ansatz für IAM und GRC ihre Audit-Anforderungen besser erfüllen, schlankere Prozesse realisieren, die Arbeitslast für Fachbereiche reduzieren und eine schlankere und damit günstigere IT-Infrastruktur für IAM und GRC umsetzen.
Webinar Recording
European Identity & Cloud Conference 2013 - Agenda Preview
Mar 12, 2013
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s Agenda and speakers.
Webinar Recording
BYOD, Social Networking, Cloud - sicher und kalkulierbar
Mar 11, 2013
Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausforderungen.
Webinar Recording
Rethinking Identity and Access Governance in a World of Change and Complexity
Feb 01, 2013
The convergence of Cloud, Mobile and Social Computing create strong new opportunities and change the way we use Information Technology, shifting the control into the hands of the users. Governing identity and access in such a complex environment is key to success. Join us in this webinar to discuss these challenges.
Webinar Recording
European Identity & Cloud Conference 2013 Preview
Jan 22, 2013
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s key topics and speakers.