...

CLOUD COMPUTING, MOBILITY AND SOCIAL COMPUTING – DRIVING TRANSFORMATION, DELIVERING BUSINESS VALUE, RETAINING PRIVACY

Featured Speakers

What’s so special about EIC? This is what our attendees say!   Welcome to the European Identity & Cloud Conference
eic 2014 preview   eic welcome preview
 

European Identity & Cloud Conference 2015, taking place May 5 – 8, 2015 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany, is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

The EIC is renowned for its influence and unique combination of thought leadership, best practices, discussions and strategic guidance on the future of security in the world of digital business. Over 600 IT professionals will assemble in Munich to be inspired by a forward-thinking, worldwide community.

 

Key topics

  Digital Leadership: Balancing Digital Business Value and the Need for Security
  Assessing and Measuring the Impact of Digital Risk on your Business
  Identity & Access Management as a Digital Business Enabler: Covering Associates, Customers and Partners
  Cloud Security, Privacy & Compliance
  Hybrid Cloud: Integrating Internal and External Environments at all Levels
  Managing Cyber Risk: Why Defence is not Enough
  The Impact of the Internet of Things on your Business and Infrastructure
  IT & Operational Technology (OT): Catalyzing the Fusion of two Contrasting Cultures
  Mobile Infrastructure & Mobility Management
 

Top 5 Reasons to Attend

1. Transform your IT into a key Contributor for Enterprise Growth and Competitiveness

Discover how to successfully master the mobile, social, cloud troika with its explosion of identities and technologies.

  • Enable the new ABC: Agile Business – Connected! Support business partner collaboration, customer interaction, and secure cloud access
  • Finding the balance: Maturing your existing IAM and addressing new business challenges
  • Big Data & advanced analytics: Defining a solid, secure and privacy-aware path
  • Information Stewardship: Managing information as a key organizational asset
  • Next Generation IT Governance: Integrating and leveraging existing GRC initiatives to protect information assets in a connected, open enterprise

2. Security is a Journey: Prepare your Information Security Strategy for the “Smart” Future

Internet of Everything, Industry 4.0, Connected Enterprise – Find out how to get ready for a secure connected life future, when everything will be connected to the network.

  • Making the benefits and competitive advantage of seamlessly operating the Everything-Connected-Enterprise available to your business
  • Identity Management as a critical foundation for the Internet of Everything
  • Leveraging preventive and real-time Big Data Security for Privacy and Trust in a connected world
  • Holistic Information Security – for business, manufacturing, and all the smart things

3. Unlock the Value of Privacy

Understanding privacy as an opportunity and business enabler to take a leading role in a digital world, where the individual is able to deal at eye level with your enterprise.

  • Better understand the European view on privacy, and how it fits into the different concepts of individual empowerment
  • (Re-)Designing business models to not only comply with, but taking advantage of current and future privacy regulations
  • EIC is the only place to find an inter-regional and inter-continental view on privacy and to become part of a strong and innovation driving community

4. Sharing Best Practices, Learning from Global Thought Leaders

EIC is renowned for its great lineup of speakers, thought leaders and IT practitioners from around the planet, gathering to share their experience on Identity Management, Cloud, Privacy, Information Security, GRC and more.

  • Great Best Practice Sessions from most industries, like Financial Services Organizations, Telcos, Utilities, Pharma, Health and more
  • KuppingerCole´s Analysts and Fellows from other organizations will moderate 100+ great sessions in 5 parallel streams and help you find your best and most productive way though the agenda
  • Step up your networking and learn from your peers in other organizations and countries, share your experience and get feedback.

5. Lead the Change

Get Access to KuppingerCole´s comprehensive, up-to-date, unbiased and independent information for best possible support of your decisions on your future IT model.

  • The EIC delegate pass provides you with up to 3 comprehensive packages on key topics which will be driving your strategic IT and Information Security planning. Each of these packages contains a selection of research notes, podcasts and analyst briefings.
  • Implement new ideas and approaches to solving your challenges – be an IT rockstar!
  • Earn CPE Credits for your Certification Programs
 

Continuing Education Credits

You can earn CPE credits at EIC 2015 by attending conference sessions and optional workshops.

Who should attend: CIOs, CISOs, IT Managers, project managers and IT professionals with 3 or more years’ experience.

Prerequisites: none
Advance Preparation: None
Learning Level: Intermediate
Delivery Method: Group-Live
Field of study: Computer Science



cpelogo

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office´s telephone +49 211 23707710, email: lk@kuppingercole.com

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.