...

Please note that presentations and other event materials are available only to registered participants.

You need to log in to be able to download them.

Monday, 05/07/2007
08:00-18:00 Conference Registration
09:00-12:00 Getting Started with Identity Management
Fundamentals on how you can accellerate your Business with Identity Management

Martin Kuppinger, Principal Analyst, KuppingerCole

pdf

12:00-14:00 Liberty Alliance D/A/CH SIG Meeting

Dr. Hellmuth Broda, Distinguished Director and Chief Technology Officer Global Government Strategy, Sun Microsystems
13:00-15:00 SAP Global Security Alliance – Members Meeting

Klaus Schimmer, SAP AG
Generic IAM Meeting

Dr. Horst Walther, KuppingerCole
XING Identity Management Group Meeting

Martin Kuppinger, KuppingerCole
15:00-15:15 Welcome
15:15-15:45 Global Identity Trends – An interview with the CEO of Ping Identity

André Durand, Founder & CEO, Ping Identity
15:45-16:30 How Fully Federated Organizations will Dominate their Environment

Archie Reed, CISSP, HP
16:30-16:45 Coffee Break, Exhibition Area
16:45-17:30 Next Generation Provisioning

Eckhard Völcker, Vorstandsvorsitzender, Völcker Informatik AG

pdf

17:30-18:15 Identity Enabling the Enterprise – The Role of Open Source

Dr. Jeff Jaffe, Executive Vice President and Chief Technology Officer, Novell

pdf

18:15-19:00 From Enterprise IT Management to Business Driven Security Management

Bilhar Mann, Senior Vice President, CA Technologies

pdf

19:00-19:45 Business Benefits of Enterprise Authorization Management

Paul Heiden, Founder & CEO, BHOLD COMPANY BV

pdf

19:45-22:00 Reception & Buffet, sponsored by IBM Germany

Tuesday, 05/08/2007
06:30-12:00 Conference Registration
07:00-08:00 Birds-of-a-Feather: Next Generation Provisioning and Auditing – loosely or tightly coupled

Martin Kuppinger, Principal Analyst, KuppingerCole
Eckhard Völcker, Vorstandsvorsitzender, Völcker Informatik AG
08:00-08:30 Breakfast
08:30-09:00 The business of identity

Tim Cole, KuppingerCole
09:00-09:45 User-centrism: The Solution to the Web Identity Crisis?

Dick Hardt, Entrepreneur,
09:45-10:30 Why Security and Compliance need Identity

Alberto Yépez, Vice President, Identity Management & Security, Oracle Corporation

pdf

10:30-11:00 Coffee Break, Exhibition Area
Track I: Managing Risk & Compliance I
Moderator:

Dr. Christoph Capellaro, Ernst & Young AG
Track II: Authentication Trends & SSO
Moderator:

Martin Kuppinger, KuppingerCole
Track IV: Best Practices
Moderator:

Dr. Horst Walther, KuppingerCole
Track III: Identity Federation & User-centric Identity
Moderator:

Tim Cole, KuppingerCole
11:00-12:00
Governance & Compliance Trends

Corporate Governance & Compliance – Current Developments and Trends in Europe

Klaus-Michael Thelemann, Ernst & Young AG

IT Governance – New Tasks for IT-Management

Dr. Wolfgang Johannsen, ITs okay

pdf

Single Sign-on, Credential Lifecycle Management

SSO-Report 2007: Key-Players, Status and Trends

Martin Kuppinger, KuppingerCole

pdf
Credential Lifecycle Management – Smartcards, E-SSO and the Organisation

Erik Donner, Siemens
Peter Huber, TESIS SYSware GmbH
Hassan Maad, Evidian
Bilhar Mann, CA Technologies
Kurt Roemer, Citrix Systems, Inc.
User Centric Identity Panel

Identity Federation and User-Centric Identity ? How will it affect Business and IT Infrastructures?

Conor P. Cahill, Intel Corporation
André Durand, Ping Identity
Dick Hardt,
Jörg Heuer, Deutsche Telekom Laboratories
Provisioning, Metrik, Revision

Meßbarer Nutzen durch Provisioning und Prozessautomatisierung bei DeTeImmobilien

Dipl.-Ing. (FH) Joachim Haas, DeTeImmobilien

pdf
Instant Security Audit Live-Demo

Dipl.-Ing. (FH) Joachim Haas, DeTeImmobilien
12:00-13:00
Mastering Risk ? Ernst & Young Study

Mastering Risk: Results of a Recent Study on Enterprise Risk Management by Ernst & Young

Stephan Chrobok, Ernst & Young AG

pdf

Kerberos, SSO Strategy

Kerberos als Bestandteil einer umfassenden SSO-Strategie

Manfred Hübner, WestLB AG
Portable Identity

You can?t take it with you: Portable Identity and Social Networks

Dietmar H. Büto, Viadeo / Viaduc SA
Paulo Dimas, TimeBI
Peter Helfenstein, Collanos Software
Rainer Stecken, Globolog
Identity Federation B2C

Identity Management in practice – ?A response to the increasing demand for Identity Management in the online mass market?

Michael Gärtner, Deutsche Telekom AG

pdf

13:00-14:00 Lunch, Exhibition Area
14:00-15:00
Compliance Automation I

Creating Business Value Through Compliance Automation

Priska Altorfer, wikima4 AG
Tim Cole, KuppingerCole
Jutta Neudeck, Pennova Systems AG
Smartcards Convergence

Employee smart cards as an integrated part of identity- and access management

Dr. Hans-Jörg Kremer, Peak Solution GmbH

pdf
Totally Integrated SmartCard Architecture – Combining Industry Specific Requirements with Security Solutions

Dr. Willi Kafitz, Siemens Enterprise Communications GmbH

pdf

Telco Panel

Identity Federation Leading Edge – Telco Industry

Alec Cartwright, British Telecom
John Kemp, Nokia
Identity Management & SAP

B2B User Provisioning im SAP-Kontext bei einem mittelständischen Unternehmen

Jürgen Schrempp, Endress+Hauser InfoServe GmbH+Co. KG

pdf

15:00-16:00
Compliance Automation II

Compliance Automation – Vendor panel

Gonzalo Cuatrecasas, Approva
Michael Heckner, SAP AG
Mel Holloway, Vaau Inc.
Eckhard Völcker, Völcker Informatik AG
Marina Walser, Novell Europe, Middle East & Africa (EMEA)
Alberto Yépez, Oracle Corporation
Supply Chain, Automotive

TrustedSimp: an IDM federation solution in supply chain management as implemented by Magna Steyr Fahrzeugtechnik

Christian Mezler-Andelberg, MAGNA STEYR Fahrzeugtechnik AG & Co KG
eGovernment & Digital ID-Cards

Short Introduction and Moderation:

Marc Sel, PwC Belgium

Effective use of Digital Identities and ID cards in a Government Environment

Bavo De Ridder, De Ridder Consulting
Erik R. van Zuuren, Ascure NV/BV

pdf

Identity Capable Platform

Future Business and Technology Requirements for Client-based Identity Management

Conor P. Cahill, Intel Corporation
16:00-16:30 Coffee Break, Exhibition Area
16:30-17:30
Compliance Management

A new Approach for Compliance Management

Hanco Gerritse, KPN
Marc Sel, PwC Belgium

pdf

Identity Management & Security

Identity driven Security Management or Security driven Identity Management?

Rüdiger Berndt, Oxford Computer Group Deutschland
Michael Boley, CGI Information Systems and Management Consultants
Heinz Brommundt, Avanade Deutschland GmbH
Lutz Emrich, T-Systems GEI GmbH
Rainer Knorpp, Devoteam
Dr. Hans-Jörg Kremer, Peak Solution GmbH
Georg Magg, Integralis AG
Franz-Josef Nölke, Siemens Enterprise Communications GmbH & Co. KG
Kurt Roemer, Citrix Systems, Inc.
Open Identity

CardSpace, Higgins, Bandit & Co. – Projects & Trends in Open Source Identity Management

Johannes Ernst, NetMesh
Sampo Kellomäki, Symlabs
Dale Olds, Novell
David Recordon, Facebook
Don Schmidt, Microsoft
Windows Cardspace

Next Generation Shopping and Windows CardSpace at OTTO Group

Christian Arnold, A.T.E Software GmbH

pdf

18:00-22:00 Reception & Buffet, sponsored by Giesecke & Devrient

Wednesday, 05/09/2007
07:00-08:00 Birds-of-aFeather: ADFS im Kontext von unternehmensweiten Federation-Strategien

Don Schmidt, Principal Program Manager, Microsoft
Rudolf Wildgruber, Director Product Management Identity and Access Management, Siemens IT Solutions and Services GmbH
08:30-09:00 Microsoft´s Identity & Access Strategy

Don Schmidt, Principal Program Manager, Microsoft

ppt

09:00-09:45 A Business View on Identity Management in the context of Service-Oriented Architectures
pdf
09:45-10:30 Identity Management in the Automotive Industry

Prof. Dr. Ottmar Beckmann, CISO, Volkswagen AG

pdf

10:30-11:00 Coffee Break, Exhibition Area
Track VIII: Best Practices
Moderator:

Joerg Resch, KuppingerCole
Track VI: Roles & Provisioning
Moderator:

Dr. Horst Walther, KuppingerCole
Track V: Managing Risk & Compliance II
Moderator:

Tim Cole, KuppingerCole
Track VII: SOA, Federation & Identity as a Service
Moderator:

Martin Kuppinger, KuppingerCole
11:00-12:00
The Business of Roles

The Business Aspects of Roles & Provisioning, and how to Address them effectively

Marc Sel, PwC Belgium

pdf
RBAC ? It works! Global Roles based Entitlement Management within Siemens AG

Michael Gerlach, Siemens AG, Corporate Information Office

pdf

What Does The Auditor Want To See? (I)

IT Compliance and Auditing

Dr. Christoph Capellaro, Ernst & Young AG
Hans-Jürgen Hohmeier, DATEV eG
Björn Toemmler, ISACA
Marko Vogel, KPMG
Service Oriented Architecture

Identity Management – Vision 2010: Identity as a Service

Martin Kuppinger, KuppingerCole

pdf
Identity Management and SOA ? a Winning Combination for the Agile Enterprise

Stuart Boardman, CGI

pdf

Virtual Directories

United Nations Development Programme (UNDP) ? Deploying a Global Identity Infrastructure

Anton Shmagin, United Nations Development Programme

pdf

12:00-13:00
Rollenmanagement

Organisationsbasiertes Rollenkonzept – Der Einfluss der Unternehmensstrukur auf das Rollenkonzept

Ingrid Brunner, Österreichische Post AG

pdf
Rollenbasierte Berechtigungsvergabe bei der Raiffeisen Schweiz

Michael Niedermann, Raiffeisen Schweiz

pdf

What Does The Auditor Want To See? II

IT and Basel II: Is IT Security already a rating factor?

Sonja Binder, Bayerischer Sparkassenverband
Thomas Uhl, Topalis AG
Service Oriented Identity

Managing Identities along Supply Chains – Automotive Industry

Prof. Dr. Ottmar Beckmann, Volkswagen AG
Christian Emig, Universität Karlsruhe
Dave Miller, Covisint

pdf
Service Oriented Identity – From Software to (managed) Services

Bilhar Mann, CA Technologies
Archie Reed, HP
Don Schmidt, Microsoft
Identity Management Roadmap

Identity Management Praxis: Vom Einstieg bis Provisioning 2.0

Martin Kuppinger, KuppingerCole

pdf

13:00-14:00 Lunch, Exhibition Area
14:00-15:00
Modeling Roles

Tailoring Roles for Automated Provisioning

Prof. Dr. Dr. Gerd Rossa, ISM

Roles, Process Model and Automated Provisioning at ePlus

Michael Gerlach, Siemens AG, Corporate Information Office
Paul Heiden, BHOLD COMPANY BV
Jörg Hinnemann, Atos Origin
Dr. Martin Kuhlmann, Omada
Prof. Dr. Dr. Gerd Rossa, ISM
Dr. Ron Rymon, CA Technologies

pdf
Podium: The Art of Defining a Role Model that works

Legal Issues for Identity Federation

Legal framework for identity federation in Germany and Europe

Prof. Dr. Renate Dendorfer, Heussen Rechtsanwaltsgesellschaft mbH
Virtual Directories & SOA

Loosely Coupling Applications through Identity Information – The Future Role of Virtual Directories

Tor Even Dahl, MaXware
Felix Gaehtgens, Kuppinger Cole
Miroslav Jokic, MaXware
Martin Kuppinger, KuppingerCole
Christian Patrascu, Oracle Corp.
Michel Prompt, Radiant Logic

pdf

Large-scale Identity Projects

Complex Corporate Structure, M&A, Outsourcing, Restructuring ? Addressing Major Employee Lifecycle Management Challenges at Bell Canada Enterprises

Pierre Lestage, CGI/Bell Canada

pdf

15:00-16:00
Outsourcing

Compliance & IT Outsourcing

Andreas Binder, Sapient Ltd.
Gonzalo Cuatrecasas, Approva
Dr. Peter M. Heij, Satyam Computer Services Ltd.
Pierre Lestage, CGI/Bell Canada
Martin Riley, HP
Insurance Industry

Identity Management in der Versicherungsindustrie – von der produktorientierten Lösung zur Gesamtstrategie

Michael Arnold, Danet GmbH
Rainer Knorpp, Devoteam

Identity Management bei der Deutschen Rentenversicherung

Volker Bertermann, Deutsche Rentenversicherung (ZRWest)
Service Oriented Identity – Vendor Panel

SOA, Federation + IAM ? the Vendor?s Vision

Dr. Teodor Dumitrescu, Siemens IT Solutions and Services
RBAC, Role Mining

ABN Amro – A best practice case for implementing Role Based Access

Martin Kruit, ABN Amro

pdf

16:00-16:30 Coffee Break, Exhibition Area
16:30-17:30
Entitlement Management

Enterprise Entitlement Management – Simplifying Management of Complex Authorization Policies

Ralf Knöringer, Atos IT Solutions and Services GmbH
Hal Lockhart, BEA
Andreas Luther, Microsoft
Dr. Harald Meyer, Novell
Archie Reed, HP
Top-down or Bottom-up?

Role-based Privileges Management – Using Analytics to Quickly Deliver Meaningful Results

Dr. Ron Rymon, CA Technologies

pdf
Top-down or Bottom-up Roles Modeling: Which Approach fits best?

Oliver Belikan, doubleSlash Net-Business GmbH
Rüdiger Berndt, Oxford Computer Group Deutschland
Paul Heiden, BHOLD COMPANY BV
Dr. Martin Kuhlmann, Omada
Prof. Dr. Dr. Gerd Rossa, ISM
Dr. Ron Rymon, CA Technologies
Brent Thurell, Vaau Inc.
High Availability

How to deploy a bullet-proof, fail-safe Directory Infrastructure

Felix Gaehtgens, Kuppinger Cole

ppt

Federation Leading Edge

Federation – Are We Ready? BT´s 21st Century Networks (21CN) Project

Alec Cartwright, British Telecom

pdf

Thursday, 05/10/2007
08:00-09:00 Workshop Registration
Workshops Track I Workshops Track II Workshops Track III Workshops Track IV
09:00-12:30 Feeding the Need to Know ? Managing Identities along Supply Chains

Prof. Dr. Ottmar Beckmann, Volkswagen AG
Dave Miller, Covisint
Federations and User Centric Identity Infrastructures with WS-* and MS CardSpace

Martin Kuppinger, KuppingerCole
Don Schmidt, Microsoft
Implementing Secure Liberty Alliance Web Services

Conor P. Cahill, Intel Corporation
Sampo Kellomäki, Symlabs
John Kemp, Nokia
Directory Infrastructure Roadmap

Overcoming Fragmented Identities – Roadmap to a reliable Directory Infrastructure

Thorsten Butschke, KOGIT GmbH
Dr. Martin Dehn, KOGIT GmbH

ppt

12:30-13:30 Lunch
13:30-16:00 Provisioning and Roles Management in MIIS Environments

Dr. Thomas V. Pind, Omada A/S

ppt
Microsoft?s Identity and Access Management Strategy

Rüdiger Berndt, Oxford Computer Group Deutschland

pdf

Authentication and authorisation in heterogeneous MS Active Directory environments

Martin Kuppinger, KuppingerCole
Andreas Luther, Microsoft
The Importance of Identity Management in a Successful SOA Implementation

John Aisien, Oracle Corporation
Stefan Dodel, Oracle

pdf

Successful CardSpace Implementation

Hands-on Windows CardSpace

Christian Arnold, A.T.E Software GmbH

pdf

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.