...

All our workshops take place co-located to the European Identity & Cloud Conference 2014 in Munich, Germany. European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

If you are interested in attending the Identity & Access Management Crash Course, you can easily register for this workshop.

13.05.2014 09:00-13:00

In this pre-Conference meeting, you will learn how to get the most out of EIC 2014. The conference is renowned for it�s very rich and intensive program, with 5 parallel session streams, workshops, “beer garden talks”, keynotes and round tables. Too much to follow it all – and therefore this pre-conference meeting will describe the main contents of the different tracks and help you find your individual way making sure that you take loads of information back home which will help you in solving your professional challenges.

In this pre-Conference meeting, you will learn how to get the most out of EIC 2014. The conference is renowned for it´s very rich and intensive program, with 5 parallel session streams, workshops, “beer garden talks”, keynotes and round tables. Too much to follow it all – and therefore this pre-conference meeting will describe the main contents of the different tracks and help you find your individual way making sure that you take loads of information back home which will help you in solving your professional challenges.

IAM (Identity and Access Management) is one of the key disciplines within Information Security and a key element of any IT infrastructure. IAM has evolved from administrative tools towards a business-enabling technology, the foundation for secure business processes, secure collaboration and information sharing, and the foundation for the new ABC: “Agile businesses – connected”. Enabling secure access from business partners and customers to internal applications and cloud services, onboarding internal users to new cloud applications, managing mobile access securely: All this requires IAM. Furthermore, IAM is a cornerstone for complying with regulations.

IAM is about guidelines, organization, processes – and technology. Or, correctly: A set of technologies. Understanding these technologies, their value for specific use cases, and their dependencies is mandatory for successful investment decisions. Avoiding point solutions requires a good understanding of the overall IAM big picture.

This session provides you with the information you need to understand the big picture. It explains the main terms. It provides insight into the relation of guidelines, organizations, processes, and technologies. It unveils the relationship of IAM to other IT disciplines such as IT Service Management. It dives into the various elements of IAM, from Directory Services to Identity Provisioning, Access Governance & Intelligence, Single Sign-On, Identity Federation, Privilege Management and Cloud IAM. It discusses how to extend the on-premise IAM to cover all types of users, including customers and business partners. It discusses the emerging Cloud IAM solutions and their role. It looks at how various IAM disciplines are related.

It is a crash course that gives you insight into IAM and is the perfect preparation for all the following sessions of EIC 2014.

Martin Kuppinger Martin Kuppinger
Principal Analyst
KuppingerCole

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is also a well-established speaker and moderator at seminars and…
Full bio

Continuing Education Credits

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science


After attending this workshop you will be able to:

  • Explain how Identity and Access Management has evolved
  • Describe how IAM is the foundation for secure business processes, secure collaboration and information sharing, and for the new ABC: “Agile businesses – connected”.
  • Explain why understanding these technologies, their value for specific use cases, and their dependencies is necessary for successful investment decisions.
  • Describe the relationship between the underlying IAM guidelines, organizations, processes, and technologies.
  • Be prepared to get the most value from the EIC sessions.

This workshop qualifies for up to 4 Group Learning based CPEs depending on the number of sessions you attend.

cpelogo

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office’s telephone +49 211 23707710, email: lk@kuppingercole.com

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.