14.05. – 15.05.2014
- Challenge the vendors in a relaxed atmosphere
- Short-track presentations held by vendors describing their approach on how to solve your critical business challenges.
- Directly and intensively discuss right after a presentation
- Placed around the breaks of the main agenda tracks and in the later afternoon
- Connect to vendors intensively and make maximum use of your time while still having the opportunity for some coffee and drinks.
Please note that presentations and other event materials are available only to registered participants.
You need to log in to be able to download them.
|Beer Garden Day I
|Dealing with Device and User Diversity
Facilitating secure access to employees, partners and customers using applications of all sorts from devices of all kinds (all kinds of terminals) is the theme of NetIQ’s beer garden session – come see how their solutions address your Identity security needs through the entire user life cycle and multiple digital personae in the Internet of Everything.
|IAM as a Service
An effective Identity & Access Management (IAM) is not luxury anymore. For many companies, IAM has become one of the key systems and therefore needs accurate attention from the Management as well as a professional support. The Identity & Access Management Processes has to be designed and established in a way it secures all Compliance requirements, without disturbing the daily business. Like a referee, IAM should intervene as soon as the daily business does not comply with the defined rules anymore(infraction). IAM keeps everything in order without changing the outcome of a game.
|Data Centric Security – A Business Focused Approach
Security needs to be viewed from a different perspective. The way we manage for years Security for the business is no longer working and is a lost battle against the complexity of the Business usage, IT means and the threats that get introduced on a daily basis. Going back to basics will help us to be more effective for our business. During the speech we will highlight the approach and solutions that can be taken.
|IAM Today – the Evolvement of Requirements
Pascal will share his experience over the last years about the shift of the customer needs and how vendors had to adapt.
|Crowd-Source your Data Protection
The volume of data companies produce has spiraled out of control. IT security is under ever-increasing pressure to deliver secure data governance, often with minimal resources. The larger the organization, the greater the data sprawl. WhiteOPS™ crowd-powered solution educate employees about the critical need for data governance by making them a part of the process.
The people who create the information know it best, so we’ve created crowd-sourced employee-focused product to leverage employees’ collective intelligence in order to protect the organizational sensitive information. The new solution also relieves IT of the unmanageable burden of having to protect all the organizations’ data by itself.
Join us in this beer garden session to find out more about our crowd-powered data governance solution.
|Making Big Data Useful – the Users Journey to Securely Accessing Secure Information
Everyone is talking about big data but for the consumers of information what does that really mean? How can an organisation protect its data assets and ensure that users only see what they should see based upon their role, entitlements, attributes and the context inwhich the information is being consumed? Add the demand of leveraging big data through apps and mobile devices where is the new security boundary?
|Detect and Defend Privileged Threats
Today’s Cyber-attacks are all about exploiting privileged accounts – just because it is so simple… as simple it is to take better control on the usage of these. Even now the breach of cyber-attacks has changed from external to internal it is easy to protect your privileged accounts. In this session you will hear how to detect, alert and stop in-progress attacks with CyberArk Privileged Threat Analytics.
|5 Ways to Stop Insider Threats
In a recent study, 460 employees admitted to stealing confidential data from their work place. Join Thycotic for an interactive, hands-on demo and learn how to stop an insider from taking down your organization.
|Empowering the Mobile Enterprise
AirWatch is the world’s leading mobile security and enterprise mobility management provider with more than 1,600 employees across nine global offices. More than 10,000 organizations in 150 countries leverage the AirWatch® Enterprise Mobility Management Platform, which includes industry-leading mobile device, email, application, content, laptop and browser management solutions. Organizations can implement these solutions stand-alone for unique bring your own device requirements, in AirWatch® Workspace containerized solution, or as a comprehensive, highly scalable, enterprise-grade mobility platform. With the largest research and development team in the industry, AirWatch ensures the broadest mobile platform support, develops innovative solutions like AirWatch® Secure Content Locker™, and integrates with the leading device manufacturers and technology solution providers in the mobile ecosystem.
Dominic Schmidt-Reiche, enterprise account executive at AirWatch, will discuss how AirWatch is enhancing and securing the mobile enterprise and the benefits that our solutions will provide to empower your workforce.
|Secure Collaboration and Web Governance: How does this fit in with IAM?
AdNovum’s Nevis security and compliance suite is used by renowned institutions and companies in Switzerland and abroad to protect mission-critical online services. The Nevis suite has a modular architecture and covers all functional aspects of a modern IAM suite, including WAF (Web Application Firewall), versatile authentication, identity management and federation and provisioning functionality.
However, as more and more critical business processes are shifted to the online channel, new requirements arise: How should comprehensive online support be implemented in security sensitive areas, where the use of common screen-sharing techniques is no option? How do you provide governance and non-repudiation on the web channel for personalized content and web transactions?
Stephan Schweizer, Nevis Product Manager, will show how an IAM infrastructure can be leveraged to cover these specific needs in order to provide added value to business.
|Beer Garden Day II
|Identity Management in Hospitals – Is it Different?
Today, there are hospitals with 100 % of the patient data stored electronically (instead of paper based, as before). But most hospitals in Europe lack a proper IAM solution. Why is this the case? And what are the upcoming trends like mobile computing in the hospital or “consumer IAM”: An intensified communication of hospitals, practitioners and patients.
|Simple and Secure Access to Cloud-Based Services
Managing access to your critical data is key. At the same time Cloud is becoming more and more prevalent as business strives to cut costs & improve agility. An important factor to consider here is how to control the risk of having your data reside outside your internal infrastructure? NetIQ has a solution that ensures only authorized users are able to access sensitive or regulated information and prevents corporate credentials from being stored out in the cloud.
|How inSync Protects Data in Real-World Use Cases
|Customer Identity Management Survival Guide
Managing customer identities is much harder than it might look. The basic principles that guide the management of any kind of identities are the same. But the devil is in the detail. Scalability, flexibility and especially deployment efficiency are the crucial elements of success. But these are not the usual traits of identity management software. Customer identity management can easily turn into a very expensive nightmare. Not doing it at all is usually not an option as today it is almost impossible to find a company that does not provide electronic services to customers. It just has to be done. And it has to be done quickly. What was almost impossible to do a couple of years ago is quickly becoming a “must have”. But how to make the management of huge number of customer identities practical and especially economically feasible? How does access management, federation, directories and provisioning all fit together to create an efficient customer-oriented solution?
|Banking in an Online and Mobile World
In the last 12 months 81% of households have used online banking and 19% of households have used a mobile app to do their banking. Acceptance of online banking and smart devices are becoming ubiquitous. This trend gives opportunities for banks to tap into new client sources and serve clients 24/7 wherever and whenever while lowering costs for staff and physical offices.
The two biggest challenges in optimising the mobile and online banking experience is user-friendly-but-secure authentication and user-friendly-bug-secure-onboarding. Overcoming these challenges results in getting more clients and more transactions
Everett will demonstrate how we can achieve a seamless experience for KYC compliant online-client-onboarding and user friendly banking-grade mobile authentication for both Online and Mobile banking.
|Bringing Convenience to the Secure Access to Online Channels
Nowadays, authentication is the key to the security of your valuable information assets.
|Is the Importance of Multifactor Authentication Delivery Models Overrated?
Strong authentication is becoming more ubiquitous, more commoditized and more heavily consumed within the enterprise and beyond. This begs the question: Is the commoditization and consumerization of authentication driving the adoption of cloud-based authentication services, or is authentication as a service a natural outcome of increased cloud adoption? To what extent do authentication delivery models affect enterprise security strategies and impact on service provider business models. Lastly: Are the capabilities of authentication solutions inherent to the delivery model, and if so, what are the capabilities that will trigger wide-scale adoption?
|Effective Data Cleaning and assigning accounts as a fast entry into Compliance and Identity Management
Besides all the new trends in the area of identity and access management, every project starts with data quality issues. Questions like “What accounts, roles and entitlements are still valid?”, “Who is the owner of that accounts”, “Who is responsible for those service account?” need to be answered to have a realistic starting point of all identity management projects. Instead of using Excel, we show ways how to increase data quality, remove orphaned accounts and distribute the burden of cleaning to the natural responsible person in different areas and make live of those persons easier. Based on the Omada Identity Suite we will show an example, how it also could work in your company.
|User Centric Secure Mobile Access
Areas such as mobility and security are high on the agenda for most businesses today with challenges how to achieve user friendly security for email and products such as Microsoft Lync on mobile devices. A good mobile security strategy has to originate from users and business, not from technical products that solve a subset of the overall need. PointSharp is a Swedish company that develops products for mobile secure access and will give a short introduction how their products provide a user centric secure mobile access strategy supporting a mobile workforce.