...
  •  TYPE: Track   DATES: May 11 – May 12, 2016

Conference Tracks

fotolia 84431429 m bearb

Cloud, Mobile, Social Computing and the Internet of Things and Industry 4.0 have a profound impact on IAM processes and technology, as they shift your focus from employees to external communities like customers, partners, dealers, and billions of things. On the other hand, most organizations still have a lot of homework to do for implementing and improving their fundamental infrastructures. This track explores the key concept for a future-aware IAM architecture with topics like access governance, realtime analytics, proofing, authorization, authentication, API security and privileged identities and explains how to find the balance between short-term delivery and long-term sustainability.

Some of the topics:

  • The Future Role of IAM
  • Roles, Recertification & Next Generation Access Governance
  • Authentication, Authorization & API Security

Tracks:

Digital Transformation & The Identity Challenge

Sessions:

Leading the Information Security Transformation

Date: Wednesday, May 11, 2016 Time: 11:00-12:00

Leading the Information Security Transformation
Information Security is not what it used to be anymore. The days where Information Security and IT Security were used as synonyms are past for long. Information Security has increasingly made its move to the business departments, with Information Security officers looking far more at Information Governance than at technical measures for securing information, even while they request technical measures from the IT departments. This is not the only fundamental change we observe. Business IT…

Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem
As the industry designs and deploy highly interconnected, autonomous and data-centric services, enterprises and government agencies worldwide must strike a delicate balance between the obligations of security and privacy with the continued drive towards agile, business–oriented and interconnected systems. In order to maintain that balance, we must put identity at the center of the IT ecosystem. By putting IAM at the center brings more identity awareness to operational and…

Trends & Innovation Panel: What are the most important Innovations and who are the Innovators?

Date: Wednesday, May 11, 2016 Time: 12:00-13:00

Trends & Innovation Panel: What are the most important Innovations and who are the Innovators?
Keeping track with what are the relevant trends, being able to find those (few) innovations which actually solve existing problems or create new opportunities is not so easy in these days. Yes, it is the job of KuppingerCole and all other analyst firms to find these innovators, name them and help them entering the market. But why shouldn´t we widen this perspective and ask those who have also been dealing with innovation throughout their professional career: vendors. The idea of…

The Future Role of IAM

Sessions:

How does Digital Transformation affect IDM?

Date: Wednesday, May 11, 2016 Time: 14:30-15:30

How does Digital Transformation affect IDM?
This session will take a closer look at digital transformation and IDM. First we will try to find a suitable definition for digital transformation. Then we will discuss how digital transformation affects IDM in general, to then introduce a case-study on IDM, partner and cloud-business. We will touch a simple model for cloud-business and take a look on some legal aspects. We will expand the classical IDM: first to cloud-usage, then to cloud-offerings. The second case-study will…

IAM Requirements and Trends in a Dynamic and Regulated Environment

Date: Wednesday, May 11, 2016 Time: 15:30-16:30

IAM Requirements and Trends in a Dynamic and Regulated Environment
On the one hand, cybercrime threats are growing at a fast pace and regulators are raising the requirements for IAM processes and procedures higher and higher. On the other hand, new competitors and new technologies are pushing banks to be more agile and to adopt faster, either using self-developed applications, solution providers, or cloud services. So, how can an online bank cope with these issues? What are some possible strategies to be compliant and agile with your IAM solution? In…

IAM Automation at Henkel: Identity Lifecycle Management
At the end of 2014, Henkel launched the AIM4 Future program to simplify and optimize the Identity & Access Management process and architecture landscape. One of the major targets is to automate the standard User Lifecycle process as much as possible with an end to end process view over IT, Security, HR and Financial processes, e.g. starting with HR recruitment and ending with IT workplace onboarding at day1 of an employee. Beside the technical challenges to exchange 5 tailor made…

Identity & Access Management in the Digital Age – Results of a recent Study

Date: Wednesday, May 11, 2016 Time: 17:30-18:30

Identity & Access Management in the Digital Age – Results of a recent Study
PAC and Kuppinger Cole recently conducted a survey based study on European businesses to gain insight into how digital transformation is reshaping IAM policies, procurement and deployment as well as risk and compliance policies. The top line findings of this brand new and important research will be presented in this session. What we will discuss: How the role of IAM is evolving within European businesses from ensuring compliance to managing risk and enabling new services…

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?

Authentication & Authorization

Sessions:

The Future of Authentication – Stop Sweating the Password

Date: Thursday, May 12, 2016 Time: 11:00-12:00

The Future of Authentication – Stop Sweating the Password
We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the password obsolete? There have been many announcements, that the password is dead and indeed, there have been alternatives available – but mainly as siloed non-standard approaches. Now, there is something new: initiatives like FIDO are proposing alternatives going beyond a single…

Securing High-Value Transactions and Authorizations in the World’s First Online Forestry Asset Management Service

Date: Thursday, May 12, 2016 Time: 12:00-13:00

Securing High-Value Transactions and Authorizations in the World’s First Online Forestry Asset Management Service
Metsä Group wanted to enable asset management to be accessible for their 100 000+ owner-members regardless of time or place, thereby making forest management easier. The idea was to develop a service that enabled users to handle forestry-related matters from their sofas. 30 per cent of forests have currently gone unmanaged for 30 years. This service makes forest management easier. The service enables forest owners to realise additional income worth tens of millions of euros….

OpenID Connect for Enterprise SSO
As the enterprise Identity landscape becomes more complex, it’s important to centralize the authentication and authorization functionality around a core set of APIs and services. User experience benefits as a single set of authentication credentials and policies can be applied across multiple enterprise products. As many of these products move to mobile based applications, the need for long term authorization grows and the policies around session management change. This talk will explore…

Identity Aware Cybersecurity

Sessions:

Recertifications – What’s Possible Today, Limitations and the Future Potential for Access Governance

Date: Thursday, May 12, 2016 Time: 14:30-15:30

Recertifications – What’s Possible Today, Limitations and the Future Potential for Access Governance
Recertifications are one of the established concepts in IAM today. However, you will rarely find any organization that is really happy with the way recertification works. Recertification initiatives cause a lot of work, friction, and frustration. However, the biggest challenge of recertification is that it is more than questionable whether it delivers on its target, which is is risk mitigation, concretely access risk mitigation. By running regular recertification campaigns, organizations…

Beyond Recertification
Very few Companies, if any, are satisfied with the outcomes of their Recertification efforts, because intelligence on risks come too late to be of real value. In this panel session we will discuss on how to get better and what possible alternative strategies are.  

Building structures for IAM automation

Date: Thursday, May 12, 2016 Time: 15:30-16:30

Building structures for IAM automation
Technically, automated access management based on attributes, rules and roles has become a no-brainer. But missing organizational structures and unstructured service and resource management are a barrier for tapping the full automation potential. Uncontrolled access management procedures have often led to intransparent environments where the implementation of policies is difficult. The panel will discuss where automation makes sense and where not. Clean-up strategies are discussed, and…

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections

Date: Thursday, May 12, 2016 Time: 17:00-18:00

The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections
Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror story. Many companies are missing the basic IAM best practices that can help prevent, detect and mitigate attack. In this session, SailPoint’s CTO Darran Rolls will present the anatomy of a typical…

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.