...
  •  TYPE: Track   DATES: May 11 – May 12, 2016

Conference Tracks

fotolia 99489146 m beab

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk mitigation requirements for commercial transactions, the relationship with secure payments, customer retention, new business models and thus new requirements for interacting with customers: The challenge has never been that big. The glue is the identity. If you know your customer and manage one consumer identity, you can solve your business challenges. This requires new ways for managing identities, the sweet spot for Cloud IAM. It requires integrating all customer-related information, from all sources – one identity, one view on the consumer. It requires adaptive authentication for balancing convenience and security. And it requires a well thought-out approach towards security and privacy to mitigate the reputation risks.

Topics in this track:

  • Scaling Your IAM: Dealing with millions of users and billions of things
  • One view on the customer/consumer
  • Big Data & Privacy by Design

Tracks:

Big Data in Information Security

Sessions:

Big Data in Information Security: Results from a recent Study

Date: Wednesday, May 11, 2016 Time: 11:00-12:00

Big Data in Information Security: Results from a recent Study
BARC and KuppingerCole have jointly conducted a study on Big Data in Information Security, building on three well-received BARC surveys in recent years: “Big Data Use Cases”, “Big Data Analytics“, and “Big Data Survey Europe“. While the previous surveys focused on big data analytics in general, this survey concentrated on security use cases of big data analytics in information security and fraud detection. The survey examined a number of areas…

Fraud Management vs. Security? Risk, Fraud, and Security!

Date: Wednesday, May 11, 2016 Time: 12:00-13:00

Fraud Management vs. Security? Risk, Fraud, and Security!
As of now, Fraud Management and Security, including Real Time Security Intelligence (RTSI) and advanced security and threat analytics are commonly segregated from each other. While this at first glance makes sense, given the different corporate buyers, there are three good reasons for a more integrated perspective. On is that the underlying analytical technologies are vastly the same. It is about machine-learning and pattern-based analytics, helping better protecting organizations against…

Cloud Identity & Security

Sessions:

Cloud Risk and Opportunity

Date: Wednesday, May 11, 2016 Time: 14:30-15:30

Cloud Risk and Opportunity
Using cloud services provides new opportunities and introduces new risks. In this presentation Mike Small Senior Analyst will describe some examples of how organizations are using cloud services and guide you through the risks that need to be managed.

Best Practice: OSRAM’s way to a Private Cloud

Why Certifications for Cloud Providers are Necessary: Real Cases in Italian Pubblic Administration

Date: Wednesday, May 11, 2016 Time: 15:30-16:30

Why Certifications for Cloud Providers are Necessary: Real Cases in Italian Pubblic Administration
Alessandro will walk with you through two different Cloud Best Practices: Ministry for Italian Education and Universities Italian Railways, demostrating that certification is essential for security issues and to assure the requested service levels

IDaaS in Digital Learning at ThiemeMeulenhoff
In education there is an increasing shift towards digital learning resources, called e-learning. Digital learning resources offer a lot more flexibility than traditional study books. Immediate feedback, customization, and integration of multimedia and web links are just a few of the advantages. More important, e-learning offers the possibility of personalization, in which the digital learning resources keep pace with the progress and the talent of pupils and students. ThiemeMeulenhoff…

Provably Secure Data Protection in the Cloud

Date: Wednesday, May 11, 2016 Time: 17:30-18:30

Provably Secure Data Protection in the Cloud
Unencrypted personal data accessed by a single hack impacted over 36 million users, resulting in personal loss, shattered reputations and costing millions of dollars! Organizations must move forward beyond traditional network security to protect all of their data. Come and learn how a revolutionary game-changing and ‘Provably secure’ technology is re-inventing the way cloud data security is designed and implemented Key Takeaways: The paradigm of data security is evolving beyond…

Using Metadata to Effectively Secure Cloud Content
As more and more organizations are investigating cloud storage solutions and how/when to move some of their data to the cloud, the question about how to manage data in a hybrid environment – a combination of on prem and cloud storage – is becoming more and more frequent, and we know that this will continue to increase over the coming years. This leads to the concern of how to bridge the gap between on prem DLP systems with cloud-based CASBs, and how data classification and…

Identity at Scale: Managing Millions of Users and Billions of Things

Sessions:

Identity 1.0 & 2.0 are dead, long live Identity 3.0

Date: Thursday, May 12, 2016 Time: 11:00-12:00

Identity 1.0 & 2.0 are dead, long live Identity 3.0
We all know that Identity in the digital world is broken; and has been for some time. Passwords are well beyond their sell-by date, yet are still the only realistic game in town. Meanwhile Spam, Fraud, Phishing and Cyber Crime succeed by being able to steal identities and impersonate individuals. Credit Card fraud has hit an in excess of thirty billion US dollars per annum. To date, all attempts of national or commercial solutions have started with grand intentions and then either failed…

New Tools & Rules in Internet Identity Management: Navigating a Zero Trust World
The world of identity management changed forever on June 10, 2013 with the introduction of the Zero Trust architecture approach. First proposed by Forrester Research, this new “best practice” has “never trust, always verify” as its guiding principle. It takes the old model—”trust but verify”—and inverts it. As recent breaches have proven that when an organization trusts, it doesn’t verify. Something is fundamentally broken in the world of information security. Despite…

Go Live: UK’s new Digital Identity Service.

Transforming Public Services with Attribute Exchange

Date: Thursday, May 12, 2016 Time: 12:00-13:00

Transforming Public Services with Attribute Exchange
UK local authorities are moving to digital service delivery to improve customer service and make significant cost savings. Identity assurance and attribute provision are key tools to unlock the full potential of digital and transform the way services are delivered to citizens. This presentation will show how UK local and central government are collaborating to develop effective ways of sharing personal data attributes to make public services more streamlined and easier for citizens to…

The Shared Opportunity for Managing European Moving Workforce Identities
In Europe the moving workforce is a reality – particularly in the construction industry – and there is vast business potential in the integrated handling of associated identity-management services. Kaius and his team are unlocking this potential with a platform they have developed called QVARN. Based on GLUU open-source access management, QVARN already houses the identities of more than one million construction workers across Sweden, Finland and the Baltics. And Kaius envisions…

Managing Privileged Users

Sessions:

Understanding Privilege Management: What do you need first?

Date: Thursday, May 12, 2016 Time: 14:30-15:30

Understanding Privilege Management: What do you need first?
Privilege Management, also referred to as Privileged Account Management (PAM), Privileged Identity Management (PIM) etc., is still an unsolved issue in the vast majority of organizations – despite the massive risk that can be caused by privileged users, be it by fraudulent behavior or because these accounts have been hijacked. On the other hand, the multiple facets and elements of Privilege Management make it difficult to identify the best starting point. Matthias Reinwarth will give…

The Privilege Management Market 2016: KuppingerCole Leadership Compass
In this presentation, Martin Kuppinger will give an overview about the Privilege Management market and the players therein, based on the current KuppingerCole Leadership Compass Privilege Management.

The Future of Privilege Management: Suites? Analytics? Embedded?

Date: Thursday, May 12, 2016 Time: 15:30-16:30

The Future of Privilege Management: Suites? Analytics? Embedded?
Privilege Management has evolved from a small niche market to a respectable market segment, with some vendors already being publicly listed companies. Many vendors have extended their product portfolio from specific solutions for certain use cases towards suites. Others focus on innovative areas such as Privileged User Behavior Analytics. Some vendors also focus more on embedding Privilege Management into their overall IAM suites, understanding Privilege Management as an integral part and…

How to avoid your Privilege Management project from stalling

Date: Thursday, May 12, 2016 Time: 17:00-18:00

How to avoid your Privilege Management project from stalling
Best practices and a staged approach for your Privilege Management project Matthias Reinwarth will look at the reasons for stalling Privilege Management projects. Aside of the standard challenges of projects involving a lot of different parties (such as Windows administrators, UNIX/Linux administrators, and network operators) and the technical complexity, he will particularly emphasize four areas. The first is the business case for Privilege Management. Second is the organizational…

Lessons learned from customer projects: How to support the customer?
In this panel, vendors and integrators will discuss their lessons learned from customer projects and how they help and educate their customers to avoid stalling projects.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.