- TYPE: Combined Session DATE: Wednesday, 05/14/2014 TIME: 11:00-12:00 LOCATION: AMMERSEE I
Agility is a key capability of successful organizations. Agility is the ability to quickly adapt the organization and the business model to new customer demands, innovations, and a changing competitive landscape.
We live in a time where virtually all business relies on IT. Whether this is retail, finance, or life sciences – business requires IT. The consequence is, that IT has to support business agility. No IT agility = no business agility.
One of the biggest changes we are currently observing is the evolution from stand-alone to connected businesses. New collaborative business models, tighter and more flexible integration of customers and business partners, and the upcoming IoEE (Internet of Everything and Everyone) are driving the evolution of businesses.
Cloud Computing, Mobile Computing, and Social Computing, the so-called “Computing Troika”, are already consequences of the business demand for agile and connected IT.
The challenge in this evolution is finding the balance between the business demand for agility and connectivity on the one hand and the IT and Information Security requirements on the other. Information Security can no longer think in terms of perimeters, devices, and system security. Martin Kuppinger will talk about business demands, opportunities and what to do in IT in general and Information Security in particular to support the business perfectly well.
Secure access to Cloud services, on-boarding of external partners, access to collaborative industry networks and business partner applications: Securely enabling the “Computing Troika” of Cloud, Mobile and Social Computing is a must for any organization. Managing the identities and their access is a cornerstone therein. Is Cloud IAM the only answer on that challenge? What does it then need in Cloud IAM? How to integrate with the IAM you run on premises? And what else does it need for supporting the new ABC? Is this about an “API Economy”? And how to then secure machine-to-machine communication? Many questions. The panelists will provide answers.