06.05.2015 11:00-12:00

European Identity & Cloud Conference 2015
Combined Session


What are the Requirements for your Future IAM to Enable Digital Security?

When it comes to security for the digital enterprise, we have good reason to get nervous, understanding current breaches like Sony as the first signs of a dark future, where cyber criminals and even terrorists lurk and create serious damage. In this session, Martin Kuppinger will first define, what “digital security” means, what the real risks are that need to be faced and mediated, and which roles IAM will play in this context.  

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom

Understanding the criticality of IAM infrastructure (delivered as software or as a service) and securing the service and its lifecycle.

The Role of IAM in Hack Prevention

As witnessed by a seemingly non-stop onslaught of public breaches of prominent organizations (Sony, Anthem, Target, etc.), it appears that the gloves have come off in the battle being waged in cyberspace. Nations have become heavily involved in industrial hacking for the purpose of enriching their government-owned enterprises. Hacktivists are out in force to publicly expose and shame corporations for perceived public wrongs. Unfortunately, Enterprise IT is caught in the middle and must defend from, detect, and respond to these threats. This session will discuss the role of IAM in preventing breaches, limiting their scope, and permitting faster detection and response.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.