small254.per Mike Small
Information Security Management Advisor, Fellow Analyst

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA’s security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA’s current IAM product line. He is a frequent speaker at IT security events around EMEA and contributor to the security press.

With over 40 years in the information technology industry Mike’s experience covers the leading edge of information systems technology and exploitation. Mike began his career with International Computers and Tabulators (which later became International Computers Limited), where he was the leader and architect for a number of leading edge information technology development projects ranging from system software to artificial intelligence.

Mike is a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.


European Identity & Cloud Conference 2015
06.05.2015 11:00-12:00 Cloud Identity & Security
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
06.05.2015 15:30-16:30 Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
Cloud Risk Assessment – An “Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.
07.05.2015 14:30-15:30 IoT/OT Privacy & Security
Security and the Internet of Everything and Everyone
08.05.2015 09:00-12:30 Cloud Risk Assessment Дальше
European Identity & Cloud Conference 2014
14.05.2014 14:30-15:30 Social & Mobile Login
Evaluating the Risks of Social Login
15.05.2014 12:00-13:00 Software Defined Infrastructures – Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
15.05.2014 14:30-15:30 Cloud Identity
Cloud Identity & Access Management: Defining the Market
15.05.2014 15:30-16:30 Cloud Encryption
Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
16.05.2014 09:00-12:30 Negotiating the Cloud Standards and Advice Jungle Дальше
16.05.2014 13:30-16:00 Internet of Everything and Big Data: Benefits and how to Manage Risk Дальше
Cloud Provider Assurance Workshop
17.05.2013 09:00-10:30 Introduction to cloud services Дальше
17.05.2013 11:00-12:30 Cloud Provider Selection Дальше
17.05.2013 13:30-14:30 Cloud Provider Assurance Дальше
European Identity & Cloud Conference 2013
16.05.2013 10:30-11:30 Big Data Opportunities and Risk
Big Data – the Need, the Opportunities
16.05.2013 11:30-12:30 Smart Data
Information Stewardship: What does it mean for Big Data?
16.05.2013 16:30-17:30 Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
European Identity & Cloud Conference 2012
17.04.2012 09:00-13:00 OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough? Дальше
19.04.2012 10:30-11:30 Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure – from Planning to Administration
19.04.2012 14:00-15:00 Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Secure Online Identity with Cloud Identity and Privacy Services
19.04.2012 16:30-17:30 Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
European Identity Conference 2011
11.05.2011 14:00-15:00 Securing the Cloud, Preventing Lock-in – Are Open Cloud Standards the Answer? Дальше
11.05.2011 15:00-16:00 Cloud Provider Assurance Metrics Дальше
12.05.2011 10:30-11:30 Finding the Right Approach to Cloud Governance Дальше
13.05.2011 09:00-12:00 Information Security in the Cloud Дальше
European Identity Conference 2010
04.05.2010 09:00-13:00 Cloud Computing – Answers to 10 Security Questions you Should Ask Дальше
05.05.2010 14:00-15:00 Cloud Computing – Identity and Security Smog? Дальше
06.05.2010 10:30-11:30 Identity Issues of Virtualization Дальше
European Identity Conference 2009
06.05.2009 08:30-09:00 Risk, Reward and Compliance in Challenging Times Дальше
06.05.2009 15:00-16:00 Is the IAM Focus of Today’s GRC Platforms Sufficient? Дальше
2nd European Identity Conference
23.04.2008 16:30-17:30 Vendor Panel: Picking the Right Federation Software Дальше
23.04.2008 18:00-18:30 Security, Privacy and Trust – Mission Impossible? Дальше
24.04.2008 16:30-17:30 Security by Design – Externalizing Authentication and Authorization Дальше


European Identity & Cloud Conference 2015
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Дальше
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility Дальше
Securing Operational Technology (OT) and the Internet of Things (IoT) Дальше
European Identity & Cloud Conference 2014
IAM Infrastructure Trends & Concepts Дальше
Mobile Security Дальше
Secure Cloud Дальше
European Identity & Cloud Conference 2013
Cloud Governance Дальше
Cloud Provider Assurance Workshop Дальше
Managing Identities and Access to Information for Cloud, Mobile and Social Computing Дальше
European Identity & Cloud Conference 2012
Cloud Identity & Access Дальше
Cloud Security Дальше
Cloud Security Дальше
European Identity Conference 2011
Cloud Security Дальше
Cloud Standards Adoption Дальше
Directories & Federation Дальше
European Identity Conference 2010
Cloud Computing: Compliance & Security Дальше
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.