...
Mike Small�s Keynote at EIC 200821.05.2008Joerg Resch
If you put together 40 years of experience in computer industry, an extra portion of extra-dry British humor and excellent thought leadership, you�ll get the right mix to really understand, wether Security, Privacy and Trust are a mission impossible. Thank you Mike Small (CA) for this great keynote. Read the article
Marne Gordan�s Keynote at EIC 200821.05.2008Joerg Resch
Marne�s brilliant keynote on the 32 Billion $ (2008) GRC Market. Talking about some famous examples in finance and health industries, she reminds us, that it is all about human behavior, when it gets down to the question, why GRC is so important. Read the article
Finance Industry – Quo Vadis?31.01.2008Joerg Resch
Just as a reminder: A bank�s business model usually is, to take risks and to get paid for doing so. If a bank takes the role to pay for risks taken, the business model is broken and this will let such an institution disappear from the market. IT infrastructures have to be built in a way that they flexibly support the business model. Therefore, a bank�s IT-infrastructure should be capable of making risks transparent and manageable. External risks and internal ones. The case of Soci�t� G�n�rale shows, how vulnerable financial institutions are against inadequate internal oversight caused by a missing end-to-end view on identities. Read the article
Congress: European Identity Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Conference: Governance, Risk Management & Compliance (GRC) Forum 2008 18.11. – 19.11.2008 , Frankfurt am Main
Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto h�her die Aufw�nde (und Kosten) f�r Compliance. F�r die erfolgreiche Einf�hrung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten Identity Management Strategie darauf auszulegen, aussagekr�ftige Informationen zur Verf�gung zu stellen, und andererseits durch einen Risk-orientierten Compliance-Ansatz die Kunst der Beschr�nkung auf das Wesentliche zu �ben. Die Kuppinger Cole Governance, Risk Management & Compliance (GRC) Jahresveranstaltung 2008 fokussiert Strategien und Vorgehensweisen, Technologien und Werkzeuge, die Ihre Unternehmensf�hrung in die Lage versetzen, wettbewerbs- und kostenrelevante Entscheidungen in Kenntnis aller wesentlichen Informationen und Risiken zu treffen – ohne dass Ihre Compliancekosten ausufern. Information
Physical-Logical Convergence23.04.2008 11:30-12:30Satel J. Naik, City College Coventry Ralph Seinsche, HID Global
View details
How to avoid internal Fraud I23.04.2008 15:00-16:00Terry Schoen, Entrust Jaap Scheepstra, IDMpartners Marc Hudavert, ActivIdentity Calum MacLeod, Cyber-Ark Jackson Shaw, Quest Software Berthold Kerl, Deutsche Bank AG David Ting, Imprivata
Most financial institutions nowadays have sophisticated risk management tools in place, maybe even profiling traders and their habits, searching email traffic for keywords which might be worth checking for fraudulent activities, and much more. But what sense would all that make, if authorizations and priviliges are not provisioned or, more important, de-provisioned in time, and if access to internal applications is not secured with strong authentication and even biometric identification? If banks don’t leave the doors of their bullet-proof safes open – why do they leave access to applications open, where billions of Euros can be moved to places where they are not supposed to be moved to? Cases like the recent one at Société Générale show that internal risks can only be kept at a manageable level through an integrated Enterprise GRC & Identity Management strategy. This panel will highlight and discuss various types of internal threats and mark the… View details
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.