...
European Identity Conference 2010
04.05. – 07.05.2010, Munich

Moderator:

<a J�rg Asma, KPMG
<a John Hermans, KPMG
Integrated Information Security, Risk and Compliance Management at Voith IT05.05.2010 10:30-11:30
Integrated Information Security, Risk and Compliance Management at Voith IT

Rolf Strehle, Voith AG

IT Compliance and ISO 27001 Global IT-Security Strategy of Voith AG Success factor Awareness Campaign IT-Management System at Voith – field report

Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution

Darran Rolls, Sailpoint • Peter Weierich, Voelcker Informatik • Alberto Ocello, Engiweb Security • Nishant Kaushik, Oracle • Gerlinde Zibulski, SAP AG

User provisioning promised to streamline authorization processes and deliver cost benefits to IT departments. By shifting the focus from the authorization processes to access policies, the governance and compliance benefits begin to outweigh the technical benefits. This shift fundamentally changes the ROI calculation for an investment in IAM and the market will shift accordingly.

Access Governance: Tales from the Trenches05.05.2010 11:30-12:30
Access Governance: Tales from the Trenches

Drs. Dennis van Ham, KPMG Advisory N.V.

Getting in control with regard to users and their authorizations is probably one of the most mentioned goals of IAM projects in the last couple of years. It sounds good, it feels good and it fits the GRC business speak perfectly. But many IAM projects have been and probably are struggling. Execution requires perseverance and effective change management. Due to budget cuts, project scope changes and seemingly everlasting emerging technologies the desired business ability to prove being in…

Risk & Identity Services � How do they fit?

Keith Grayson, SAP

When does Identity Risk become material to the business? How do we know when such risks become realized? Where do IT GRC controls appear in a multi-level risk strategy? These are some of the questions that large organizations are starting to ask. We present some answers for debate on this topic.

Panel: Identity Management as a GRC Endpoint

Priska Altorfer, wikima4 AG • Deepak Taneja, Aveksa • Jackson Shaw, Quest Software

Ships that pass in the night, and speak each other in passing, only a signal shown, and a distant voice in the darkness; So on the ocean of life, we pass and speak one another, only a look and a voice, then darkness again and a silence.” Is this an accurate description of identity management and GRC projects? Or, are identity management and GRC projects so closely related that there are no identity management projects but just GRC projects? In this session Jackson Shaw will discuss the…

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.