<a J�rg Asma, KPMG
<a John Hermans, KPMG
- Integrated Information Security, Risk and Compliance Management at Voith IT05.05.2010 10:30-11:30
- Integrated Information Security, Risk and Compliance Management at Voith ITIT Compliance and ISO 27001 Global IT-Security Strategy of Voith AG Success factor Awareness Campaign IT-Management System at Voith – field reportPanel: The Next Step of User Provisioning: Identity GRC as a Natural EvolutionUser provisioning promised to streamline authorization processes and deliver cost benefits to IT departments. By shifting the focus from the authorization processes to access policies, the governance and compliance benefits begin to outweigh the technical benefits. This shift fundamentally changes the ROI calculation for an investment in IAM and the market will shift accordingly.
- Access Governance: Tales from the Trenches05.05.2010 11:30-12:30
- Access Governance: Tales from the TrenchesGetting in control with regard to users and their authorizations is probably one of the most mentioned goals of IAM projects in the last couple of years. It sounds good, it feels good and it fits the GRC business speak perfectly. But many IAM projects have been and probably are struggling. Execution requires perseverance and effective change management. Due to budget cuts, project scope changes and seemingly everlasting emerging technologies the desired business ability to prove being in…Risk & Identity Services � How do they fit?When does Identity Risk become material to the business? How do we know when such risks become realized? Where do IT GRC controls appear in a multi-level risk strategy? These are some of the questions that large organizations are starting to ask. We present some answers for debate on this topic.Panel: Identity Management as a GRC EndpointShips that pass in the night, and speak each other in passing, only a signal shown, and a distant voice in the darkness; So on the ocean of life, we pass and speak one another, only a look and a voice, then darkness again and a silence.” Is this an accurate description of identity management and GRC projects? Or, are identity management and GRC projects so closely related that there are no identity management projects but just GRC projects? In this session Jackson Shaw will discuss the…