European Identity Conference 2011
10.05. – 13.05.2011, Munich


<a J�rg Asma, KPMG
<a John Hermans, KPMG
Access Management: Policies and Standards12.05.2011 14:00-15:00
Access Management: Policies and Standards

Lars Hartke, KPMG

The foundation for access management are policies and standards, leading to well-defined processes for creating access controls, granting and managing access, recertification, and additional auditing processes. This session will discuss what you need as the foundation for your access management.

Building Blocks for a Complete Access Management Strategy and Implementation

Martin Kuppinger, KuppingerCole • Stefan Dodel, Oracle • Heinrich Wilking, Turnkey Consulting • Maarten Stultjens, BHOLD Company B.V.

This session will discuss the elements required to fulfill regulatory compliance as well as administrative requirements. Access Management, especially in virtualized and cloud environments, needs a set of technologies which have to be well integrated. Access Governance, Provisioning, PxM (Privileged Access, Account, Identity, User) Management and as well SIEM play a vital role. But there are links to virtualization security products, web access management and versatile/risk-based…

Enabling the Access-Aware Organization12.05.2011 15:00-16:00
Enabling the Access-Aware Organization

Martin Kuppinger, KuppingerCole

Defining policies and standards and rolling out technology is one thing. But getting the organisation to really use them is the key to success. This is about building the organizational departments you might miss today, this is about defining roles and competences together with the business, this is about implementing and running the entire access management strategy.

Establishing an IT Governance Framework

Prof. Dr. Sachar Paulus, KuppingerCole

Access Management Best Practice: Fiducia12.05.2011 16:30-17:30
Access Management Best Practice: Fiducia

Marek Chroust, COGULA Management Consulting • Armin Sch�nherr, Fiducia

The German Telecommunications Act (TKG) and the German Banking Act §44 (Kreditwesengesetz) requires a set of GRC rules to be met by every financial organization, like banks, insurances and even their respective IT service providers. In addition to that, many organizations are facing potential risks, from outside the organization as well as from inside. In 2010, Fiducia IT AG initiated an initiative in order to meet GRC requirements regarding its data. One of these requirements…

Lessons Everyone Should Learn from the Finance Industry

Martin Kuppinger, KuppingerCole

The Finance industry currently is the industry with the strongest regulatory pressure. But others aren’t that far away – think about utilities, think about the eGovernment or healthcare. And the ones who don’t feel under pressure yet: This will happen. Incidents like Wikileaks (threatening non-governments right now), information theft and the generally increased awareness will change what organizations have to do. Thus it is time to understand why and how you should act to be ready before it…

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.