<a Tim Cole, Kuppinger Cole + Partner
- What Does The Auditor Want To See? (I)09.05.2007 11:00-12:00
- IT Compliance and AuditingWhat exactly do auditors expect from corporate IT? Which measures will help the company to achieve a clean bill of health from their assesor? This German-language panel will provide practical suggestions and insights into the way auditors assess IT security and compliance issues.
- What Does The Auditor Want To See? II09.05.2007 12:00-13:00
- IT and Basel II: Is IT Security already a rating factor?With Basel II banks and other financial services are required to examine all possible risk factors before grating loans to companies and organizations. In theory, at least, these include IT security and IT compliance. However, most banks lack quaified personnel to perform such checks. What must banks do to make sure they aren’t overlooking important risks? How can companies increase their credit worthiness by investing in IT security and identity management?
- Legal Issues for Identity Federation09.05.2007 14:00-15:00
- Legal framework for identity federation in Germany and EuropeThis German-language presentation will cover the major regulatory systems and give a preview of possible new and stricter rules and laws being prepared by the German federal government and by the EU.
- Outsourcing09.05.2007 15:00-16:00
- Compliance & IT OutsourcingHow do you remain compliant if your IT is suddenly being run in Bangalore? What are the issues in cross-border projects? Which best practices should companies follow is choosing an outsourcing partner? What are the threats, the opportunities?
- Entitlement Management09.05.2007 16:30-17:30
- Enterprise Entitlement Management – Simplifying Management of Complex Authorization PoliciesEntitlement is one of many new buzzwords in the identity field, promising to offer the next layer of protection for applications in an Internet environment with much more fine-grained security through enterprise entitlement management, or EEM. KCP believes that the industry is heading toward implementing centralized services that are able to process complex and lengthy decisions so a business application doesn’t have to incorporate all this internally. EEM can automate such tasks as…