...
European Identity & Cloud Conference 2013
14.05. – 17.05.2013, Munich/Germany

Moderator:

Clearly, there is a trend towards strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. It is all about understanding the bigger picture. Look at this to understand the future of authentication and authorization, not at a point approach.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science


After attending this block you will be able to:

  • List the important approaches to consider when looking at the future of authentication and authorization in your organization.
  • Describe how cloud-based authentication delivery models will affect enterprise security strategies and what the ultimate authentication service should offer.
  • Describe the concepts of Versatile Authentication, Risk- and Context-Based Authentication and explain why these are important.
  • Describe the relative merits of using Authoritative Identity vs Social Footprint as a way of identifying people accessing services via the internet.
  • Describe how a project achieved more thorough integration of backend transactional systems with IAM, with a focus on real-time compliance analysis and SAP access management.

This block qualifies for up to 2.5 Group Learning based CPEs depending on the number of sessions you attend.

The Future of Authentication and Authorization

16.05.2013 14:00-15:00

The Future of Authentication and Authorization

Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. It is about understanding the bigger picture. Look at this to understand the future of authentication and authorization, not at a point approach.

Is it Time to say Goodbye to Old-School Authentication Delivery Models?

Strong authentication is becoming more ubiquitous, more commoditized and more heavily consumed within the enterprise and of course beyond. This session will discuss the inter-connection between these trends, the cloud-social-mobile computing troika and the way strong authentication is delivered. Is the   commoditization and consumerization of authentication driving the adoption of  cloud-based authentication services, or is authentication as a service a natural outcome of increased cloud adoption? How will cloud-based authentication delivery models affect enterprise security strategies and impact on service provider business models. Lastly, what does the ultimate cloud-based authentication service offer and what are the capabilities that will trigger wide-scale adoption?

Context Based Authentication

16.05.2013 15:00-16:00

Versatile Authentication, Risk- and Context-Based Authentication: Why you need these Concepts

Versatile Authentication, i.e. the ability to flexibly use and combine different authentication mechanisms, and risk-/context-based authentication and authorization are key technologies for not only the future IAM infrastructure, but your future Information Security approach. This session will explain these concepts and how they help to solve business challenges like social logins, access from mobile devices, etc. The session provides an overview of these technologies and insight into the vendor markets, for both on-premise and cloud solutions.

Authoritative Identity vs Social Footprint – Identity�s “The Tortoise and the Hare”

While authoritative sources of identity information support the mainstream use case for identity proofing and subsequent credential binding to authenticate to an online service, there is a large proportion of the online population who are excluded because they have no social footprint – younger people and students, recent immigrants and so on. Applying Big Data capabilities to the social networking spaces offers up a social footprint that some might consider “good enough” for a low risk transaction. But how far could it be taken? Is there a case for using a dynamic social footprint instead of a traditional static authoritative source for higher risk transactions? This panel comprises experts on both sides of this divide, and is sure to offer robust and entertaining debate.

Hartmann AG: Focussing on Realtime Compliance Analysis and SAP Access Management.

16.05.2013 16:30-17:30

Hartmann AG: Focussing on Realtime Compliance Analysis and SAP Access Management.

Where classical Identity Management (IdM) seems to get more and more a commodity, a convincing and userfriendly Access Management and Compliance Integration seems still to be more a vision than reality. With our current project at Paul Hartmann AG we will show you our path into a more thorough integration of backend transactional systems with IAM, focussing on realtime compliance analysis and SAP access management. Our aim is to make requests and approvals not only a good solution for to the usual IT- and Compliance suspects but especially acceptable for the true owners of identities and authorizations, the process owners in the departments.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.