...
European Identity & Cloud Conference 2014
13.05. – 16.05.2014, Munich, Germany

Moderator:

Social & Mobile Login

14.05.2014 14:30-15:30

Evaluating the Risks of Social Login

While Information Security people have been rather reluctant regarding social logins, there always has been pressure by Marketing, Sales, and Business Development departments. The reasons of InfoSec people to be more careful have been aspects such as the authentication strength and assurance of these services. Marketing on the other hand has been quaalifying this as a “must have” feature for customer convenience and to be “modern”. There is a value in BYOI (Bring Your Own Identity), enabling the customer to use one ID for multiple services, avoiding redundant registration and the “password sprawl”, requiring him keeping many passwords in mind. But unfortunately, social logins are not secure. New initiatives, namely the FIDO Alliance, are pushing more secure approaches for BYOI that can work with or without social logins.

Aside from information security aspects, there is another challenge, which so far has been widely ignored. It is the simple question: Is supporting social logins really good for business? Looking at the way the social networks operate and their business models, supporting social logins is about massively leaking information about your customers, leads and prospects to 3rd parties, like Facebook or Google, and through those possibly even to your competition. How does this influence your benefits / risk equation?

In this talk, Dave Kearns will provide a deeper look on how social logins can create competitive disadvantages and what the alternatives are to provide BYOI without the risk of leaking information to competitors.

How to Enable Social and Mobile Login � and Beyond

In this thought leadership panel, the panelists will discuss the various options for securely enabling social and mobile logins in existing on-premise IAM infrastructures and by adding Cloud-based services. Supporting these environments is a common requirement and IT organizations have to be able to react on this. They especially must support mobile security as part of this, in the context of secure access to information (and not only by protecting devices). However, today’s approaches – namely the plumb support of social logins – will face change. Thus, the panel will also look at alternative solutions on how to support BYOI – for mobile users and others. New features of mobile devices such as NFC or integrated fingerprint readers provide new opportunities for mobile security and BYOI.

Secure Mobile Access & Identity

14.05.2014 15:30-16:30

Extending Identity and Access to the Mobile World

During this panel, we will take a deep dive into the world of mobile data security with an emphasis on how enterprises data need to ensure the security of corporate data as more employees are relying on mobile devices to get their work done and access corporate data on the go.

Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World

In today’s world, more and more is moving beyond control of the enterprise. Apparent examples are the adoption of Cloud technologies, BYOD (bring your own device) and BYOI (bring your own identity). At the same time there is increased regulatory pressure and a growing internal demand for better fraud prevention and protection of intellectual property. A detective approach to access governance and the help of distributed control mechanisms can help enterprises to stay in control in this changing environment.

Enterprise Mobility Management

14.05.2014 17:30-18:30

How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem

The evolutionary nature of mobile presents a security-centric challenge for businesses with corporate content on these devices. Enterprises put themselves at risk when users access sensitive information through email and applications across smartphones and tablets, while mobile. Organizations can choose to ignore this security threat or enhance employee productivity through secure access to sensitive corporate content.

The Panelists will discuss best practices and strategies to ensure global security and workforce enablement by leveraging enterprise mobility management (EMM) across the enterprise. This session will also provide attendees with a deeper understanding of enterprise mobility within the connected ecosystem, while ensuring security and compliance in the cloud.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.