•  TYPE: Track    START DATE: Thursday, 05/15/2014    START TIME: 14:30    LOCATION:  AMMERSEE II

Conference Agenda


The Cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. One of the primary benefits of the cloud is that it enables companies of all sizes to focus on the differentiating factors of their business as opposed to the infrastructure required to run it. However how can organizations use cloud services in a way that balances risks with rewards. This track will describe best practices to get these benefits while controlling risks and the cloud service vendors to put on your shortlist.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • List the leading products and vendors in the Cloud Identity and Access market
  • List the important security parameters to look for in Infrastructure as a Service
  • Describe the main challenges involved in protecting data held in the cloud and how a novel approach to encryption can manages these.
  • Describe best practices for implementing the cloud to achieve real business benefits
  • List the key standards to look for when using cloud services.

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attend.


Cloud Identity & Access Management: Defining the Market

Date: Thursday, May 15, 2014 Time: 14:30-15:30

Cloud Identity & Access Management: Defining the Market
Mike Small, KuppingerCole

The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that bring a combination of directory services, user management, and access management to the Cloud. There…

One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
Don Schmidt, Microsoft • Dr. Paul Madsen, Ping Identity • Max Waldherr, Dell Software • Per Hägerö, neXus • Bart Renard, VASCO Data Security

“To cloud or not to cloud?” – this is no longer the question. It is rather to what extent and depth enterprises leverage cloud computing. With identity and access management (IAM) solutions for their internal IT systems, enterprises have achieved a high level of security, transparency and compliance. They do not want to go back to the old days of erratic and insecure identity management when they have to deal with multiple cloud providers and their proprietary user management interfaces….

Searching over Encrypted Data in Cloud Database as a Service Environments

Date: Thursday, May 15, 2014 Time: 15:30-16:30

Searching over Encrypted Data in Cloud Database as a Service Environments
Dr. Andreas Schaad, SAP AG

In this talk, Dr. Schaad will demonstrate on a working SAP HANA system that it is possible to execute arbitrary SQL directly on encrypted data in the cloud – without any intermediate decryption! Encryption keys never leave the on-premise environment and even a cloud administrator with full privileges will not be able to learn anything about the content of an outsourced business database. He will show and discuss the potential trade-offs regarding performance and functionality, but can…

Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
Mike Small, KuppingerCole • Paige Leidig, CipherCloud

Efficiency Gains in the Cloud

Date: Thursday, May 15, 2014 Time: 17:00-18:00

Efficiency Gains in the Cloud
Vladislava Toukalek, WMO

Over the past two decades IT evolved from business enabler under its own conditions (setting up the rules of the game) to the service that is expected to meet not only business but users’ demands now and here. New technologies are easily built and extended and only forward-thinking IT organizations can keep the pace and promptly prepare “defense”. Today’s work force does not only have requirements and demands, they have expectations. WMO ‘s journey to the cloud…

Embracing Cloud Services : Roadmap to Reality
Amol Sawarkar, International Federation of Red Cross and Red Crescent Societies (IFRC)

Offering cloud services has become a high-volume mainstream business these days, not only for providers, but also for consultants and architects. Amol will talk in this session aligning to his experience in various phases defining roadmap, analysing service fit, defining criteria for acquiring cloud services followed by challenges in implementation.

Quick Links

Stay Connected

.hide_price { display: none; }.show_price { display: inline; }$(document).ready(function(){ $(“button”).click(function() { $(“p”).removeClass(“intro”); }); //$(“#price_eur”).click(function (e) $(“[id^=’price_’]”).click(function (e) { var thisID = this.id; //$(this).text(thisID); $(“span[id^='” + thisID + “‘]”).removeClass(“hide_price”).addClass(“show_price”).siblings().removeClass(“show_price”).addClass(“hide_price”); });});



European Identity & Cloud Conference 2014

Registration fee:
€1980.00 €1980.00

Contact person:
Mr. Levent Kara
+49 211 23707710
  • May 13 – 16, 2014 Munich, Germany
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.