...
European Identity & Cloud Conference 2015
05.05. – 08.05.2015, Munich, Germany

调节者:

The convergence of Cloud, Mobile & Social, together with the digital transformation of enterprises, is creating a complex new landscape of challenges, which is dominated by many-to-many relationships. 

Forever gone now are the days where Information Security used to be seen as a primarily technical matter. Identity & Access Management (IAM)  today first and foremost is an organizational challenge and is in need for a leadership that understands the governance approach to meet the challenges of digital risk. This track will help you prepare for the digital transformation to many-to-many multi-channel and billion-device IAM.  

After attending this block of sessions you will be able to

  • Describe the term “Digital Security” and the role of IAM in this context.
  • Discuss the role of IAM in Hack Prevention.
  • Discuss strategies on how to make IAM successful in your organization.
  • Describe the concept behind the FIDO protocol and understand the benefits the FIDO
  • standard can create inside and outside the enterprise.
  • Discuss the major uses of Privilege Management.
  • List the challenges faced by performance and data models in a hyper-connected environment

This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attended

Security for the Digital Business

06.05.2015 11:00-12:00

What are the Requirements for your Future IAM to Enable Digital Security?

When it comes to security for the digital enterprise, we have good reason to get nervous, understanding current breaches like Sony as the first signs of a dark future, where cyber criminals and even terrorists lurk and create serious damage. In this session, Martin Kuppinger will first define, what “digital security” means, what the real risks are that need to be faced and mediated, and which roles IAM will play in this context.  

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom

Understanding the criticality of IAM infrastructure (delivered as software or as a service) and securing the service and its lifecycle.

The Role of IAM in Hack Prevention

As witnessed by a seemingly non-stop onslaught of public breaches of prominent organizations (Sony, Anthem, Target, etc.), it appears that the gloves have come off in the battle being waged in cyberspace. Nations have become heavily involved in industrial hacking for the purpose of enriching their government-owned enterprises. Hacktivists are out in force to publicly expose and shame corporations for perceived public wrongs. Unfortunately, Enterprise IT is caught in the middle and must defend from, detect, and respond to these threats. This session will discuss the role of IAM in preventing breaches, limiting their scope, and permitting faster detection and response.

Identity Relationship Management (IRM) & the Business Side

06.05.2015 12:00-13:00

No Person is an Island: How Relationships Make the IT World More Manageable

The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization

Everyone knows someone who is dealing with the aftermath of a failed IAM project and as a result, everyone knows someone struggling to move forward with the next phase of IAM. As a result, identity experts are struggling to overcome their organizations’ fear of commitment to IAM. In this session, we’ll share strategies for re-engaging with the business on its terms to enable you to secure funding for your project, protect the business, and add value to the organization.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.