European Identity & Cloud Conference 2015
05.05. – 08.05.2015, Munich, Germany


Being competitive today means building an enterprise that is capable of taking full advantage of the “5 forces”, Cloud, Mobile, Social, Analytics and the Internet of Things. Harnessing these 5 forces requires a holistic view on the business side, on technology, on the risks involved, and on different cultures.

In this track, we will together create an action plan on how to work through the almost incomprehensible mountains of systems, platforms, processes and roles, towards a light and agile architecture for the digital enterprise.

After attending this session block, you will be able to:

  • List the top Cloud security and privacy concerns and the measures to reduce those risks.
  • Discuss the developing field of Mobile Identity, the risks posed and the solutions needed.
  • Describe the benefits of Customer Managed Encryption Keys (CMK).
  • List the risks in the software development lifecycle and the solutions that mitigate risk.

Cloud Identity & Security

06.05.2015 11:00-12:00

Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact

Although cloud computing has left the early adopter stage, there are still quite a few organizations hesitant to migrate services and data into the cloud due to security concerns, not only in Europe. Many of the security and privacy concerns heard when listening to IT professionals, are not just fears – they are real amd meed to be treated. In this presentation, KuppingerCole Analysts Mike Small and Eric Cole will guide you through the top 5 Cloud Security & Privacy concerns and propose measures to mitigate the risks originating from those threats. 

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?

Too many companies suffer from complex IAM implementations. Lack of user acceptance due to overly complex user interfaces; massive workloads for business people in recertification; failed projects due to complex infrastructures; the list of challenges is long. On the other hand, the need for a well-working IAM has never been as large as today. Support for more users and other types of identities than ever before, with more and more business users being involved in access requests and identity management; detecting abuse of access rights and excessive entitlements as soon as possible; simple implementation of more than just basic identity provisioning; that’s what companies need today.

Time to simplify IAM infrastructures. But where to start? Or does it require completely rethinking and re-implementing everything? And how to move from what you have to a simplified IAM infrastructure with broader reach?
The panelists will discuss the business and IT demand for simplifying IAM and how to reach that goal.

Next Generation (Mobile) Cloud

06.05.2015 12:00-13:00

Enterprise Mobility Management: Best Practices & Lessons Learned

The mobile cloud era represents a tectonic shift and executives are increasingly recognizing the opportunity at stake as they map out the role technology plays in their organizations’ future. Workflows are becoming synergized with the elements of mobile and cloud, as field workers are accessing cloud services for their day to day operations. However, this presents security challenges for enterprises when mobile users access sensitive information through email and applications across personal smartphones and tablets.

In this session we will discuss how the mobile cloud era can be optimized through agility and automation, while employee & customer privacy and sensitive corporate information remain ensured.

What’s Next in Cloud IAM – Moving Beyond Single Sign-On

While an imperative component to a truly comprehensive Cloud Identity and Access Management strategy, Single Sign-On (SSO) is not the only factor for enterprises to consider when evaluating the proper long term solution. Other critical factors to keep in mind include advanced trust-based access control, authorization management and audit intelligence for compliance. As enterprises look to take advantage of cloud adoption, these structured best practices will allow companies to leverage existing IAM investments, retain control and meet compliance requirements. In addition, this session will provide a blueprint for secure cloud adoption and a roadmap to an integrated cloud application management – without requiring companies to sacrifice current governance needs and data security.

Key Takeaways:

  • How to retain control and meet compliance requirements in IAM
  • Actionable tips on secure cloud adoption
  • Balancing governance and security needs while creating additional value through cloud investments
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.