English   Deutsch   Русский   中文    






Agenda

Please note that presentations and other event materials are available only to registered participants.

You need to log in to be able to download them.

Tuesday, 04/17/2012
08:00-18:00 Check-in & Registration
09:00-13:00 A review of the Status of Key Internet Identity Protocols OpenID Connect, OAuth 2.0 and Account Chooser
John Bradley, OpenID Foundation, Kantara
Dr. Michael B. Jones, Microsoft
Axel Nennker, Telekom Innovation Laboratories
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
Kick Willemse, OpenID Foundation
Room: Wörthsee
OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
John Sabo, CA Technologies
Anil Saldhana, Red Hat Inc.
Mike Small, KuppingerCole
Room: Alpsee
ISACA Workshop: Cloud Assurance
Marc Vael, ISACA
Room: Walchensee
Kantara Initiative Summit
John Bradley, OpenID Foundation, Kantara
Joni Brennan, Kantara Initiative
Dr. Maciej Machulak, Cloud Identity Limited
Christine Runnegar, ISOC
Nat Sakimura, Nomura Research Institute
Colin Wallis, Internal Affairs Dept, New Zealand Government
Room: Galerie
14:00-14:40 Opening Keynote
Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: Auditorium
14:40-15:00 "Che cosa sono le nuvole?” (What are the clouds?)
Dr. Emilio Mordini, CEO, Centre for Science, Society and Citizenship CSSC
Room: Auditorium
15:00-15:20 eID new challenges with Digital Agenda and Cloud Computing
Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
Room: Auditorium
15:20-15:40 Conflicting Visions of Cloud Identity
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
Room: Auditorium
15:40-16:10 Interview: What are the Privacy and Information Security Challenges 2012 and Beyond?
Roy Adar, Vice President of Product Management, CyberArk
Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)
Martin Kuppinger, Principal Analyst, KuppingerCole
Shirief Nosseir, Marketing Manager, CA Technologies
Jim Taylor, VP Identity and Security Management, NetIQ
Room: Auditorium
16:10-16:30 Coffee Break, Expo Area
16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved!
Roy Adar, Vice President of Product Management, CyberArk
Room: Auditorium
16:50-17:10 Cloud, Consumerization & Identity: Time to Transform the Security Model
Shirief Nosseir, Marketing Manager, CA Technologies
Room: Auditorium
17:10-17:30 Externalized Authorization - What is it Good for?
Room: Auditorium
17:30-17:50 What Standards Have Done and Will Do for Cloud Identity
Dr. Laurent Liscia, Executive Director, OASIS
Room: Auditorium
17:50-18:10 How do Today’s Technology Challenges make Real IAM Possible?
Jonathan Sander, Director of IAM Business Development, Quest Software
Room: Auditorium
18:10-18:30 What About: Bring your own Device?
Dr. Barbara Mandl, Senior Manager, Daimler AG
Room: Auditorium
18:30-18:50 Free Customers: The New Platform
Doc Searls, Berkman Fellow, Berkman Center for Internet and Society at Harvard University
Room: Auditorium
18:50-19:10 Scaling Identity, Access, and Audit Controls to Internet Proportions
Mike Neuenschwander, Sr. Director, Oracle
Room: Auditorium
19:10-19:30 Identity Management & Cloud Security – There’s a Workflow for That
Patrick Parker, Founder and CEO, EmpowerID
Room: Auditorium
19:30-21:00 Snacks & Drinks, Expo Area

Wednesday, 04/18/2012
08:00-18:00 Check-in & Registration
08:30-09:00 Leveraging Identity to Manage Enterprise Change and Complexity
Jim Taylor, VP Identity and Security Management, NetIQ
Room: Auditorium
09:00-09:30 Securing Critical Banking Infrastructures in the Age of Cyber Warfare
Dr. Waldemar Grudzien, Director, Department Retail Banking and Banking Technology, Association of German Banks
Room: Auditorium
09:30-10:00 Information Security Governance in Banks: Delivering Actionable Recommendation to Management
Berthold Kerl, Managing Director, Head of Information & Technology Risk Governance, Deutsche Bank AG
Room: Auditorium
10:00-10:30 Coffee Break, Expo Area
Making Information Security a Strategic Priority
Moderator:
Berthold Kerl, Deutsche Bank AG
Room: Auditorium
Cloud Computing Audit
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Brendan M. Peter, CA Technologies
Room: Alpsee
What to Focus on for Future-Proof IAM
Moderator:
Craig Burton, KuppingerCole
Room: Ammersee 1
Cloud Legal, Privacy, Data Protection I
Moderator:
Dr. Jörg Hladjk, Hunton & Williams LLP
Room: Ammersee 2
Roundtable: Consumer Identity
Moderator:
Dave Kearns, KuppingerCole
Room: Galerie
10:30-11:30
Cyber Crime
Cyber Crime, Cloud, Social Media... - IS Threats for Banks are Constantly Increasing: What should we be doing?
Berthold Kerl, Deutsche Bank AG

Facing the Online Threats against Retail and Banking Customers - What are the Future Perspectives?
Prof. Dr. Sachar Paulus, KuppingerCole
Cloud Audit
Addressing Cloud Audit, Assurance and Compliance Needs – A Progress Report
Dr. Marnix Dekker, ENISA
Anil Saldhana, Red Hat Inc.
Dr. Jane Siegel, Carnegie Mellon University Silicon Valley
The Business Value of IT
Increase Value to the Business: The KuppingerCole IT Model
Martin Kuppinger, KuppingerCole

How IAM can Catalyze the Secure Enterprise
Craig Burton, KuppingerCole
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Mike Neuenschwander, Oracle
EU Privacy News
New EU Data Protection Rules: What will cause the most Pain, who will suffer and how can you gear up for them?
Dr. Jörg Hladjk, Hunton & Williams LLP
Consumer Identity
Consumer Identity Systems - Trends
John Bradley, OpenID Foundation, Kantara
Kim Cameron, Microsoft
Malcolm Crompton, Information Integrity Solutions
Susan Morrow, Avoco Secure Ltd
Colin Wallis, Internal Affairs Dept, New Zealand Government

A Review of the Status of key Internet Identity Protocols OpenID Connect, OAuth 2.0 and Account Chooser
John Bradley, OpenID Foundation, Kantara
Dr. Michael B. Jones, Microsoft
Axel Nennker, Telekom Innovation Laboratories

Barn-Rasing At Internet Scale: Trust Framework Development for Open Identity
Scott David, K&L Gates LLP
Anthony Nadalin, Microsoft
Drummond Reed, Connect.Me
Jeff Stollman, Secure Identity Consulting
Don Thibeau, OpenID Foundation
11:30-12:30
Regulation
IT Strategies and Information Security in Banks - The Regulator´s View
Dr. Markus Held, Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin)

How to Address Regulatory Needs Fast and Lean
Dr. Waldemar Grudzien, Association of German Banks
Dirk Venzke, Commerzbank AG
Dr. Horst Walther, KuppingerCole
Wolfgang Zwerch, MunichRe
Cloud Audit
Global Perspectives on Cloud Auditing Challenges and Solutions
Steve Jones, Capgemini
Prof. Dr. Sachar Paulus, KuppingerCole
Marc Vael, ISACA
The Future IT Organization
Winds of Change in your IT Organization: Get ready for the Future
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole

The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
Niels von der Hude, Beta Systems Software
Hassan Maad, Evidian
Mike Neuenschwander, Oracle
Alberto Ocello, Crossideas
Darran Rolls, SailPoint
Jonathan Sander, Quest Software
Jim Taylor, NetIQ
Privacy by Design
Unwanted Automated Profiling
Prof. Dr. Mireille Hildebrandt, Radboud University Nijmegen

Privacy Governance in Software Organizations
Prof. Dr. Dawn Jutla, Saint Mary´s University
12:30-14:00 Lunch Break, Expo Area
Making Information Security a Strategic Priority
Moderator:
Berthold Kerl, Deutsche Bank AG
Room: Auditorium
Cloud Identity & Access
Moderator:
Mike Small, KuppingerCole
Room: Alpsee
IAM Architecture
Room: Ammersee 1
Cloud Legal, Privacy, Data Protection II
Moderator:
Yohan Benizri, Sidley Austin LLP
Room: Galerie
Personal Data: Life Management Platforms
Moderator:
Martin Kuppinger, KuppingerCole
Doc Searls, Berkman Center for Internet and Society at Harvard University
Room: Ammersee 2
14:00-15:00
Identity & Access Governance - Finance Industry
IAM Governance in the New Commerzbank
Dirk Venzke, Commerzbank AG

Munich Re’s Identity & Access Management - Experience Report and Best Practices
Wolfgang Zwerch, MunichRe
Cloud Information Security
The Cornerstones of Information Security in the Cloud
Craig Burton, KuppingerCole

Extending your Identity & Access Management into the Cloud
Gerry Gebel, Axiomatics Americas
Bruce Macdonald, Hitachi ID Systems
Dr. Barbara Mandl, Daimler AG
Prabath Siriwardena, WSO2
Jim Taylor, NetIQ
Identity Federation
Identity Federation Challenges and how to approach them
Thomas Gundel, IT Crew
Travis Spencer, Ping Identity
Colin Wallis, Internal Affairs Dept, New Zealand Government

Best Practice in Out-sourced Federation: WAYF
David Simonsen, WAYF
Cloud Service Contracts
Avoiding hidden Clauses and other Pitfalls - How to Deal a Good Cloud Service Contract
Yohan Benizri, Sidley Austin LLP
Life Management Platforms
Getting Personal: How can Each of us Live in a World of Corporate Silos — While also Building a World that Transcends them?!
Doc Searls, Berkman Center for Internet and Society at Harvard University

Giving Individuals Control and Knowledge of their Personal Information held by Others - What are the Consequences?
Prof. Dr. Kevin Cox, Edentiti
Scott David, K&L Gates LLP
Tony Fish, My Digital Footprint
Marcel van Galen, Qiy Foundation
Drummond Reed, Connect.Me

Trust Frameworks - Internet Identity - Life Management Platforms
Drummond Reed, Connect.Me
Markus Sabadello, XDI.ORG
Phil Windley, Kynetx

The GINI-SA Project of the EU
Lefteris Leontaridis, NetSmart S.A.
15:00-16:00
Risk Identification & Evaluation
Delivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation Process
Dr. Waldemar Grudzien, Association of German Banks
Berthold Kerl, Deutsche Bank AG
Prof. Dr. Sachar Paulus, KuppingerCole

How to successfully get business to participate in IAM and Access Governance
Dr. Martin Kuhlmann, Omada
Edwin van der Wal, Everett
SCIM
Is SCIM a Scam?
Craig Burton, KuppingerCole

Simple Cloud Identity Management (SCIM)
Trey Drake, UnboundID
Kurt Johnson, Courion Corporation
Darran Rolls, SailPoint
Travis Spencer, Ping Identity
Privileged Access
PCI-DSS, SOX, Basel: How to Manage Privileged Access and Pass the Audit
Sharon Farber, CA Technologies
Jochen Koehler, CyberArk
The Business of Identity
Identity Provider Business Models
Axel Nennker, Telekom Innovation Laboratories
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation

Sociality by Design: How Google, Facebook & Co. can reconcile Privacy and Profit
Dr. Stephan Humer, UdK Berlin
16:00-17:00 Coffee & Networking, Expo Area
17:00-18:00
Value Focused Security
Identity & Access Management as a Key Element for a Value focused Security Strategy
Ralf Knöringer, Atos IT Solutions and Services GmbH
Hassan Maad, Evidian
Shirief Nosseir, CA Technologies
Christian Patrascu, Oracle Corp.

Access Governance Case Study: Friends Life Realizes Quick Time To Value
Julia Bernal, Friends Life
One IT, One IAM
Why you should not believe in Cloud-only Solutions
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole

Cloud Identity Services - Models and Challenges
Martin Kuppinger, KuppingerCole
Andy Thurai, Intel
Directories
Single Point of Access: The IAM Strategy at Teleflex
Nick Sabinske, Teleflex

One Identity Service, Many Initiatives: Exploring Use Cases for Identity Virtualization
Nick Sabinske, Teleflex
Ulrich Schulz, Radiant Logic
EU Citizen Privacy
How the EU handles Citizen Privacy at Present and how it will evolve in the Future
Dr. Alea Fairchild, Constellation Research Group

Panel: The Future of Citizen Privacy
Malcolm Crompton, Information Integrity Solutions
Dr. Alea Fairchild, Constellation Research Group
Prof. Dr. Reinhard Posch, Republic of Austria
Life Management High Potentials
QiY
Marcel van Galen, Qiy Foundation

Connect.Me
Drummond Reed, Connect.Me

PIB-d
John Harrison, PIB-d
18:00-18:20 How Mobility Clouds the Future and SOA / Web 2.0 gives way to the Cloud API
André Durand, Founder & CEO, Ping Identity
Room: Auditorium
18:20-18:40 Top Challenges and Threats Security Managers Should Watch Out For
Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
Room: Auditorium
18:40-19:00 How to build a Secure and Open Cloud
Stephan Bohnengel, Sr. Specialist Systems Engineer Security, VMware
Room: Auditorium
19:00-21:00 European Identity Awards Ceremony & Buffet Dinner
Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)

Thursday, 04/19/2012
08:00-18:00 Check-in & Registration
08:30-09:00 How Identity Management and Access Governance as a Service make your Cloud Work and your Business more Agile
Ralf Knöringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH
Room: Auditorium
09:00-09:30 The Future of Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet
Prof. Dr. Kai Rannenberg, Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University in Frankfurt
Room: Auditorium
09:30-10:00 Trust and Complexity in Digital Space
Dr. Jacques Bus, Secretary General, Digital Enlightenment Forum
Room: Auditorium
10:00-10:30 Coffee & Networking, Expo Area
Planning, Managing and Governing IAM & Cloud I
Moderator:
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
Room: Auditorium
Cloud Security
Moderator:
Mike Small, KuppingerCole
Room: Alpsee
IAM Architecture
Moderator:
Dr. Horst Walther, KuppingerCole
Room: Ammersee 1
Governance, Risk Management & Compliance (GRC)
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Room: Galerie
Digital Enlightenment Forum
Moderator:
Dr. Jacques Bus, Digital Enlightenment Forum
Room: Ammersee 2
10:30-11:30
Intention Economy
VRM and the Intention Economy: Now What?
Craig Burton, KuppingerCole
Scott David, K&L Gates LLP
Marcel van Galen, Qiy Foundation
Drummond Reed, Connect.Me
Doc Searls, Berkman Center for Internet and Society at Harvard University
Phil Windley, Kynetx
Trustworthy Cloud
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
Henning Arendt, @bc - Arendt Business Consulting
Prof. Dr. Clemens Jochum, Goethe-University Frankfurt, House of Finance
Aljosa Pasic, Atos Research & Innovation
Dr. Stefan Pühl, Dell
Mike Small, KuppingerCole
Juergen Urbanski, T-Systems
Re-engineering IAM
Re-engineering IAM to better serve your Business Needs
Martin Kuppinger, KuppingerCole

The Role of Open Source in Today´s IAM Infrastructure
Allan Foster, ForgeRock
Michael Kleinhenz, tarent AG
Martin Kuppinger, KuppingerCole

Building Identity & Access Management as a Public Administration Service for the Trento Autonomous Province
Fabrizio Russo, Trento Autonomous Province
Maturing GRC
How to Mature GRC Processes Before you Buy a GRC Tool
Berthold Kerl, Deutsche Bank AG
Prof. Dr. Sachar Paulus, KuppingerCole

Best Practice: IAM in a Complex and Security-Driven Environment
Alexander Kuehnemann, T-Systems International GmbH
Privacy Technologies
Anonymous Credentials in Practice
Prof. Dr. Jaap-Henk Hoepman, Radboud University Nijmegen

What ABC4Trust can do for Privacy in eID
Dr. Ioannis Krontiris, Goethe University Frankfurt

Privacy Protection: Architecture does not compromise, but application often will - what can be done?

STORK: Technical Solution and Data Protection Considerations
Herbert Leitold, A-SIT, Graz University of Technology

eID Management in Australasia - What are the Paths taken und what may the Future hold?
Colin Wallis, Internal Affairs Dept, New Zealand Government

Minimal Disclosure: Achieving lift-off
Ronny Bjones, Microsoft
Kim Cameron, Microsoft
11:30-12:30
The KuppingerCole IT Model and the API Economy
How the API Economy Leverages our Capabilities for Delivering Business Services
Craig Burton, KuppingerCole
Kim Cameron, Microsoft
Martin Kuppinger, KuppingerCole

API Economy: The Consumer View

API Economy: The Provider View
Dr. Steven Willmott, 3Scale
The Future Cloud
Customer Driven Cloud Services – What Cloud Customers need Providers to do to better align
Ian Lamont, Open Data Center Alliance

Paving the Way for Tomorrow´s Service Provisioning Architecture
Prof. Dr. Mohamed Hamdi, School of Communication Engineering
Best Practice
Identity & Access Governance (IAG): Building the Business Case & Implementation
Jethro Cornelissen, Rabobank International

Deployment of a Role Based Access Identity Management System in a University Hospital
Pierre François Regamey, CHUV – Centre Hospitalier Universitaire Vaudois
(Cloud) Access Risks
Identifying your Critical Information Assets. Moving from System Security to Information Security
Prof. Dr. Sachar Paulus, KuppingerCole

Managing Cloud Computing Access Risks
Kurt Johnson, Courion Corporation
Bruce Macdonald, Hitachi ID Systems
Deepak Taneja, Aveksa
12:30-14:00 Lunch Break, Expo Area
Planning, Managing and Governing IAM & Cloud II
Moderator:
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
Room: Auditorium
Cloud Security
Moderator:
Mike Small, KuppingerCole
Room: Alpsee
IAM Architecture
Moderator:
Dr. Horst Walther, KuppingerCole
Room: Ammersee 1
Governance, Risk Management & Compliance (GRC) II
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Room: Galerie
Roundtable: Mobile Privacy and Security
Room: Ammersee 2
14:00-15:00
Virtualization
From Virtualization to the Cloud and Beyond
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole

Security for Virtualized Environments, Privileged Users and PCI Compliance
Guy Balzam, CA Technologies
Stephan Bohnengel, VMware
Giovanni Ciminari, Telecom Italia
Cloud Security Issues
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Mike Small, KuppingerCole

Secure Online Identity with Cloud Identity and Privacy Services
Ronny Bjones, Microsoft
Prof. Dr. David Chadwick, University of Kent
Mike Small, KuppingerCole
Security Intelligence
Best Practices for Lean, Efficient and Focused Information Security Projects
Dr. Horst Walther, KuppingerCole

Identity and Security Intelligence
Kim Cameron, Microsoft
Robert Griffin, RSA, the Security Division of EMC
Edwin van der Wal, Everett
Access Intelligence
Beyond the Pioneer Approaches - The next Level in Access Governance and Risk
Niels von der Hude, Beta Systems Software
Kurt Johnson, Courion Corporation
Alberto Ocello, Crossideas
Prof. Dr. Sachar Paulus, KuppingerCole
Darran Rolls, SailPoint
Mobile Privacy and Security
Privacy in the age of BYOD and Enterprise Mobility
Alexei Balaganski, KuppingerCole

Mobile data Security and Privacy
Eric Fulton, Lake Missoula Group

Securing the Mobile API Ecosystem
Axel Grosse, Vordel
15:00-16:00
Federation vs. Synchronization
What Federation is About – in Theory and in Practice
Dave Kearns, KuppingerCole

Federation or Synchronization – the Future of the Cloud
Darran Rolls, SailPoint
Travis Spencer, Ping Identity

Exchanging Metadata through Different Federations on a Global Scale
Nicole Harris, JISC Advance
Best Practice
Trusted Identity Information from the Cloud
Patrick Graber, Swisscom Ltd

Cloud Service Broker - Adopting cloud services in Multi-tenant Enterprise Scenarios
Andreas Carlsson, Nordic Edge
Haydar Cimen, KPN
Access & Entitlements
Best Practice: Telekom Italia
Giovanni Ciminari, Telecom Italia

Access & Entitlements - More than just Role Management
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Marco Venuti, CrossIdeas
GRC Frameworks, Secure Applications
Integrating GRC Frameworks and Practices
Prof. Dr. Sachar Paulus, KuppingerCole

Best Practice Experiences on how to Convince your Application Developers to Code Securely
Christian Patrascu, Oracle Corp.
Prof. Dr. Sachar Paulus, KuppingerCole
Jonathan Sander, Quest Software
16:00-16:30 Coffee & Networking, Expo Area
16:30-17:30
Secure (Big) Data
Database Firewalls: Advancing Security for Enterprise Data
Martin Kuppinger, KuppingerCole
Dr. Steve Moyle, Oracle
Sebastian Rohr, KuppingerCole

Best Practice: Database Security
Key Management, Encryption
The Bad Things that can happen if Encryption Management Fails
Mike Small, KuppingerCole
Gregory Webb, Venafi, Inc.

Cloud Security Depends on Effective Key Management
Authorization
Cloud Ready Authorization Archtitectures
Gerry Gebel, Axiomatics Americas
Prof. Dr. Sachar Paulus, KuppingerCole
Best Practice
Siemens HRS - Compliant Identity Management for Global HR Services and Applications
Julia Ecker, Siemens Central Information Technology
Peter Hansel, Bizcon

How to Deliver Business Value through your IAM Solution
Salah Bohoudi, Europol
Bridging from Mobile to on-Premise
Axel Grosse, Vordel
17:30-18:00 Closing Keynote
Dave Kearns, Senior Analyst, KuppingerCole
Prof. Dr. Sachar Paulus, Senior Analyst, KuppingerCole
Room: Auditorium

Friday, 04/20/2012
08:30-10:00 Check-in & Registration
Best Practice Approaches to Migrate your Provisioning Products – for Sun and Others
Room: Alpsee
OAuth, OpenID Connect, SAML, SCIM – How to Deal with all the Identity Providers and how to Federate?
Moderator:
Craig Burton, KuppingerCole
Room: Schliersee
09:00-10:30 Migrating away from your Current Provisioning Product - Options and Challenges
Martin Kuppinger, KuppingerCole
Mike Neuenschwander, Oracle
Agile Business: What your Business Expects from IT today
John Bradley, OpenID Foundation, Kantara
Craig Burton, KuppingerCole
10:30-11:00 Coffee Break
11:00-12:30 Migration Destinations Round Table
Luke Forsyth, CA Technologies
Niels von der Hude, Beta Systems Software
Mike Neuenschwander, Oracle
Jim Taylor, NetIQ
Paul Walker, Quest Software (now a part of Dell)
Agile Security: The Services you Need to Provide in your Identity and Security Infrastrucutre
John Bradley, OpenID Foundation, Kantara
Craig Burton, KuppingerCole
12:30-13:30 Lunch Break
Mobile Security, BYOD & How to do it Right
Room: Alpsee
Connected Vehicle
Moderator:
Martin Kuppinger, KuppingerCole
Room: Schliersee
13:30-15:00 Securing the communication of Mobile Devices
Alexei Balaganski, KuppingerCole
Eric Fulton, Lake Missoula Group
Axel Grosse, Vordel
Identity Management for the Connected Vehicle
15:00-16:00 Process Maturity Needs
Alexei Balaganski, KuppingerCole
Eric Fulton, Lake Missoula Group
Axel Grosse, Vordel
Connecting your Vehicle to your Personal Data Vault


© 2014 KuppingerCole