European Identity & Cloud Conference 2012 Key Topics
-
Making Information Security a Strategic Priority
-
Planning, Managing & Governing IAM & Cloud
-
How to Efficiently Protect Critical Infrastructures
-
Service Focused IT in the Age of Cloud Computing
-
Cloud Governance
-
How to Audit Cloud Services
-
How to Select the Best Cloud Provider
-
(Cloud) Access Governance Strategies
-
What to Focus on for Future-Proof Identity & Access Management
-
Evaluating and Reducing the Risks of Cyber Crime
-
Mobile Privacy and Security
-
Cloud Computing Contracts & Law
-
Data Protection and Privacy: How to Prepare for the New European Privacy Legislation
-
How to Run a Compliant Cloud Business
-
Future Growth Opportunities in Telco, Technology and Media
-
Personal Data Storage
-
Device Security & BYOD (Bring your own device)
-
Enable onboarding of partners and customer interaction through federation
-
Compliance Access Management, Governance, and Intelligence
-
Manage secure access of all to everything – employees, partners, and customers – for on-premise and the cloud
Quick Links
Key Topics
-
Making Information Security a Strategic Priority
-
Planning, Managing & Governing IAM & Cloud
-
How to Efficiently Protect Critical Infrastructures
-
Service-focused IT in the Age of Cloud Computing
-
Cloud Provider Assessment, Governance and Audit
-
Evaluating and Reducing the Risks of Cyber Crime
-
Mobile Privacy and Security
-
Cloud Computing Contracts & Law
-
Data Protection and Privacy
How can we help you
Send an inquiry
Call Sales-Team +49 211 2370770
Mo – Fr 8:00 – 17:00
Become a Sponsor
Call
+49 211 23707710
Mo – Fr 8:00 – 17:00 Uhr