English   Deutsch   Русский   中文    






Agenda

Please note that presentations and other event materials are available only to registered participants.

You need to log in to be able to download them.

Tuesday, 05/13/2014
08:00-18:00 Check-in & Registration
Room: EXPO AREA
09:00-13:00
OpenID Foundation Workshop
Enterprise Application of OpenID Connect, Mobile Apps SSO, Account Chooser
Ronny Bjones, Microsoft
John Bradley, OpenID Foundation, Kantara
Pamela Dingle, Ping Identity
Peter Mark Graham, Verizon Enterprise Solutions
Dr. Michael B. Jones, Microsoft
Dr. Torsten Lodderstedt, Deutsche Telekom AG
Anthony Nadalin, Microsoft
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
Room: ALPSEE
Identity & Access Management Crash Course
Get to know the IAM Essentials in 4 hours
Martin Kuppinger, KuppingerCole
Room: BEER GARDEN
OASIS Workshop
Designing Privacy into our "Smart" Systems and Services
David Brossard, Axiomatics AB
Michelle Chibba, Office of the Information and Privacy Commissioner Ontario
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
John Sabo, OASIS Idtrust
Room: AMMERSEE I
Kantara Initiative Workshop
Consumer Identity - International Use Cases and Approaches
Joni Brennan, Kantara Initiative
Allan Foster, ForgeRock
Robert Labelle, IEEE
Dr. Maciej Machulak, Cloud Identity Limited
Sandy Porter, Avoco
Michel Prompt, Radiant Logic
David Simonsen, WAYF
Matthew Trigg, UK Cabinet Office
Colin Wallis, Internal Affairs Dept, New Zealand Government
Michelle Waugh, CA Technologies
Room: AMMERSEE II
13:00-14:00 Lunch & Networking
Room: EXPO AREA
14:00-14:40 Opening Keynote
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM
14:40-15:00 In the Light of Snowden's Revelations: Do they Change the Way how we Decide on Information Security?
Heike Raab, CIO, German State of Rhineland-Palatinate
15:00-15:20 NSA and Snowden - a Useful Contribution to Information Security Awareness?
Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
15:20-15:40 The Future of Email Privacy
Ladar Levison, Founder, Lavabit
15:40-16:00 The Cyber Paradox
Dr. Andreas Knäbchen, Partner Cyber Risk Services, Deloitte
16:00-17:00 Coffee & Networking
Room: EXPO AREA
17:00-17:20 Why the Future of IDM Still Needs Us
Mike Neuenschwander, CEO, iC Consult Americas
17:20-17:40 The Identity of Everything
Geoff Webb, Senior Director of Solution Strategy, NetIQ
17:40-18:00 Endconsumerization Requires Agile Risk Management - Risk Mitigation Through a Consequent Cloud Strategy
Dr. Barbara Mandl, Senior Manager, Daimler AG
18:00-18:20 Applied Information Stewardship: Protect your Jewelry
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
18:20-18:40 Mitigate Targeted Attacks with Privileged Account Analytics
Roy Adar, Vice President of Product Management, CyberArk
18:40-19:00 Identity Governance in the Context of a Connected Security Strategy
Ramses Gallego, Security Strategist, Dell
19:00-19:20 IAM Meat and Potatoes Best Practices
Patrick Parker, Founder and CEO, EmpowerID
19:30-21:00 Snacks, Drinks & Networking / Evening Reception
Room: EXPO AREA

Wednesday, 05/14/2014
08:00-18:00 Check-in & Registration
Room: EXPO AREA
08:30-08:50 Developing a Strategy for Business-Aligned Information Security
Roman Chaplygin, Director, Risk Assurance, PwC Russia
Room: AUDITORIUM
08:50-09:10 Borderless Identity: Managing Identity in a Complex World
Paul Fremantle, WSO2
09:10-09:30 Authentication in 2020
Per Hägerö, CTO, neXus
09:30-09:50 Mastering the IAG Challenge
Dirk Venzke, Director, Commerzbank AG
09:50-11:00 Coffee & Networking
Room: EXPO AREA
The Future of Corporate IT
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Room: AUDITORIUM
ABC: Agile Business – Connected
Moderator:
Dr. Horst Walther, KuppingerCole
Room: AMMERSEE I
Privacy & Compliance
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Room: ALPSEE
IAM Infrastructure Trends & Concepts
Moderator:
Graham Williamson, KuppingerCole
Room: AMMERSEE II
Roundtable: Cloud, Customer, Community, Citizen Identity
Moderator:
Andrew Nash, KuppingerCole
Room: BODENSEE I
11:00-12:00
Strategic IT Planning
Strategic IT Planning: Foundations, Controls, Processes
Prof. Dr. Sachar Paulus, KuppingerCole

Bridging the Gap between Business and IT: How to Translate IT Wording into Business Language
Roberto Baratta, Novagalicia Banco
Roman Chaplygin, PwC Russia
Sharon Farber, CA Technologies
Pavlos Makridakis, Aurionpro Solutions plc
Dr. Barbara Mandl, Daimler AG
Marco Venuti, CrossIdeas

Identity Governance in Merge/Split Processes
Roberto Baratta, Novagalicia Banco
ABC: Agile Business – Connected
The new ABC for Information Security: How to Support the New Types of Businesses – and Why
Martin Kuppinger, KuppingerCole

The new ABC and the role of Cloud IAM
Ramses Gallego, Dell
Jason Hart, SafeNet
Marco Rohrer, IPG AG
Thierry Winter, Evidian
Privacy in Communication
Discussion: How Strong could Privacy in Internet Communication be - and where are the Legal Barriers?
Dr. Michael B. Jones, Microsoft
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Ladar Levison, Lavabit
Amar Singh, KuppingerCole
Killing IAM
Killing Identity Management in Order to Save It
Ian Glazer, salesforce.com

Weaving Identity into Business Services - Is this the Future of Identity & Access Management?
Kim Cameron, Microsoft
Pamela Dingle, Ping Identity
Ian Glazer, salesforce.com
Mike Neuenschwander, iC Consult Americas
Christian Patrascu, Oracle Corp.
BYOID is Stepping Up
Andrew Nash, KuppingerCole

National Identity Initiatives Compared - Convergence or Divergence?
Colin Wallis, Internal Affairs Dept, New Zealand Government

The Challenges of Third-party Identity Credentials & How a Trusted Identity Registry May Help: Example Initiatives in the UK and the US
Don Thibeau, OpenID Foundation

Belgian eID as Trust Generator Accross Sectors, Banking Included
Frank Leyman, FedICT Belgium

BYOI – Making Citizen and Consumer IdM Easy using Social IDs … and Secure using Attribute Verifiers and 2FA
Don Schmidt, Microsoft

Attribute-Based Credentials (ABCs) for Privacy-Preserving Authentication
Dr. Joerg Abendroth, Nokia Solutions and Networks
12:00-13:00
IAM/IAG Organization
The IAM/IAG Organization that will Make your Project Succeed
Martin Kuppinger, KuppingerCole

Identity Management as Strategic Driver - A Bank´s Journey to the Cloud
Luis Saiz, BBVA

2020 Vision - IAM for the Next Decade
Martin Kuppinger, KuppingerCole
Ravi Srinivasan, IBM Security Strategy
Identity in the Extended Enterprise
Identity Relationship Management: From IAM to IRM
Joni Brennan, Kantara Initiative

Identity Challenges for the Extended Enterprise
Stuart Boardman, KPN
Big Data in Security vs. Privacy
Preventing your Enterprise from Cyber Attacks and Threats: Can this be Illegal?
Dr. Karsten Kinast LL.M., KuppingerCole

Deep Security Monitoring Versus Privacy – Is There a Middle Ground?
Ramses Gallego, Dell
Matthew Gardiner, RSA
Dr. Scott David, LL.M., KuppingerCole
Dynamic Authorization Management
Dynamic Authorization Management: The Market and its Future
Graham Williamson, KuppingerCole

RBAC, ABAC, or Both?
Allan Foster, ForgeRock
Finn Frisch, Axiomatics
Peter Gietz, DAASI International GmbH
Ian Glazer, salesforce.com
Patrick Parker, EmpowerID
Geoff Webb, NetIQ

OpenRBAC: Why using an LDAP based Backend for Role Based Access Control Information
Peter Gietz, DAASI International GmbH
13:00-14:30 Lunch & Networking
Room: EXPO AREA
IAM/IAG Strategic Planning
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Amar Singh, KuppingerCole
Room: AUDITORIUM
Mobile Security
Moderator:
Mike Small, KuppingerCole
Room: AMMERSEE I
Information Stewardship in Practice: Secure Information Sharing
Moderator:
Martin Kuppinger, KuppingerCole
Room: ALPSEE
IAM Infrastructure Trends & Concepts
Moderator:
Graham Williamson, KuppingerCole
Room: AMMERSEE II
Roundtable: Implementing Life Management Platforms
Moderator:
Dr. Scott David, LL.M., KuppingerCole
Andrew Nash, KuppingerCole
Room: BODENSEE I
14:30-15:30
Evolving your Existing IAM/IAG Infrastrucure
IAM/IAG: Balancing Existing Investments with your Future Needs
Prof. Dr. Sachar Paulus, KuppingerCole

People, Processes, Solutions: Maturing IAM/IAG at Commerzbank AG
Dirk Venzke, Commerzbank AG
Social & Mobile Login
Evaluating the Risks of Social Login
Mike Small, KuppingerCole

How to Enable Social and Mobile Login – and Beyond
Ian Glazer, salesforce.com
Dr. Michael B. Jones, Microsoft
Christian Patrascu, Oracle Corp.
Daniel Raskin, ForgeRock
Don Schmidt, Microsoft
Information Rights Management
Information Rights Management: Finally Ready for Prime Time
Martin Kuppinger, KuppingerCole

Understanding Information Rights Management Architectures
Philippe Beraud, Microsoft
Yuval Eldar, Secure Islands
Tim Upton, TITUS Inc.
Dynamic Access Control
Drivers and Lessons learned from a Recent ABAC Implementation at Generali
Manuel Schneider, Generali Deutschland Informatik Services

ABAC - Visions and Reality
Finn Frisch, Axiomatics
Stephan Schweizer, AdNovum Informatik AG
Thierry Winter, Evidian
Standards Based Identity at Scale
OpenID Connect, OAuth, UMA, SCIM, SAML... - Standards for an Open Life Management Infrastructure

User-Managed Access: Key to Life Management Platforms
Domenico Catalano, Oracle
Dr. Maciej Machulak, Cloud Identity Limited

A Life Management Platform Goes Live: Launching the Respect Network in 2014
Drummond Reed, Connect.Me

Social Networking 2.0: Privacy Designed Social Interaction - The MetaSociety Project
Martin Kuppinger, KuppingerCole
Vladimir Samokhvalov, Metasociety
15:30-16:30
IAM/IAG Vendor Landscape
Access Governance Vendor Panel
Ramses Gallego, Dell
Pervez Goiporia, Oracle
Morgan Holm, empowerID
Sebastian Kornblueh, G+H Netzwerk-Design
Roy Peretz, Whitebox Security
Marco Venuti, CrossIdeas

The 5 Critical Tenets of Identity and Access Management
Mike Neuenschwander, iC Consult Americas
Darran Rolls, SailPoint
Amar Singh, KuppingerCole
Secure Mobile Access & Identity
Extending Identity and Access to the Mobile World
Niklas Brask, PointSharp AB
Bart Renard, VASCO Data Security
Stephan Schweizer, AdNovum Informatik AG
Avi Yehuda, Nativeflow
Hans Zandbelt, Ping Identity

Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World
Per Hägerö, neXus
Thomas van Vooren, Everett
Document Based Compliance Management
The Business Drivers for Information Rights Management
Philippe Beraud, Microsoft
Borja Rosales, Druva
Don Schmidt, Microsoft
Yoran Sirkis, Covertix

The Legal Requirements for Protecting Documents – the IRM Legal Case
Dr. Karsten Kinast LL.M., KuppingerCole
Enterprise API Management & Security
From Rogue IT to Strategy: Tying API Management into the Enterprise Infrastructure
Chris England, Okta
Mark O'Neill, Axway

An Ecosystem for API Security OAuth 2.0, OpenID Connect, UMA, SAML, SCIM and XACML
Prabath Siriwardena, WSO2
16:30-17:30 Coffee & Networking
Room: EXPO AREA
17:30-18:30
Access & Data Governance
What Is the Level of Detail, an IAM Solution Must Cover?
Niels von der Hude, Beta Systems Software
Darran Rolls, SailPoint
Andrea Rossi, CrossIdeas
Thomas van Vooren, Everett

Entitlement & Access Governance: How to do Data Governance Right?
Pervez Goiporia, Oracle
Borja Rosales, Druva
Amar Singh, KuppingerCole
Enterprise Mobility Management
How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem
Chris England, Okta
Pavlos Makridakis, Aurionpro Solutions plc
Dominic Schmidt-Rieche, AirWatch
Dirk Wahlefeld, Centrify
Secure Information Sharing in Health Care
eHealthcare Done Right: Strong Identities, Privacy, Secure Information Access and Sharing
Kim Cameron, Microsoft
Martin Kuppinger, KuppingerCole
Don Schmidt, Microsoft
Peter Weierich, iC Consult GmbH
Leadership Compass: Enterprise Single Sign-On
Mature, Well Established, Inevitable: Guiding you through the Current Enterprise Single Sign-On Market
Rob Newby, KuppingerCole
Graham Williamson, KuppingerCole
LMP Business Models
Life Management Platforms - How to Reach the Critical Mass
Marcel van Galen, Qiy Foundation
Peter Mark Graham, Verizon Enterprise Solutions
Dr. Maciej Machulak, Cloud Identity Limited
Drummond Reed, Connect.Me
18:30-18:50 Governance and Awareness
Stefan Van Gansbeke, CISO, CM/MC Health Insurance Fund Belgium
Room: AUDITORIUM
18:50-19:10 What do Moby, The Bushmen and The Cloud have in Common?
Dragan Pendic, Chief Security Architect, Diageo
19:10-19:30 Heartbleed, NSA & Trust
Amar Singh, Senior Analyst, KuppingerCole
19:30-22:00 European Identity Awards Gala & Dinner
Room: AUDITORIUM

Thursday, 05/15/2014
08:00-18:00 Check-in & Registration
Room: EXPO AREA
08:30-08:50 Security as a Service - The New Normal?
Prof. Dr. Hartmut Pohl, CEO, softScheck GmbH
Room: AUDITORIUM
08:50-09:10 Reducing Identity Fragmentation in the New Digital Economy
Christian Patrascu, Director of Product Management – Oracle Fusion Middleware, Oracle Corp.
09:10-09:30 Future2: A Cloud of Emerging Risks in the Finance Industry
Dr. Iordanis Chatziprodromou, Lead Data Analytics - P&C Business Management, Swiss Re
09:30-09:50 Defending Your Data in the Wild: Eliminating the Risks of Mobile Data
Martin Edwards, Director of Sales Engineering – EMEA, Druva
Borja Rosales, Managing Director, Europe, Druva
09:50-11:00 Coffee & Networking
Room: EXPO AREA
Access Governance & Privilege Management
Moderator:
Dr. Horst Walther, KuppingerCole
Room: AUDITORIUM
Cyber Security Leadership
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Prof. Dr. Hartmut Pohl, softScheck GmbH
Room: AMMERSEE I
Adaptive & Risk based Authentication
Moderator:
Amar Singh, KuppingerCole
Room: ALPSEE
IAM Infrastructure Trends & Concepts
Moderator:
Mike Small, KuppingerCole
Room: AMMERSEE II
Roundtable: IAM in Large Corporations
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Barbara Mandl, Daimler AG
Room: BODENSEE I
11:00-12:00
IAG & PxM - Integrated View
Securing Elevated Privileges: Integrating Access Governance and Privilege Management
Martin Kuppinger, KuppingerCole
Erich Vogel, Computacenter
Dr. Horst Walther, KuppingerCole

Early Check-in with Identity and Access Governance Best Practices
Idita Israeli Sabag, El Al Israel Airlines
Cyber Security Best Practice
Cyber Security Best Practice in the Light of Snowden's Revelations
Prof. Dr. Sachar Paulus, KuppingerCole
Prof. Dr. Hartmut Pohl, softScheck GmbH

Getting the Basics Right: How we are Protecting BT Against Today´s and Tomorrow´s Cyber Threats
Aernout Reymer, BT
Authentication Trends and Timeline
Authentication Trends – will Wearables take us _BAC to the Future?
Amar Singh, KuppingerCole

Do We Need To Put Secrecy Back In To Security? The Reinvention of Authentication
John Bradley, OpenID Foundation, Kantara
Steven Hope, Winfrasoft
Anthony Nadalin, Microsoft
Mike Neuenschwander, iC Consult Americas
Bart Renard, VASCO Data Security
IAM Best Practice
Best Practice: IAM @ Franke
Martin Saeckel, Franke Management AG

Long Term Success Factors for IDM
Eleni Richter, EnBW
IAM as a Commodity
Agile IAM Risk Management with large Corporations and the Importance of Standards
Dr. Barbara Mandl, Daimler AG
Andre Priebe, iC Consult

The Legal View
Dr. Karsten Kinast LL.M., KuppingerCole

Growing Complexity and Business Relevance of Centralized IAM Platforms – A Balancing Act
Udo Guenther, Daimler AG

The Consumer Adoption & Information Security View
Don Schmidt, Microsoft
12:00-13:00
Leadership Compass: Privilege Management
Securely Managing Privileged Users: Selecting the Solution that fits to your Needs
Martin Kuppinger, KuppingerCole
Rob Newby, KuppingerCole

Privileged Account Analytics in the Context of Realtime Analytics - Challenges and Benefits
Roy Adar, CyberArk
Martin Kuppinger, KuppingerCole
Realtime Security Intelligence
Why SIEM failed - and why we need Realtime Security Intelligence
Prof. Dr. Sachar Paulus, KuppingerCole

Prescription Security Lenses for the 4A Vision: Anywhere, Anytime, with Anyone, on Any Device
Dragan Pendic, Diageo

Big Data for Information Security: Preventing your Enterprise from Cyber Attacks and Threats
Yuval Illuz, ECI Telecom
FIDO Alliance
The Future of Authentication (is Now)
Rolf Lindemann, Nok Nok Labs
Dr. Paul Madsen, Ping Identity
John Salter, Yubico

Cloud Security & Authentication
Michael Barrett, FIDO Alliance
Daniele Catteddu, ENISA
Jason Hart, SafeNet
Sampath Srinivas, Google
Software Defined Infrastructures - Compliance and Security
Defining your Path Towards a Software Defined Datacenter
Jason Hill, VMware
Mike Small, KuppingerCole
Ron Williams, IBM

Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
Mike Small, KuppingerCole
13:00-14:30 Lunch & Networking
Room: EXPO AREA
IAM/IAG Maturity
Moderator:
Dr. Horst Walther, KuppingerCole
Room: AUDITORIUM
Cyber Security Leadership
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Peter J. Wirnsperger, Deloitte
Room: AMMERSEE I
Internet of Things
Moderator:
Rob Newby, KuppingerCole
Room: ALPSEE
Secure Cloud
Moderator:
Mike Small, KuppingerCole
Room: AMMERSEE II
Finance Industry Round Table
Moderator:
Andrew Nash, KuppingerCole
Room: BODENSEE I
14:30-15:30
Measuring IAM/IAG Maturity
IAM/IAG Maturity Levels: Introducing the new KuppingerCole Maturity Level Ratings
Martin Kuppinger, KuppingerCole

From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly
John Barco, ForgeRock
Dr. Martin Kuhlmann, Omada
Darran Rolls, SailPoint
Marco Venuti, CrossIdeas
Edwin van der Wal, Everett
Beyond End-to-End-Encryption
The Next Generation of Privacy Tools: What can we expect?
Kim Cameron, Microsoft
Dr. Scott David, LL.M., KuppingerCole
Ladar Levison, Lavabit
Nat Sakimura, Nomura Research Institute
Internet of Everything (IoE) - Promise & Potential
Connecting the Real World with the Virtual World: Use Cases, Application Categories and Business Models for the IoE
Rob Newby, KuppingerCole
Hans Zandbelt, Ping Identity

Challenges from the Identities of Things
Ingo Friese, Deutsche Telekom AG
Cloud Identity
Cloud Identity & Access Management: Defining the Market
Mike Small, KuppingerCole

One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
Per Hägerö, neXus
Dr. Paul Madsen, Ping Identity
Bart Renard, VASCO Data Security
Don Schmidt, Microsoft
Max Waldherr, Dell Software
The Future Model of Banking
Roberto Baratta, Novagalicia Banco
Roman Chaplygin, PwC Russia
Dr. Iordanis Chatziprodromou, Swiss Re
Luis Saiz, BBVA
Lewis Tam, Ping An Insurance Group
Dirk Venzke, Commerzbank AG
15:30-16:30
IAM/IAG Maturity Assesment
Maturity Assessment Dos and Dont´s
Dr. Horst Walther, KuppingerCole

IAM/IAG Vendor & Solution Selection Process
Martin Waldbauer, E.ON Global Commodities SE
Application Security
Security Software as a Risk
Prof. Dr. Hartmut Pohl, softScheck GmbH

Application Security – Beyond Secure Configurations and Access Controls.
Peter J. Wirnsperger, Deloitte

Protecting your Applications Against the Threat of Attacks and Data Breaches
Prof. Dr. Hartmut Pohl, softScheck GmbH
Juergen Vollmer, Security & Quality Software GmbH
Peter J. Wirnsperger, Deloitte
Security in a M2M & IoT World
Security in a World of 50 Billion Connected Devices
Michelle Chibba, Office of the Information and Privacy Commissioner Ontario
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
Alex Kritikos, Software AG
Peter Niblett, IBM
Cloud Encryption
Searching over Encrypted Data in Cloud Database as a Service Environments
Dr. Andreas Schaad, SAP AG

Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
Paige Leidig, CipherCloud
Mike Small, KuppingerCole
16:30-17:00 Coffee & Networking
Room: EXPO AREA
17:00-18:00
IAM/IAG Maturity Best Practice
Do's and Don'ts for a Successful Identity Management Project (Manpower)
Rainer Knorpp, Devoteam

A Practitioner´s Recommendations for a Successful IAM Program
Dr. Horst Walther, KuppingerCole
Security Operations Center
Building your SOC: Realtime Security Intelligence On-Premise and/or as a Service?
Prof. Dr. Sachar Paulus, KuppingerCole

Plan, Build, run. What Makes up a Real SOC?
Reto Bachmann, Dell Software
Jason Hill, VMware
Amar Singh, KuppingerCole
IoE Privacy & Security
Unexpected and Complex Implications of the Internet of Everything (IoE)
Dr. Karsten Kinast LL.M., KuppingerCole
Jeff Stollman, Secure Identity Consulting

Security and Identity Challenges for the Internet of Everything
John Barco, ForgeRock
Paul Fremantle, WSO2
Jason Hart, SafeNet
Per Hägerö, neXus
Rob Newby, KuppingerCole
Geoff Webb, NetIQ
Cloud Best Practice
Efficiency Gains in the Cloud
Vladislava Toukalek, WMO

Embracing Cloud Services : Roadmap to Reality
Amol Sawarkar, International Federation of Red Cross and Red Crescent Societies (IFRC)
Roundtable: The Future Model of Banking (continued)
18:00-18:30 Closing Keynote
Prof. Dr. Sachar Paulus, Senior Analyst, KuppingerCole
Room: AUDITORIUM

Friday, 05/16/2014
08:30-10:00 Check-in & Registration
Room: HOTEL
Workshop I
Room: AMMERSEE I
Workshop II
Room: AMMERSEE II
Workshop III
Room: BODENSEE I & II
09:00-12:30 Understanding the Legal Framework for Using Big Data Approaches in Security Analytics
Dr. Karsten Kinast LL.M., KuppingerCole
Negotiating the Cloud Standards and Advice Jungle
Mike Small, KuppingerCole
FIDO Alliance Workshop - Business Track
Michael Barrett, FIDO Alliance
Rajiv Dholakia, Nok Nok Labs
Dr. Paul Madsen, Ping Identity
Dr. Kim Nguyen, D-Trust
12:30-13:30 Lunch Break
Room: HOTEL
13:30-16:00 Migrating Away from your Current Identity Provisioning Solution
Martin Kuppinger, KuppingerCole
Internet of Everything and Big Data: Benefits and how to Manage Risk
Mike Small, KuppingerCole
FIDO Alliance Workshop - Technical Tutorials
Dirk Balfanz, Google
Rolf Lindemann, Nok Nok Labs


© 2014 KuppingerCole