English   Deutsch   Русский   中文    

Information

Language:
English
Date:
May 05 - 08, 2015
Location:

Dolce BallhausForum
Andreas-Danzer-Weg 1
85716 Unterschleißheim, Munich
Registration fee:
€1980.00
plus 19% VAT
€  $ 







EIC 2015 Topics Overview

Digital Risk

While information products and services of the digital economy require information infrastructure to be increasingly shared across jurisdictions and sectors, we are being faced with a rapidly evolving array of digital risk. In this track moderated by KuppingerCole Analysts Dr. Scott David and Dr. Karsten Kinast, lawyers and experts in privacy & IT law, CSOs/CISOs, GRC practitioners and IT professionals will learn how to assess and ultimately manage and mitigate digital risks through a holistic approach. Holistic, because we cannot solve privacy without simultaneously solving other information risk issues, as security, privacy and liability are each key to solving the others.

Identity & Access Management / Governance

Identity & Access Management (IAM) today first and foremost is an organizational challenge and is in need for a leadership that understands the governance approach to meet the challenges of digital risk. But after all, IAM/IAG also remains to be a technological challenge. This track will help IAM/IAG professionals, security experts and project managers assess their current improvement needs and prepare for the digital transformation, where employee IAM will only be the smallest part of the game.

Architecting the Digital Enterprise

Securing the digital enterprise in a way that is light and agile enough to remain flexible and competitive is creating complex architectural, technical and integration challenges for IT professionals. What can we do now to support the transformational period from analog to digital business? What standards will be critical to support in future time? What are the steps to be taken now? This track is focused on the information security part of the digital business and will give you valuable and actionable advice.

Connected World

In a connected world, with billions of devices going online and creating sensitive information, there is only one way to solve the privacy issue: empowering the user. EIC is the only information security related event where User Managed Identity & Access and Life Management concepts are proposed as a sine qua non element of any digital business. In this track, you will meet with the user empowerment vanguard and find out, how this concept will change the way you think about digital business.

Monday, 05/04/2015
14:00-18:00 Complimentary Seminar
FIDO Alliance Update

Tuesday, 05/05/2015
09:00-13:00
Forum Systems Workshop
The Foundations of API Security and API Gateway Technology
OpenID Foundation Workshop
Early Insight on Latest Innovations in Online Identity Standards
Kantara Workshop
Access Management 2.0 - Consent, Context, and User Engagement
Contextual Security Intelligence
Getting Smart With Security in the Age of Digital: Moving from Control to Monitoring
13:00-14:00 Lunch & Networking
14:00-16:00 Keynotes
16:00-17:00 Coffee & Networking
17:00-19:20 Keynotes
19:30-21:00 Snacks, Drinks & Networking / Evening Reception

Wednesday, 05/06/2015
08:30-09:50 Keynotes
10:00-11:00 Coffee & Networking
  Digital Risk
Identity & Access Management / Governance Architecting the Digital Enterprise Connected World
11:00-13:00 The New Risk Landscape: IT, Operational Technology and IoT
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Dr. Eric Cole, KuppingerCole
Mike Small, KuppingerCole
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
Mario Hoffmann, Fraunhofer AISEC
13:00-14:30 Lunch & Networking
14:30-18:30 Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
18:30-19:30 Keynotes
19:30-22:00 European Identity Awards Ceremony & Buffet Dinner

Thursday, 05/07/2015
08:00-18:00 Check-in & Registration
08:30-09:50 Keynotes
10:00-11:00 Coffee & Networking
  Digital Risk Identity & Access Management / Governance Architecting the Digital Enterprise Connected World
11:00-13:00 Designing, Developing and Deploying Sustainable Distributed Risk Solutions for your Enterprise
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Secure Information Sharing through Rights Management
Moderator:
Dr. David Goodman, KuppingerCole
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
13:00-14:30 Lunch & Networking
14:30-18:00 Managing Digital Risk: Deploying People, Standards, Metrics, and Enforcement
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Big Data Security Analytics
Moderator:
Dr. David Goodman, KuppingerCole
Securing Operational Technology (OT) and the Internet of Things (IoT)
Moderator:
John Sabo, OASIS Idtrust
Mike Small, KuppingerCole
18:00-18:30 Closing Keynote

Friday, 05/08/2015
 09:00-12:30 Access Governance Workshop
Matthias Reinwarth, KuppingerCole
Cloud Risk Assessment Workshop
Martin Kuppinger, KuppingerCole
Mike Small, KuppingerCole
Workshop III
tbd
12:30-13:30 Lunch Break
13:30-16:00 Access Governance Workshop
Matthias Reinwarth, KuppingerCole
Cloud Risk Assessment Workshop
Martin Kuppinger, KuppingerCole
Mike Small, KuppingerCole
User Empowerment Best Practices
Ronny Bjones, Microsoft
Joni Brennan, Kantara Initiative
Dr. Jan Camenisch, IBM Research
Marcel van Galen, Qiy Foundation
Dr. Anja Lehmann, IBM Research
Eve Maler, Forgerock
Bram Neuteboom, Qiy Foundation

© 2015 KuppingerCole