European Identity & Cloud Conference 2015 |
05/06/2015 11:00-12:00 |
Security for the Digital Business IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom |
More |
05/07/2015 14:30-15:30 |
Dynamic Authorization The Future of Authorization |
More |
European Identity & Cloud Conference 2014 |
05/14/2014 15:30-16:30 |
IAM/IAG Vendor Landscape The 5 Critical Tenets of Identity and Access Management |
More |
05/14/2014 17:30-18:30 |
Access & Data Governance What Is the Level of Detail, an IAM Solution Must Cover? |
More |
05/15/2014 14:30-15:30 |
Measuring IAM/IAG Maturity From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly |
More |
European Identity & Cloud Conference 2013 |
05/15/2013 11:30-12:30 |
Going beyond static Assignments Access Governance: How to Govern all Access |
More |
05/15/2013 14:00-15:00 |
SAML, OAuth, SCIM, XACML OASIS Panel: ID Protocols – Out with the Old and in with the New? |
More |
05/15/2013 15:00-16:00 |
Access Intelligence: The New Standard Feature of Access Governance? |
More |
05/16/2013 14:00-15:00 |
Echo in the Silo: The Pitfalls of Managing IAM for Enterprise, Cloud and Mobile |
More |
05/16/2013 14:00-16:00 |
Fighting Hydra – Strategies for Audit and Control of large Numbers of Applications |
More |
European Identity & Cloud Conference 2012 |
04/18/2012 11:30-12:30 |
The Future IT Organization The Future of Identity & Access Management: Embrace, Extend - and don't Replace? |
More |
04/18/2012 15:00-16:00 |
SCIM Simple Cloud Identity Management (SCIM) |
More |
04/19/2012 14:00-15:00 |
Access Intelligence Beyond the Pioneer Approaches - The next Level in Access Governance and Risk |
More |
04/19/2012 15:00-16:00 |
Federation vs. Synchronization Federation or Synchronization – the Future of the Cloud |
More |
European Identity Conference 2011 |
05/11/2011 10:30-11:30 |
Adopting IAM Standards in the Enterprise |
More |
05/12/2011 11:30-12:30 |
Identity Governance - Creating Business Value and Solving Compliance Challenges |
More |
05/12/2011 15:00-16:00 |
Identity and Access in the Cloud |
More |
European Identity Conference 2010 |
05/04/2010 17:00-17:30 |
Next-Generation Provisioning: A Governance-based Approach |
More |
05/05/2010 10:30-11:30 |
Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution |
More |
05/05/2010 14:00-15:00 |
Simplifying & Streamlining Access Delivery while Embedding Governance through Preventative Control. |
More |
European Identity Conference 2009 |
05/05/2009 14:30-15:00 |
Is there a difference between the European way of doing IAM/GRC and „the rest of the world“? If yes, why? And what?” |
More |
05/07/2009 10:30-11:30 |
Role Lifecycle Management Role Lifecycle Management: Making Role Concepts Work |
More |
05/07/2009 15:00-16:00 |
Seeing the Big Picture: Context-Based Authentication |
More |
05/07/2009 16:30-17:30 |
Standards for Policies and Risk Management: What do we have, what do we need? |
More |
2nd European Identity Conference |
04/23/2008 14:00-15:00 |
Panel: New School Access Compliance and Risk Management Innovation |
More |
04/24/2008 14:00-15:00 |
Business Roles - Methods and Tools Enterprise Role Management instead of Identity Role Management? |
More |
04/25/2008 14:00-15:30 |
The Role of Roles in Compliance – A Practical Approach |
More |
04/25/2008 16:00-17:30 |
The Role of Roles in Compliance – A Practical Approach |
More |