| European Identity & Cloud Conference 2015 |
| 05/05/2015 17:20-17:40 |
The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value |
More |
| 05/07/2015 14:30-15:30 |
New Security Solutions for the Enterprise What If the Future of Security Means Not Knowing It’s There? |
More |
| European Identity & Cloud Conference 2013 |
| 05/14/2013 14:40-15:00 |
Mortality & Morbidity Findings for Identity Management |
More |
| 05/15/2013 10:30-11:30 |
Moving from Confusion to Clarity: Next Generation Cloud and Mobile Identity Management |
More |
| 05/15/2013 11:30-12:30 |
Going beyond static Assignments Access Governance: How to Govern all Access |
More |
| European Identity Conference 2011 |
| 05/10/2011 17:00-17:30 |
The Woods are Lovely, Dark, and Deep, But I have Promises to Keep, And Miles to go Before I Sleep |
More |
| 05/11/2011 15:00-16:00 |
Managing Identities Once – Active Directory-Focused Centralization |
More |
| European Identity Conference 2010 |
| 05/05/2010 11:30-12:30 |
Panel: Identity Management as a GRC Endpoint |
More |
| 05/06/2010 09:30-10:00 |
The Most Valid Wins of IAM |
More |
| European Identity Conference 2009 |
| 05/06/2009 17:30-18:00 |
Identity Management & GRC - A Powerful Team? |
More |
| 05/07/2009 14:00-15:00 |
Beyond Passwords: Tokens, Biometrics and Other Authentication Factors |
More |
| 2nd European Identity Conference |
| 04/23/2008 15:00-16:00 |
How to avoid internal Fraud I Rogue Trading and the changing Face of Threats |
More |
| 04/23/2008 17:30-18:00 |
Tenets of Identity Management |
More |
| 04/24/2008 11:30-12:30 |
Virtual Directories and Beyond |
More |