Linking IdM & GRC to Corporate Performance

European Identity Conference 2010
04.05. - 07.05.2010, Munich

Moderator:
Integrated Information Security, Risk and Compliance Management at Voith IT 05.05.2010 10:30-11:30
Integrated Information Security, Risk and Compliance Management at Voith IT
Rolf Strehle, Voith AG
IT Compliance and ISO 27001 Global IT-Security Strategy of Voith AG Success factor Awareness Campaign IT-Management System at Voith - field report

Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution
Darran Rolls, Sailpoint • Peter Weierich, Voelcker Informatik • Alberto Ocello, Engiweb Security • Nishant Kaushik, Oracle • Gerlinde Zibulski, SAP AG
User provisioning promised to streamline authorization processes and deliver cost benefits to IT departments. By shifting the focus from the authorization processes to access policies, the governance and compliance benefits begin to outweigh the technical benefits. This shift fundamentally changes the ROI calculation for an investment in IAM and the market will shift accordingly.

Access Governance: Tales from the Trenches 05.05.2010 11:30-12:30
Access Governance: Tales from the Trenches
Drs. Dennis van Ham, KPMG Advisory N.V.
Getting in control with regard to users and their authorizations is probably one of the most mentioned goals of IAM projects in the last couple of years. It sounds good, it feels good and it fits the GRC business speak perfectly. But many IAM projects have been and probably are struggling. Execution requires perseverance and effective change management. Due to budget cuts, project scope changes and seemingly everlasting emerging technologies the desired business ability to prove being in...

Risk & Identity Services � How do they fit?
Keith Grayson, SAP
When does Identity Risk become material to the business? How do we know when such risks become realized? Where do IT GRC controls appear in a multi-level risk strategy? These are some of the questions that large organizations are starting to ask. We present some answers for debate on this topic.

Panel: Identity Management as a GRC Endpoint
Priska Altorfer, wikima4 AG • Deepak Taneja, Aveksa • Jackson Shaw, Quest Software
Ships that pass in the night, and speak each other in passing, only a signal shown, and a distant voice in the darkness; So on the ocean of life, we pass and speak one another, only a look and a voice, then darkness again and a silence." Is this an accurate description of identity management and GRC projects? Or, are identity management and GRC projects so closely related that there are no identity management projects but just GRC projects? In this session Jackson Shaw will discuss the...

© 2011 Kuppinger Cole Ltd.