|
待办项
请注意演讲文档和其他的活动文档仅仅对注册的参加人员提供
您需要登录之后才可以下载
星期二, 2010年05月04日 |
09:00-13:00 |
Kantara Initiative Public Workshop: Making the World Safe for User-Managed Access
Eve Maler, PayPal Inc.
Galaxis |
Moving beyond the Perimeter: Identity & Access Management for a Networked World
Sebastian Rohr, KuppingerCole
Solaris |
Cloud Computing - Answers to 10 Security Questions you Should Ask
Blake Dournaee, Intel
Prof. Dr. Sachar Paulus, KuppingerCole
Mike Small, KuppingerCole
Antares |
EEMA Public Workshop: Cloud Computing Services - An Introduction and Tutorial
Martin Kuppinger, KuppingerCole
Stuart McRae, IBM
Helios |
13:30-14:00 |
Opening Keynote
Tim Cole, KuppingerCole
Martin Kuppinger, Principal Analyst, KuppingerCole
IMAX
|
14:00-14:30 |
IT is not Enough
Peter Ligezinski, CIO, Allianz Investmentbank AG
|
14:30-15:00 |
What Business has to Learn, so that IT can Align
Dr. Rainer Janßen, CIO, Munich Re
|
15:00-15:30 |
Trust in the Cloud
John Hermans, Associate Partner, KPMG
|
15:30-16:00 |
Convergence: Better Control, Lower Cost
Dave Kearns, Senior Analyst, KuppingerCole
|
16:30-17:00 |
Federated Directory meets Minimal Disclosure: Mortal Enemies or Soul Mates?
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
|
17:00-17:30 |
Next-Generation Provisioning: A Governance-based Approach
Darran Rolls, Chief Technology Officer, SailPoint
|
17:30-18:00 |
National ID Documents Driving eApplications / eBusiness
Sabine Erlinghagen, Vice President & General Manager Identity Management & Biometrics, Siemens IT Solutions and Services
|
18:00-18:30 |
Six Sigma For the Secure Cloud-Equip the Enterprise for Success
Gerry Gebel, President, Axiomatics Americas
|
18:30-19:00 |
The Need of Preconfigured Business Processes for Identity Management and IT Compliance
Peter Weierich, Voelcker Informatik
|
星期三, 2010年05月05日 |
08:30-09:00 |
The Role as a Role Model
Niels von der Hude, Director Market Development, Beta Systems Software
|
09:00-09:30 |
Extending the Principles of Service-Oriented Security to Cloud Computing
John Aisien, Vice President of Product Management, Oracle Corporation
|
09:30-10:00 |
On Cloud 9 or Lost In (that) Space
Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
|
|
Linking IdM & GRC to Corporate Performance
调节者:
Jörg Asma, KPMG
John Hermans, KPMG
Galaxis |
Value Through Convergence - Consolidate for Better Value, Efficiency and Security
调节者:
Dave Kearns, KuppingerCole
Antares |
Enterprise Cloud Strategies
调节者:
Tim Cole, KuppingerCole
Helios |
Best Practices I
调节者:
Sebastian Rohr, KuppingerCole
IMAX |
10:30-11:30 |
Integrated Information Security, Risk and Compliance Management at Voith IT
Rolf Strehle, Voith AG
Panel: The Next Step of User Provisioning: Identity GRC as a Natural Evolution
Nishant Kaushik, Oracle
Alberto Ocello, Crossideas
Darran Rolls, SailPoint
Peter Weierich, Voelcker Informatik
Gerlinde Zibulski, SAP AG
|
5 Quick-Wins to Leverage your Existing Identity Infrastructure through Convergence
Dave Kearns, KuppingerCole
Martin Kuppinger, KuppingerCole
Data Governance and Access Governance
Brian Brannigan, Agreon
Paul Heiden, BHOLD COMPANY BV
Cris Merritt, Engiweb Security
Deepak Taneja, Aveksa
|
Cloud 2010 Opening Session: How to do Business in the Cloud – the Service Provider Perspective
Peter Arbitter, T-Systems International GmbH
Keith Grayson, SAP
Jordan Janeczko, Siemens IT Solutions and Services
The Review of Cloud Business Models and Demonstrations in Finance and Health Clouds
Victor Chang, National Health Service and University of Southampton
Prof. Dr. Dave De Roure, University of Southampton
Dr Gary Wills, University of Southampton
|
Identity Management & Cloud Computing in the Automotive Industry
Dr. Barbara Mandl, Daimler AG
Managed IAM Service Project at Piaggio
Lorenzo Mastropietro, Piaggio & C S.p.a.
|
11:30-12:30 |
Access Governance: Tales from the Trenches
Drs. Dennis van Ham, KPMG Advisory N.V.
Risk & Identity Services – How do they fit?
Keith Grayson, SAP
Panel: Identity Management as a GRC Endpoint
Priska Altorfer, wikima4 AG
Jackson Shaw, Dell
Deepak Taneja, Aveksa
|
Converging User-centric & Enterprise-centric IDs - a Conversation with Kim Cameron
Kim Cameron, Microsoft
Dave Kearns, KuppingerCole
Physical & Logical Access Convergence
Philip Hoyer, ActivIdentity
Ralf Knöringer, Atos IT Solutions and Services GmbH
|
Pairing Unpredictable Opportunities with Unknown Risk: Cloud Governance for Enterprise IT
Werner Braun, Siemens AG
Martin Kuppinger, KuppingerCole
Thomas C Stewart, SecureAuth
Panel: Private, Hybrid, Public – Which Cloud for What?
Pamela Dingle, Ping Identity
Mathias Kaldenhoff, Oracle
Dale Olds, Novell
|
Bringing BMW’s New Central Identity and Access Management System into Life
Dr. Andreas Neumann, Logica Deutschland
Jürgen Skerhut, BMW
Integrating Physical Access Control into Active Directory at King ICT, Croatia
Adrian Castillo, HID Global
Kristian Koljatic, KING ICT d.o.o.
Nino Talian, KING ICT d.o.o.
|
|
Mitigating Risk
调节者:
Jörg Asma, KPMG
John Hermans, KPMG
Galaxis |
Authentication & Authorization
调节者:
Felix Gaehtgens, Kuppinger Cole
Antares |
Cloud Computing: Compliance & Security
调节者:
Mike Small, KuppingerCole
Helios |
Best Practices II: Public Services, Health
调节者:
Tim Cole, KuppingerCole
IMAX |
14:00-15:00 |
Implementation of Access Rights Management - Effectiveness Meets Efficiency
Prof. Dr. Heinz-Dieter Schmelling, Portigon AG
Simplifying & Streamlining Access Delivery while Embedding Governance through Preventative Control.
Dr. Martin Dehn, KOGIT GmbH
Darran Rolls, SailPoint
Deepak Taneja, Aveksa
|
How to make your Software Security Architecture Future-Proof
Mehdi Bermy, OpenTrust
Kim Cameron, Microsoft
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Dale Olds, Novell
Rakesh Radhakrishnan, Oracle
|
Cloud Computing – Identity and Security Smog?
Mike Small, KuppingerCole
What the Identity Industry Should do to Improve Security for the Cloud
Ronny Bjones, Microsoft
Matthew Gardiner, Kantara Initiative
Nishant Kaushik, Oracle
Dr. Barbara Mandl, Daimler AG
Alberto Pricoli, Arcot GmbH
|
German National ID – Privacy by Design
Andreas Reisen, Federal Ministry of the Interior, Germany
The EC STORK Project - Approaches, Challenges, Results
Marc Sel, PwC Belgium
|
15:00-16:00 |
Panel: Reducing the Risk of Information Leaks: DLP, IRM or both?
John Aisien, Oracle Corporation
Prof. Dr. Eberhard von Faber, T-Systems
John Hermans, KPMG
Heuristic Approaches to Identity Risk Scoring
Cris Merritt, Engiweb Security
|
Attributes Centric Identity Architecture
Fulup Ar Foll, Oracle / Kantara
Improving the Security and Usability of OpenID
Ariel Gordon, Microsoft
|
Good Clouds and Bad Clouds
Liam Lynch, eBay Inc.
Panel: How to Efficiently Manage the Cloud
Joe Baguley, Quest Software
Martin Geier, BMC Software
Martin Kuppinger, KuppingerCole
Dr. Michael Pauly, T-Systems
|
SPOCS - Crossborder Access to eGovernment Services
Martin Spitzenberger, Austrian Federal Chancellery
Identity and Access Management at Munich University Hospital
Simon Leutner, University Hospital of Munich
Dr. Walter Swoboda, University Hospital of Munich
|
16:30-17:30 |
The Role of IAM for Compliance Intelligence - The Siemens Case
Volkhard Lorenz, Siemens IT Solutions and Services
Compliant Access Management at BearingPoint with SAP BusinessObjects Access Control
Matthias Fischer, BearingPoint GmbH
|
Regain Control of Your Perimeter in the Cloud
Blake Dournaee, Intel
Dr. Babak Sadighi, Axiomatics AB
Claims Based Identity and the Cloud
Vittorio Bertocci, Microsoft
|
The Fundaments of Effective Identity in the Cloud
Pamela Dingle, Ping Identity
Panel: Managing Privileged Identities in the Cloud
Shlomi Dinoor, Cyber-Ark Software
Peter Heintzen, Oracle
Philip Lieberman, Lieberman Software
Nimrod Vax, CA Technologies
|
From Creative Chaos to Modern Service Provisioning
Dr. Nicola Stein, German Aerospace Center
Migros Identity Management & SSO - Implementation and Perspectives
Rudolf Gisler, Migros
Dr. Peter Schill, SafeNet
|
17:30-18:00 |
Identity in the Cloud – Finding Calm in the Storm
André Durand, Founder & CEO, Ping Identity
|
18:00-18:30 |
Follow the Money: How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Dale Olds, Distinguished Engineer, Novell
|
18:30-19:00 |
An Information Society Perspective on Electronic Identity Management
Dr. Dirk van Rooy, Head of Sector, Trust and Security, European Commission, DG Information Society and Media
|
星期四, 2010年05月06日 |
08:30-09:00 |
Security, Automatization and Management Essentials for the Cloud
Richard Sharp, Director of Software Production, XenServer Group, Citrix Systems
|
09:00-09:30 |
IAM into the Cloud: Improving Security with Cloud and Collaboration Technology
Tim Dunn, Vice President - Security Business Unit, CA Technologies
|
09:30-10:00 |
The Most Valid Wins of IAM
Jackson Shaw, Identity Management Expert, Dell
|
|
Roles & Attributes
调节者:
Jörg Asma, KPMG
John Hermans, KPMG
Galaxis |
Privileged Access Management
调节者:
Prof. Dr. Sachar Paulus, KuppingerCole
Helios |
Virtualization and Infrastructure
调节者:
Sebastian Rohr, KuppingerCole
Antares |
Best Practices III
调节者:
Tim Cole, KuppingerCole
IMAX |
10:30-11:30 |
Implementing IdM with Roles Management in an Insurance Environment
Ron van Beers, Achmea
Attributes and Roles - Real World Observations and Future Trends
Dr. Heiko Klarl, iC Consult GmbH
|
Privileged Access Management (PAM) put into Context – Access Governance Strategy or just Tactics?
Martin Kuppinger, KuppingerCole
Panel: Privileged Identities - Identify, Delegate, Enforce, Audit
Jochen Koehler, CyberArk
Philip Lieberman, Lieberman Software
Nimrod Vax, CA Technologies
|
Virtualization Trends and Strategies – from Hype to Reality
Sebastian Rohr, KuppingerCole
Identity Issues of Virtualization
Mike Small, KuppingerCole
|
Venn and the Art of Data-Sharing
Eve Maler, PayPal Inc.
Business Oriented Entitlement Life-Cycle Management
Pekka Hagström, RM5 Software
Henrik Siiskonen, If P&C; Insurance Company Ltd
|
11:30-12:30 |
IAM Governance
Marko Vogel, KPMG
The Future of Mining Stable Business Roles
Dr. Martin Kuhlmann, Omada
Cris Merritt, Engiweb Security
|
Privileged Identity and Access Management at Daimler (TSS)
Daniel Rätsch, Daimler TSS
|
Manage Globally, Act Locally: How Context Virtualization will Change the Way We Secure Identities and Integrate Data
Dave Kearns, KuppingerCole
Michel Prompt, Radiant Logic
Directory Services in the Cloud
Felix Gaehtgens, Kuppinger Cole
Dave Kearns, KuppingerCole
Steve Shoaff, UnboundID
|
Orange France Telecom Identity Management Strategy (announcement)
Philippe Clément, Orange/France Telecom
From Plastic to Secured Bits - a Wallet for Virtual Cards on the Mobile Phone
Jörg Heuer, Deutsche Telekom Laboratories
|
|
Privacy & Regulation
调节者:
Jörg Asma, KPMG
John Hermans, KPMG
Galaxis |
Single Sign-on, Identity Federation
调节者:
Felix Gaehtgens, Kuppinger Cole
Helios |
Cloud Platforms & Data Portability
调节者:
Dave Kearns, KuppingerCole
Antares |
Best Practices IV
调节者:
Tim Cole, KuppingerCole
IMAX |
14:00-15:00 |
Which Technologies will Allow us to Protect Information Seamlessly in any Situation – at Rest, in Move, in Use?
Martin Kuppinger, KuppingerCole
What are the Conclusions from the latest Judgement on Identity Related Data Storage Drawn by the German Constitutional Court?
Dr. Michael Karger, Wendler Tremml Rechtsanwaelte
|
Inter-Organizational Federated Identity and Access Management in Swiss Higher Education
Thomas Lenggenhager, SWITCH
It has been Quiet around Federation. Is this a good Sign or a bad one?
André Durand, Ping Identity
Kåre Indroy, SAP
Martin Kuppinger, KuppingerCole
Thomas Lenggenhager, SWITCH
Dale Olds, Novell
|
Data Statelessness and the Continuum of Individuals' Data Portability on the Web
Eve Maler, PayPal Inc.
Panel Discussion: Social Data Portability
Drummond Reed, Connect.Me
Christian Scholz, COM.lounge GmbH
|
Login for the Mobile Internet - What new Challenges arise from Mobile Internet Usage?
Michael Gärtner, Deutsche Telekom AG
Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity
Jonas Hogberg, Ericsson
|
15:00-16:00 |
State of the Art in Privacy Enhancing Technologies
Liam Lynch, eBay Inc.
Eve Maler, PayPal Inc.
License to Mask
Dr. Johannes Wiele, TÜV Rheinland
|
Identity Management as a Service: Lessons Learned in Real World Implementations.
Dave Miller, Covisint
Christian Patrascu, Oracle Corp.
Guido Wittmann, Fischer International Identity
Trends in E-SSO: From a Tool to a Strategic Element
Peter Heintzen, Oracle
Philip Hoyer, ActivIdentity
|
Panel: Business/Cloud portability
Pamela Dingle, Ping Identity
Shlomi Dinoor, Cyber-Ark Software
Gerry Gebel, Axiomatics Americas
François Lascelles, Layer 7 Technologies
Dr. Juergen Spitzner, Novell
|
Best Practices for Identity Management from the Annals of Private Banking
Integration of SAP in a Comprehensive Identity Management Solution for Access and Authorization Control with Enterprise Roles
Rüdiger Berndt, Oxford Computer Group Deutschland
Dr. Uwe Vehlies, Hannover Re
|
16:30-17:30 |
Consumer Identity & Trust Networks Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps
Jaap Kuipers, DigiNotar BV
Maarten Wegdam, Novay
The Open Identity Trust Framework (OITF)
Anthony Nadalin, Microsoft
Internet Scale Trust and Openness
Kim Cameron, Microsoft
Eve Maler, PayPal Inc.
Anthony Nadalin, Microsoft
Andreas Reisen, Federal Ministry of the Interior, Germany
Maarten Wegdam, Novay
|
An Identity Provider to Manage Reliable Digital Identities in SOA and the Web
Ivonne Thomas, Hasso-Plattner-Institute
Identity Assurance - Challenges, Opportunities, Business Perspectives
Matthew Gardiner, Kantara Initiative
Thomas Lenggenhager, SWITCH
Drummond Reed, Connect.Me
Michael Schwartz, GLUU
|
Panel: Windows Azure, force.com, Google AppEngine, J2EE-based Approaches – What’s the Best Take for a Cloud Platform?
Vittorio Bertocci, Microsoft
Martin Kuppinger, KuppingerCole
Dr. Juergen Spitzner, Novell
|
Online Services and Identity Management – Driving Innovations through a Cross Sector Vision
Vincent Etchebarne, Orange Labs / France Telecom
Olivier Maas, Atos Worldline
|
17:30-18:00 |
The Future of IT Management in the Cloud Context - Massive Changes Ahead?
Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
|
星期五, 2010年05月07日 |
08:00-09:00 |
Information Card Foundation Birds of a Feather Meeting
Drummond Reed, Founder and Chairman, Connect.Me
Terra
|
|
Workshop Track I
Luna |
Workshop Track II
Antares |
Workshop Track III
Solaris |
Workshop Track IV
Helios |
09:00-12:00 |
Internet Trust & Government Issued eID Cards
Dr. Johannes Wiele, TÜV Rheinland
|
Implementing User-Centric Identity Management in Real-World Online Services Review of innovations in identity management: towards enhanced experience, trust and security for end-users and service providers
Kim Cameron, Microsoft
Jens Fromm, Fraunhofer FOKUS
Olivier Maas, Atos Worldline
Axel Nennker, Telekom Innovation Laboratories
Paul Trevithick, Azigo
Jean-Pierre Tual, Gemalto
|
Compliant IdM & SAP
Dr. Peter Gergen, SAP Deutschland AG & Co. KG
Klaus Reuther, KOGIT GmbH
|
Building Blocks for a Secure Multi-Tenant Cloud
Martin Kuppinger, KuppingerCole
Dale Olds, Novell
|
13:30-16:00 |
Directories Lab: Get the most out of it
Felix Gaehtgens, Kuppinger Cole
Abdi Mohammadi, Sun Microsystems
|
Implementing User-Centric Identity Management in Real-World Online Services The conditions for implementing innovative services : meeting users needs and organizing the ecosystem
Ludovic Francesconi, Cartes Bancaires CB
Paul Trevithick, Azigo
|
Architecting a holistic Service Lifecycle Management Solution Based on SAP NetWeaver Identity Management
Andreas Koch, HP
|
Claims & Cloud: Using Windows Identity Foundation in Windows Azure
Vittorio Bertocci, Microsoft
|
|