|
Agenda
Please note that presentations and other event materials are available only to registered participants.
You need to log in to be able to download them.
Tuesday, 05/10/2011 |
09:00-13:00 |
An Update and Overview of OpenID
John Bradley, OpenID Foundation, Kantara
Dr. Michael B. Jones, Microsoft
Anthony Nadalin, Microsoft
Axel Nennker, Telekom Innovation Laboratories
David Recordon, Facebook
Eric Sachs, Google
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
Ammersee I |
Database Governance Crash Course
Martin Kuppinger, KuppingerCole
Ammersee II |
Cloud Security Alliance (CSA): Cloud Controls Matrix
Thomas Loczewski, Cloud Security Alliance
Alpsee |
Security Thematic Interest Group, Organized by LSEC Security Innovation Network
Ulrich Seldeslachts, LSEC
Walchensee |
13:30-14:00 |
Opening Keynote
Tim Cole, KuppingerCole
Martin Kuppinger, Principal Analyst, KuppingerCole
Auditorium
|
14:00-14:30 |
Identity and Data Protection: Clearing up a Cloudy World with Open Standards
Dr. Laurent Liscia, Executive Director, OASIS
|
14:30-15:00 |
Secure Business Processes Need Strong Alignment of Business and IT
Wolfgang Hirsch, General Manager Global Competence Center Security, Siemens IT Solutions and Services GmbH
|
15:00-15:30 |
Data Protection and the Cloud
Prof. Dr. Friedrich Holl, Senior Analyst, KuppingerCole
Martin Kuppinger, Principal Analyst, KuppingerCole
|
15:30-16:00 |
Bringing Enterprise Applications into the Cloud
Maurizio Griva, Reply S.p.A.
|
16:30-17:00 |
Polishing the Crystal Ball: Where is Identity Heading?
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
|
17:00-17:30 |
The Woods are Lovely, Dark, and Deep, But I have Promises to Keep, And Miles to go Before I Sleep
Jackson Shaw, Identity Management Expert, Dell
|
17:30-18:00 |
eID and the Cloud - Challenges we Face
Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
|
18:00-18:30 |
The Future of Information Security Today
Jörg Asma, Partner, KPMG
|
18:30-19:00 |
Risk Based Authentication and Access Control
Henk van der Heijden, VP Solution Sales Security, CA Technologies
|
Wednesday, 05/11/2011 |
08:30-09:00 |
Integrated Identity Management
Dave Kearns, Senior Analyst, KuppingerCole
|
09:00-09:30 |
Global Risks and How to Prepare
Rolf von Roessing, International Vice President, ISACA
|
09:30-10:00 |
Forward Strategies to Protect Corporate Data in Clouds
Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
|
10:29-16:30 |
Identity Management World Café: Integrated IdM - and how to get there
Dave Kearns, Senior Analyst, KuppingerCole
Expo Area
|
|
Managing the New Risks
Moderator:
Jörg Asma, KPMG
John Hermans, KPMG
Auditorium |
In Cloud We Trust
Moderator:
Dr. Laurent Liscia, OASIS
Alpsee |
Integrated Identity Management - Best practices for Implementing and Optimizing all Core IdM Elements
Moderator:
Dave Kearns, KuppingerCole
Ammersee I |
Directories & Federation
Moderator:
Mike Small, KuppingerCole
Ammersee II |
10:30-11:30 |
Assessing the Risks of Cloud Computing
John Hermans, KPMG
Reality Check: What are the Worst Cases of Data Breaches that Happened in 2010?
Jelle Niemantsverdriet, Verizon Business Security Solutions
|
Harnessing the Impact of Cloud Computing
Dr. Marnix Dekker, ENISA
Chiemi Hayashi, The World Economic Forum
Fran Maier, TRUSTe
John Sabo, CA Technologies
|
Adopting IAM Standards in the Enterprise
Gerry Gebel, Axiomatics Americas
Michael Kleinhenz, tarent AG
Alberto Ocello, Crossideas
Darran Rolls, SailPoint
Jonathan Sander, Quest Software
Global IAM Approach for better Compliance and Governance: Why Managing Identities will not Solve the Issue.
Stéphane Vinsot, Evidian
|
Directory Services, Virtual Directory Services, and the Cloud – Directory Strategy 2020
Martin Kuppinger, KuppingerCole
The Future of Virtual Directory Services - An Interview with Martin Kuppinger
Martin Kuppinger, KuppingerCole
Michel Prompt, Radiant Logic
The End of the IT Dictatorship - An Interview with Martin Kuppinger
Joe Baguley, Quest Software
Martin Kuppinger, KuppingerCole
|
11:30-12:30 |
Anti-Fraud in the Banking Industry - A Practical Approach
Jules Jerome, Dexia Banque Internationale à Luxembourg
Managing the Business Risk of Fraud
Jules Jerome, Dexia Banque Internationale à Luxembourg
Christian Patrascu, Oracle Corp.
Christian Zander, protected-networks.com
|
The Deployment of Large-Scale, Trusted Cloud Environments
Jon Geater, Thales e-Security
Gershon Janssen, OASIS Open Standards Group
Darren Platt, Symplified
|
Integrated Identity & Access Management World Café
Dave Kearns, KuppingerCole
|
How to do Authentication for the Private, Hybrid, and Public Cloud - Secure, Unified, Flexible
Judith Littel, CloudID
Mark O'Neill, Axway
Sebastian Rohr, KuppingerCole
Travis Spencer, Ping Identity
Thomas C Stewart, SecureAuth
Federation: Lessons Learned
Matthew Gardiner, Kantara Initiative
Nishant Kaushik, Oracle
Travis Spencer, Ping Identity
|
|
Information Governance
Moderator:
Jörg Asma, KPMG
John Hermans, KPMG
Auditorium |
Cloud Standards Adoption
Moderator:
Mike Small, KuppingerCole
Alpsee |
Centralized Authorization; Authentication
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Ammersee I |
Best Practices
Moderator:
Sebastian Rohr, KuppingerCole
Ammersee II |
14:00-15:00 |
Information Rights Management, Information Risk Management
Prof. Dr. Eberhard von Faber, T-Systems
Thilo Müller, E.ON IS
Prof. Dr. Sachar Paulus, KuppingerCole
|
Securing the Cloud, Preventing Lock-in - Are Open Cloud Standards the Answer?
Mike Small, KuppingerCole
Cloud Standardization: From Open Systems to Closed Clouds?
Marcus Lasance, Verizon Business
Gregor Petri, CA Technologies
Gary Thompson, CLOUD, Inc.
|
Externalized Authorization - Use Cases and Roadmap
Martin Kuppinger, KuppingerCole
Michel Prompt, Radiant Logic
Panel: XACML and Beyond - Solutions for a New Need-to-Share Paradigm
Gerry Gebel, Axiomatics Americas
Doron Grinstein, BITKOO
|
IAM Services@Daimler: A continuous Journey
Udo Guenther, Daimler AG
Information Governance at Work - Using iDevices in the Hospital
Andrew Turner, UK National Health Service (NHS)
|
15:00-16:00 |
Database Governance: Managing Risks at all Levels, Including your DBMS
Martin Kuppinger, KuppingerCole
Database Security Use Cases and Best Practices
Michael Bürger, Oracle
|
Cloud Provider Assurance Metrics
Mike Small, KuppingerCole
Combating Online Fraud – BT’s Managed Fraud Reduction Service
Peter Boyle, BT
Dr. Robert McCausland, BT
|
Managing Identities Once – Active Directory-Focused Centralization
Yvo van Doorn, Likewise Software
Jackson Shaw, Dell
Michael Wirth, Microsoft
|
Identity Management Implementations, Telco Industry Implementation of Identity Management at Telefónica O2 Czech Republic
Jakub Balada, Siemens IT Solutions and Services
Vit Radek, Telefónica O2 Czech Republic
IAM in Telenor -- Strategies and Execution
André Arnes, Telenor Key Partner
|
16:30-17:30 |
Business-Driven Security for SAP Environments
Tim Dunn, CA Technologies
Frank Fischer, Accenture
Keith Grayson, SAP
Dr. Barbara Mandl, Daimler AG
Lorenzo Mastropietro, Piaggio & C S.p.a.
|
Personal Clouds - Linking Web and Reality
Marcel van Galen, Qiy Foundation
Iain Henderson, Mydex Community Interest Company
Drummond Reed, Connect.Me
Luc Vervenne, Synergetics NV/SA
|
Integrated Identity Management: Presentation of the results from the EIC 2011 World Café
Dave Kearns, KuppingerCole
|
Best Practice for a Successful Implementation of an Identity Management System at a Global Player
Stephanie Jaecks, Bayer BBS
Security and IAM from an Enterprise Architecture Perspective
Ingo Arnold, Novartis
|
17:30-18:00 |
When Trust is not Enough
Nishant Kaushik, Lead Strategist, Identity and Access Management, Oracle
Auditorium
|
18:00-18:30 |
Cloud Computing - Dos and Don'ts For Your Adoption
Lothar Wieske, Enterprise Architect, DB Systel GmbH
|
Thursday, 05/12/2011 |
08:30-09:00 |
The Role and its Leading Role in Identity & Access Governance
Niels von der Hude, Director Market Development, Beta Systems Software
|
09:00-09:30 |
Secrecy in the Post Wikileaks Era
Dr. Emilio Mordini, CEO, Centre for Science, Society and Citizenship CSSC
|
09:30-10:00 |
Identity and Access Management: A Balance between Governance and Technology
Dr. Barbara Mandl, Senior Manager, Daimler AG
|
10:29-15:00 |
International Privacy and IT Security Law - Crash Course for IT Professionals
Dr. Jörg Hladjk, International Privacy and Information Management Practice, Hunton & Williams LLP
Walchensee
|
|
Governance, Risk Management & Compliance (GRC)
Moderator:
Jörg Asma, KPMG
John Hermans, KPMG
Auditorium |
Cloud Governance
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Alpsee |
Consumer Identity
Moderator:
Prof. Dr. Friedrich Holl, KuppingerCole
Ammersee I |
Best Practices - Mobile Identity
Moderator:
Tim Cole, KuppingerCole
Ammersee II |
10:30-11:30 |
Finding a Lean Approach to GRC
Lars Hartke, KPMG
Corporate Security Governance Framework Considerations
Martin Kuppinger, KuppingerCole
Prof. Dr. Heinz-Dieter Schmelling, Portigon AG
|
Cloud Governance Primer
Prof. Dr. Sachar Paulus, KuppingerCole
Finding the Right Approach to Cloud Governance
Mike Small, KuppingerCole
Governance as a Cloud Service – Will that Work?
Alberto Ocello, Crossideas
Prof. Dr. Sachar Paulus, KuppingerCole
|
Identity and Claims Brokers
Andrew Nash, PayPal
Focusing on the Customer - Identity Management and B2C Scenarios
Wolfgang Jodl, BMW Group
Dr. Heiko Klarl, iC Consult GmbH
|
Mobile Identity - Information Security Risks and Best Practice
Jörg Heuer, Deutsche Telekom Laboratories
Ulrich Seldeslachts, LSEC
Thomas C Stewart, SecureAuth
Johan Tullberg, Ubisecure Solutions Inc
Future Mobile Wallet
Jörg Heuer, Deutsche Telekom Laboratories
|
11:30-12:30 |
Identity Governance - Creating Business Value and Solving Compliance Challenges
Dr. Martin Dehn, KOGIT GmbH
Alberto Ocello, Crossideas
Darran Rolls, SailPoint
Deepak Taneja, Aveksa
Rudolf Wildgruber, Siemens IT Solutions and Services GmbH
|
Cloud Governance Use Cases Seen from the User and the Vendor View: What are the Misfits and how can we Overcome them?
Ralf Knöringer, Atos IT Solutions and Services GmbH
Dr. Andreas Lang, T-Systems
Dr. Barbara Mandl, Daimler AG
|
Quo Vadis Open ID
Larry Drebes, Janrain
David Recordon, Facebook
Eric Sachs, Google
Don Thibeau, OpenID Foundation
|
Massively Scalable IdM Architecture for Telcos
Fulup Ar Foll, Oracle / Kantara
Wholesale Application Community's Identity Network Enabler
Jörg Connotte, Deutsche Telekom AG
Axel Nennker, Telekom Innovation Laboratories
|
|
Audit-Proof Access Management
Moderator:
Jörg Asma, KPMG
John Hermans, KPMG
Auditorium |
Cloud Security
Moderator:
Mike Small, KuppingerCole
Alpsee |
Privacy
Moderator:
Prof. Dr. Friedrich Holl, KuppingerCole
Ammersee I |
Best Practices IV
Moderator:
Tim Cole, KuppingerCole
Ammersee II |
14:00-15:00 |
Access Management: Policies and Standards
Lars Hartke, KPMG
Building Blocks for a Complete Access Management Strategy and Implementation
Stefan Dodel, Oracle
Martin Kuppinger, KuppingerCole
Maarten Stultjens, BHOLD Company B.V.
Heinrich Wilking, Turnkey Consulting
|
Architectural Patterns for the Intersection of IAM and Cloud Computing
Idan Shoham, Hitachi ID Systems
Cloud Identity and Security
Michael Kranawetter, Microsoft
Eric Litowsky, Microsoft
|
The German National Digital ID and it´s Exemplarity for Other Countries
Dr. Stephan Humer, UdK Berlin
Consumer and Citizen Identities: Government Issued or Trust Frameworks?
Maarten Wegdam, Novay
|
Meeting the Challenge of Creating an Authorisation Architecture in a SOA Environment
Stefan Rusche, Generali Deutschland Informatik Services
Authentication and Authorization Services and Co-operation within the Finnish National and Governmental Bodies
Reetta Järvinen, Tax Authority Finland
|
15:00-16:00 |
Enabling the Access-Aware Organization
Martin Kuppinger, KuppingerCole
Establishing an IT Governance Framework
Prof. Dr. Sachar Paulus, KuppingerCole
|
Identity and Access in the Cloud
Joe Baguley, Quest Software
Nelson Cicchitto, Avatier
Nishant Kaushik, Oracle
Gregor Petri, CA Technologies
Darran Rolls, SailPoint
Idan Shoham, Hitachi ID Systems
|
Identity Assurance Frameworks Are Now Upon Us. But What Are They For?
Matthew Gardiner, Kantara Initiative
Trust Frameworks vs. Government eID Solutions
Dirk Arendt, OpenLimit SignCubes AG
Dr. Teodor Dumitrescu, Siemens IT Solutions and Services
Dr. Stephan Humer, UdK Berlin
Colin Wallis, Internal Affairs Dept, New Zealand Government
Maarten Wegdam, Novay
|
Ensuring Appropriate Data Usage: IDM at EnBW
Eleni Richter, EnBW
User Provisioning: Self-Service Secrets of the Masters
Philip Irby, Major US Insurance Broker
|
16:30-17:30 |
Access Management Best Practice: Fiducia
Marek Chroust, COGULA Management Consulting
Armin Schönherr, Fiducia
Lessons Everyone Should Learn from the Finance Industry
Martin Kuppinger, KuppingerCole
|
Privacy Protected Authentication and Authorisation
Ronny Bjones, Microsoft
Prof. Dr. David Chadwick, University of Kent
Dr. Gregory Neven, IBM Research - Zurich
|
Kantara Trust Framework Model
John Bradley, OpenID Foundation, Kantara
Don Thibeau, OpenID Foundation
Colin Wallis, Internal Affairs Dept, New Zealand Government
The Human Factor in eID-Solutions
Prof. Dr. Friedrich Holl, KuppingerCole
|
How much Federation do we Need? Manageability of Diversity in Different Federated IDM-Services at KIT
Sebastian Labitzke, Karlsruhe Institute of Technology (KIT)
An Identity Provider for the Swiss Insurance Broker B2B Market
Thomas Kessler, Temet AG
Peter Kleinert, IG B2B
EUReID: The Pan-European Network of eID Practitioners
Vassilia Orfanou, EUReID Consulting Team
|
17:30-18:00 |
What We Can Expect to See at EIC 2012
Tim Cole, KuppingerCole
Gerry Gebel, President, Axiomatics Americas
Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
Auditorium
|
Friday, 05/13/2011 |
|
Workshop Track I
Pilsensee |
Workshop Track II
Chiemsee |
Workshop Track III
Bodensee II |
Workshop Track IV
Bodensee I |
09:00-12:00 |
Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA
|
Trust Framework Model and IdM Summit - produced by Kantara Initiative and OIX
John Bradley, OpenID Foundation, Kantara
Fulup Ar Foll, Oracle / Kantara
Ingo Friese, Deutsche Telekom AG
Matthew Gardiner, Kantara Initiative
Iain Henderson, Mydex Community Interest Company
Rainer Hörbe, Kantara Initiative
Don Thibeau, OpenID Foundation
Colin Wallis, Internal Affairs Dept, New Zealand Government
|
Information Security in the Cloud
Vernon Poole, Sapphire
Mike Small, KuppingerCole
|
Personal Information Ecosystem
Iain Henderson, Mydex Community Interest Company
Dr. Scott David, LL.M., K&L; Gates LLP
Drummond Reed, Connect.Me
Luc Vervenne, Synergetics NV/SA
|
13:30-16:00 |
Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA
|
Trust Framework Model and IdM Summit - produced by Kantara Initiative and OIX
John Bradley, OpenID Foundation, Kantara
Fulup Ar Foll, Oracle / Kantara
Ingo Friese, Deutsche Telekom AG
Matthew Gardiner, Kantara Initiative
Iain Henderson, Mydex Community Interest Company
Rainer Hörbe, Kantara Initiative
Don Thibeau, OpenID Foundation
Colin Wallis, Internal Affairs Dept, New Zealand Government
|
Directories & Federation
Michael Schwartz, GLUU
Travis Spencer, Ping Identity
|
Information Rights Management
Petter Bergstroem, Microsoft Deutschland GmbH
Michael Wirth, Microsoft
|
|