European Identity & Cloud Conference 2012 Agenda
Switch to Detailed ViewPlease note that presentations and other event materials are available only to registered participants.
You need to log in to be able to download them.
| Tuesday, April 17, 2012 | ||||
| 08:00-18:00 |
Check-in & Registration |
|||
| 09:00-13:00 |
A review of the Status of Key Internet Identity Protocols OpenID Connect, OAuth 2.0 and Account Chooser
John Bradley, OpenID Foundation, Kantara
Dr. Michael B. Jones, Microsoft
Axel Nennker, Telekom Innovation Laboratories
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
Kick Willemse, OpenID Foundation
|
OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
John Sabo, CA Technologies
Anil Saldhana, Red Hat Inc.
Mike Small, KuppingerCole
|
ISACA Workshop: Cloud Assurance
Marc Vael, ISACA
|
Kantara Initiative Summit
John Bradley, OpenID Foundation, Kantara
Joni Brennan, Kantara Initiative
Dr. Maciej Machulak, Cloud Identity Limited
Christine Runnegar, ISOC
Nat Sakimura, Nomura Research Institute
Colin Wallis, Internal Affairs Dept, New Zealand Government
|
|
Room: Wörthsee |
Room: Alpsee |
Room: Walchensee |
Room: Galerie |
|
| 14:00-14:40 |
Opening Keynote Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: Auditorium |
|||
| 14:40-15:00 |
"Che cosa sono le nuvole?” (What are the clouds?) Dr. Emilio Mordini, Chair, Responsible Technology SAS
Room: Auditorium |
|||
| 15:00-15:20 |
eID new challenges with Digital Agenda and Cloud Computing Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
Room: Auditorium |
|||
| 15:20-15:40 |
Conflicting Visions of Cloud Identity Kim Cameron, Chief Architect of Identity, Microsoft
Room: Auditorium |
|||
| 15:40-16:10 |
Interview: What are the Privacy and Information Security Challenges 2012 and Beyond? Roy Adar, Vice President of Product Management, CyberArk
Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)
Martin Kuppinger, Principal Analyst, KuppingerCole
Shirief Nosseir, Marketing Manager, CA Technologies
Jim Taylor, VP Identity and Security Management, NetIQ
Room: Auditorium |
|||
| 16:10-16:30 |
Coffee Break, Expo Area |
|||
| 16:30-16:50 |
Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Roy Adar, Vice President of Product Management, CyberArk
Room: Auditorium |
|||
| 16:50-17:10 |
Cloud, Consumerization & Identity: Time to Transform the Security Model Shirief Nosseir, Marketing Manager, CA Technologies
Room: Auditorium |
|||
| 17:10-17:30 |
Externalized Authorization - What is it Good for? Room: Auditorium |
|||
| 17:30-17:50 |
What Standards Have Done and Will Do for Cloud Identity Dr. Laurent Liscia, Executive Director, OASIS
Room: Auditorium |
|||
| 17:50-18:10 |
How do Today’s Technology Challenges make Real IAM Possible? Jonathan Sander, Director of IAM Business Development, Quest Software
Room: Auditorium |
|||
| 18:10-18:30 |
What About: Bring your own Device? Dr. Barbara Mandl, Senior Manager, Daimler AG
Room: Auditorium |
|||
| 18:30-18:50 |
Free Customers: The New Platform Doc Searls, Berkman Fellow, Berkman Center for Internet and Society at Harvard University
Room: Auditorium |
|||
| 18:50-19:10 |
Scaling Identity, Access, and Audit Controls to Internet Proportions Mike Neuenschwander, Sr. Director, Oracle
Room: Auditorium |
|||
| 19:10-19:30 |
Identity Management & Cloud Security – There’s a Workflow for That Patrick Parker, Founder and CEO, EmpowerID
Room: Auditorium |
|||
| 19:30-21:00 |
Snacks & Drinks, Expo Area |
|||
| Wednesday, April 18, 2012 | |||||
| 08:00-18:00 |
Check-in & Registration |
||||
| 08:30-09:00 |
Leveraging Identity to Manage Enterprise Change and Complexity Jim Taylor, VP Identity and Security Management, NetIQ
Room: Auditorium |
||||
| 09:00-09:30 |
Securing Critical Banking Infrastructures in the Age of Cyber Warfare Dr. Waldemar Grudzien, Director, Department Retail Banking and Banking Technology, Association of German Banks
Room: Auditorium |
||||
| 09:30-10:00 |
Information Security Governance in Banks: Delivering Actionable Recommendation to Management Berthold Kerl, Global Head of Identity and Access - CISO EMEA, Deutsche Bank AG
Room: Auditorium |
||||
| 10:00-10:30 |
Coffee Break, Expo Area |
||||
|
Making Information Security a Strategic Priority Moderator: Berthold Kerl, Deutsche Bank AG
|
Cloud Computing Audit Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
Brendan M. Peter, CA Technologies
|
What to Focus on for Future-Proof IAM Moderator: Craig Burton, KuppingerCole
|
Cloud Legal, Privacy, Data Protection I Moderator: Dr. Jörg Hladjk, Hunton & Williams LLP
|
Roundtable: Consumer Identity Moderator: Dave Kearns, KuppingerCole
|
|
|
Room: Auditorium |
Room: Alpsee |
Room: Ammersee 1 |
Room: Ammersee 2 |
Room: Galerie |
|
| 10:30-11:30 |
Cyber Crime, Cloud, Social Media... - IS Threats for Banks are Constantly Increasing: What should we be doing?
Berthold Kerl, Deutsche Bank AG
Facing the Online Threats against Retail and Banking Customers - What are the Future Perspectives?
Prof. Dr. Sachar Paulus, KuppingerCole
|
Addressing Cloud Audit, Assurance and Compliance Needs – A Progress Report
Dr. Marnix Dekker, ENISA
Anil Saldhana, Red Hat Inc.
Dr. Jane Siegel, Carnegie Mellon University Silicon Valley
|
Increase Value to the Business: The KuppingerCole IT Model
Martin Kuppinger, KuppingerCole
How IAM can Catalyze the Secure Enterprise
Craig Burton, KuppingerCole
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Mike Neuenschwander, Oracle
|
New EU Data Protection Rules: What will cause the most Pain, who will suffer and how can you gear up for them?
Dr. Jörg Hladjk, Hunton & Williams LLP
|
Consumer Identity Systems - Trends
John Bradley, OpenID Foundation, Kantara
Kim Cameron, Microsoft
Malcolm Crompton, Information Integrity Solutions
Susan Morrow, Avoco Secure Ltd
Colin Wallis, Internal Affairs Dept, New Zealand Government
A Review of the Status of key Internet Identity Protocols OpenID Connect, OAuth 2.0 and Account Chooser
John Bradley, OpenID Foundation, Kantara
Dr. Michael B. Jones, Microsoft
Axel Nennker, Telekom Innovation Laboratories
Barn-Rasing At Internet Scale: Trust Framework Development for Open Identity
Dr. Scott David, LL.M., K&L; Gates LLP
Anthony Nadalin, Microsoft
Drummond Reed, Connect.Me
Jeff Stollman, Secure Identity Consulting
Don Thibeau, OpenID Foundation
|
| 11:30-12:30 |
IT Strategies and Information Security in Banks - The Regulator´s View
Dr. Markus Held, Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin)
How to Address Regulatory Needs Fast and Lean
Dr. Waldemar Grudzien, Association of German Banks
Dirk Venzke, Commerzbank AG
Dr. Horst Walther, KuppingerCole
Wolfgang Zwerch, MunichRe
|
Global Perspectives on Cloud Auditing Challenges and Solutions
Steve Jones, Capgemini
Prof. Dr. Sachar Paulus, KuppingerCole
Marc Vael, ISACA
|
Winds of Change in your IT Organization: Get ready for the Future
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
Niels von der Hude, Beta Systems Software
Hassan Maad, Evidian
Mike Neuenschwander, Oracle
Alberto Ocello, Crossideas
Darran Rolls, SailPoint
Jonathan Sander, Quest Software
Jim Taylor, NetIQ
|
Unwanted Automated Profiling
Prof. Dr. Mireille Hildebrandt, Radboud University Nijmegen
Privacy Governance in Software Organizations
Prof. Dr. Dawn Jutla, Saint Mary´s University
|
|
| 12:30-14:00 |
Lunch Break, Expo Area |
||||
|
Making Information Security a Strategic Priority Moderator: Berthold Kerl, Deutsche Bank AG
|
Cloud Identity & Access Moderator: Mike Small, KuppingerCole
|
IAM Architecture |
Cloud Legal, Privacy, Data Protection II Moderator: Yohan Benizri, Sidley Austin LLP
|
Personal Data: Life Management Platforms Moderator: Martin Kuppinger, KuppingerCole
Doc Searls, Berkman Center for Internet and Society at Harvard University
|
|
|
Room: Auditorium |
Room: Alpsee |
Room: Ammersee 1 |
Room: Galerie |
Room: Ammersee 2 |
|
| 14:00-15:00 |
IAM Governance in the New Commerzbank
Dirk Venzke, Commerzbank AG
Munich Re’s Identity & Access Management - Experience Report and Best Practices
Wolfgang Zwerch, MunichRe
|
The Cornerstones of Information Security in the Cloud
Craig Burton, KuppingerCole
Extending your Identity & Access Management into the Cloud
Gerry Gebel, Axiomatics Americas
Bruce Macdonald, Hitachi ID Systems
Dr. Barbara Mandl, Daimler AG
Prabath Siriwardena, WSO2
Jim Taylor, NetIQ
|
Identity Federation Challenges and how to approach them
Thomas Gundel, IT Crew
Travis Spencer, Ping Identity
Colin Wallis, Internal Affairs Dept, New Zealand Government
Best Practice in Out-sourced Federation: WAYF
David Simonsen, WAYF
|
Avoiding hidden Clauses and other Pitfalls - How to Deal a Good Cloud Service Contract
Yohan Benizri, Sidley Austin LLP
|
Getting Personal: How can Each of us Live in a World of Corporate Silos — While also Building a World that Transcends them?!
Doc Searls, Berkman Center for Internet and Society at Harvard University
Giving Individuals Control and Knowledge of their Personal Information held by Others - What are the Consequences?
Prof. Dr. Kevin Cox, Edentiti
Dr. Scott David, LL.M., K&L; Gates LLP
Tony Fish, My Digital Footprint
Marcel van Galen, Qiy Foundation
Drummond Reed, Connect.Me
Trust Frameworks - Internet Identity - Life Management Platforms
Drummond Reed, Connect.Me
Markus Sabadello, XDI.ORG
Phil Windley, Kynetx
The GINI-SA Project of the EU
Lefteris Leontaridis, NetSmart S.A.
|
| 15:00-16:00 |
Delivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation Process
Dr. Waldemar Grudzien, Association of German Banks
Berthold Kerl, Deutsche Bank AG
Prof. Dr. Sachar Paulus, KuppingerCole
How to successfully get business to participate in IAM and Access Governance
Dr. Martin Kuhlmann, Omada
Edwin van der Wal, Everett
|
Is SCIM a Scam?
Craig Burton, KuppingerCole
Simple Cloud Identity Management (SCIM)
Trey Drake, UnboundID
Kurt Johnson, Courion Corporation
Darran Rolls, SailPoint
Travis Spencer, Ping Identity
|
PCI-DSS, SOX, Basel: How to Manage Privileged Access and Pass the Audit
Sharon Farber, CA Technologies
Jochen Koehler, CyberArk
|
Identity Provider Business Models
Axel Nennker, Telekom Innovation Laboratories
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
Sociality by Design: How Google, Facebook & Co. can reconcile Privacy and Profit
Dr. Stephan Humer, UdK Berlin
|
|
| 16:00-17:00 |
Coffee & Networking, Expo Area |
||||
| 17:00-18:00 |
Identity & Access Management as a Key Element for a Value focused Security Strategy
Ralf Knöringer, Atos IT Solutions and Services GmbH
Hassan Maad, Evidian
Shirief Nosseir, CA Technologies
Christian Patrascu, Oracle Corp.
Access Governance Case Study: Friends Life Realizes Quick Time To Value
Julia Bernal, Friends Life
|
Why you should not believe in Cloud-only Solutions
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
Cloud Identity Services - Models and Challenges
Martin Kuppinger, KuppingerCole
Andy Thurai, Intel
|
Single Point of Access: The IAM Strategy at Teleflex
Nick Sabinske, Teleflex
One Identity Service, Many Initiatives: Exploring Use Cases for Identity Virtualization
Nick Sabinske, Teleflex
Ulrich Schulz, Radiant Logic
|
How the EU handles Citizen Privacy at Present and how it will evolve in the Future
Dr. Alea Fairchild, Constellation Research Group
Panel: The Future of Citizen Privacy
Malcolm Crompton, Information Integrity Solutions
Dr. Alea Fairchild, Constellation Research Group
Prof. Dr. Reinhard Posch, Republic of Austria
|
QiY
Marcel van Galen, Qiy Foundation
Connect.Me
Drummond Reed, Connect.Me
PIB-d
John Harrison, PIB-d
|
| 18:00-18:20 |
How Mobility Clouds the Future and SOA / Web 2.0 gives way to the Cloud API André Durand, Founder & CEO, Ping Identity
Room: Auditorium |
||||
| 18:20-18:40 |
Top Challenges and Threats Security Managers Should Watch Out For Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
Room: Auditorium |
||||
| 18:40-19:00 |
How to build a Secure and Open Cloud Stephan Bohnengel, Sr. Specialist Systems Engineer Security, VMware
Room: Auditorium |
||||
| 19:00-21:00 |
European Identity Awards Ceremony & Buffet Dinner Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)
|
||||
| Thursday, April 19, 2012 | |||||
| 08:00-18:00 |
Check-in & Registration |
||||
| 08:30-09:00 |
How Identity Management and Access Governance as a Service make your Cloud Work and your Business more Agile Ralf Knöringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH
Room: Auditorium |
||||
| 09:00-09:30 |
The Future of Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet Prof. Dr. Kai Rannenberg, Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University in Frankfurt
Room: Auditorium |
||||
| 09:30-10:00 |
Trust and Complexity in Digital Space Dr. Jacques Bus, Secretary General, Digital Enlightenment Forum
Room: Auditorium |
||||
| 10:00-10:30 |
Coffee & Networking, Expo Area |
||||
|
Planning, Managing and Governing IAM & Cloud I Moderator: Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
|
Cloud Security Moderator: Mike Small, KuppingerCole
|
IAM Architecture Moderator: Dr. Horst Walther, KuppingerCole
|
Governance, Risk Management & Compliance (GRC) Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
|
Digital Enlightenment Forum Moderator: Dr. Jacques Bus, Digital Enlightenment Forum
|
|
|
Room: Auditorium |
Room: Alpsee |
Room: Ammersee 1 |
Room: Galerie |
Room: Ammersee 2 |
|
| 10:30-11:30 |
VRM and the Intention Economy: Now What?
Craig Burton, KuppingerCole
Dr. Scott David, LL.M., K&L; Gates LLP
Marcel van Galen, Qiy Foundation
Drummond Reed, Connect.Me
Doc Searls, Berkman Center for Internet and Society at Harvard University
Phil Windley, Kynetx
|
Providing and Maintaining a Secure Cloud Infrastructure - from Planning to Administration
Henning Arendt, @bc - Arendt Business Consulting
Prof. Dr. Clemens Jochum, Goethe-University Frankfurt, House of Finance
Aljosa Pasic, Atos Research & Innovation
Dr. Stefan Pühl, Dell
Mike Small, KuppingerCole
Juergen Urbanski, T-Systems
|
Re-engineering IAM to better serve your Business Needs
Martin Kuppinger, KuppingerCole
The Role of Open Source in Today´s IAM Infrastructure
Allan Foster, ForgeRock
Michael Kleinhenz, tarent AG
Martin Kuppinger, KuppingerCole
Building Identity & Access Management as a Public Administration Service for the Trento Autonomous Province
Fabrizio Russo, Trento Autonomous Province
|
How to Mature GRC Processes Before you Buy a GRC Tool
Berthold Kerl, Deutsche Bank AG
Prof. Dr. Sachar Paulus, KuppingerCole
Best Practice: IAM in a Complex and Security-Driven Environment
Alexander Kuehnemann, T-Systems International GmbH
|
Anonymous Credentials in Practice
Prof. Dr. Jaap-Henk Hoepman, Radboud University Nijmegen
What ABC4Trust can do for Privacy in eID
Dr. Ioannis Krontiris, Goethe University Frankfurt
Privacy Protection: Architecture does not compromise, but application often will - what can be done?
STORK: Technical Solution and Data Protection Considerations
Herbert Leitold, A-SIT, Graz University of Technology
eID Management in Australasia - What are the Paths taken und what may the Future hold?
Colin Wallis, Internal Affairs Dept, New Zealand Government
Minimal Disclosure: Achieving lift-off
Ronny Bjones, Microsoft
Kim Cameron, Microsoft
|
| 11:30-12:30 |
How the API Economy Leverages our Capabilities for Delivering Business Services
Craig Burton, KuppingerCole
Kim Cameron, Microsoft
Martin Kuppinger, KuppingerCole
API Economy: The Consumer View
API Economy: The Provider View
Dr. Steven Willmott, 3Scale
|
Customer Driven Cloud Services – What Cloud Customers need Providers to do to better align
Ian Lamont, Open Data Center Alliance
Paving the Way for Tomorrow´s Service Provisioning Architecture
Prof. Dr. Mohamed Hamdi, School of Communication Engineering
|
Identity & Access Governance (IAG): Building the Business Case & Implementation
Jethro Cornelissen, Rabobank International
Deployment of a Role Based Access Identity Management System in a University Hospital
Pierre François Regamey, CHUV – Centre Hospitalier Universitaire Vaudois
|
Identifying your Critical Information Assets. Moving from System Security to Information Security
Prof. Dr. Sachar Paulus, KuppingerCole
Managing Cloud Computing Access Risks
Kurt Johnson, Courion Corporation
Bruce Macdonald, Hitachi ID Systems
Deepak Taneja, Aveksa
|
|
| 12:30-14:00 |
Lunch Break, Expo Area |
||||
|
Planning, Managing and Governing IAM & Cloud II Moderator: Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
|
Cloud Security Moderator: Mike Small, KuppingerCole
|
IAM Architecture Moderator: Dr. Horst Walther, KuppingerCole
|
Governance, Risk Management & Compliance (GRC) II Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
|
Roundtable: Mobile Privacy and Security |
|
|
Room: Auditorium |
Room: Alpsee |
Room: Ammersee 1 |
Room: Galerie |
Room: Ammersee 2 |
|
| 14:00-15:00 |
From Virtualization to the Cloud and Beyond
Craig Burton, KuppingerCole
Martin Kuppinger, KuppingerCole
Security for Virtualized Environments, Privileged Users and PCI Compliance
Guy Balzam, CA Technologies
Stephan Bohnengel, VMware
Giovanni Ciminari, Telecom Italia
|
Eyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control them
Mike Small, KuppingerCole
Secure Online Identity with Cloud Identity and Privacy Services
Ronny Bjones, Microsoft
Prof. Dr. David Chadwick, University of Kent
Mike Small, KuppingerCole
|
Best Practices for Lean, Efficient and Focused Information Security Projects
Dr. Horst Walther, KuppingerCole
Identity and Security Intelligence
Kim Cameron, Microsoft
Robert Griffin, RSA, the Security Division of EMC
Edwin van der Wal, Everett
|
Beyond the Pioneer Approaches - The next Level in Access Governance and Risk
Niels von der Hude, Beta Systems Software
Kurt Johnson, Courion Corporation
Alberto Ocello, Crossideas
Prof. Dr. Sachar Paulus, KuppingerCole
Darran Rolls, SailPoint
|
Privacy in the age of BYOD and Enterprise Mobility
Alexei Balaganski, KuppingerCole
Mobile data Security and Privacy
Eric Fulton, Lake Missoula Group
Securing the Mobile API Ecosystem
Axel Grosse, Vordel
|
| 15:00-16:00 |
What Federation is About – in Theory and in Practice
Dave Kearns, KuppingerCole
Federation or Synchronization – the Future of the Cloud
Darran Rolls, SailPoint
Travis Spencer, Ping Identity
Exchanging Metadata through Different Federations on a Global Scale
Nicole Harris, JISC Advance
|
Trusted Identity Information from the Cloud
Patrick Graber, Swisscom Ltd
Cloud Service Broker - Adopting cloud services in Multi-tenant Enterprise Scenarios
Andreas Carlsson, Nordic Edge
Haydar Cimen, KPN
|
Best Practice: Telekom Italia
Giovanni Ciminari, Telecom Italia
Access & Entitlements - More than just Role Management
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Marco Venuti, CrossIdeas
|
Integrating GRC Frameworks and Practices
Prof. Dr. Sachar Paulus, KuppingerCole
Best Practice Experiences on how to Convince your Application Developers to Code Securely
Christian Patrascu, Oracle Corp.
Prof. Dr. Sachar Paulus, KuppingerCole
Jonathan Sander, Quest Software
|
|
| 16:00-16:30 |
Coffee & Networking, Expo Area |
||||
| 16:30-17:30 |
Database Firewalls: Advancing Security for Enterprise Data
Martin Kuppinger, KuppingerCole
Dr. Steve Moyle, Oracle
Sebastian Rohr, KuppingerCole
Best Practice: Database Security
|
The Bad Things that can happen if Encryption Management Fails
Mike Small, KuppingerCole
Gregory Webb, Venafi, Inc.
Cloud Security Depends on Effective Key Management
|
Cloud Ready Authorization Archtitectures
Gerry Gebel, Axiomatics Americas
Prof. Dr. Sachar Paulus, KuppingerCole
|
Siemens HRS - Compliant Identity Management for Global HR Services and Applications
Julia Ecker, Siemens Central Information Technology
Peter Hansel, Bizcon
How to Deliver Business Value through your IAM Solution
Salah Bohoudi, Europol
|
Bridging from Mobile to on-Premise
Axel Grosse, Vordel
|
| 17:30-18:00 |
Closing Keynote Dave Kearns, Senior Analyst, KuppingerCole
Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
Room: Auditorium |
||||
| Friday, April 20, 2012 | ||
| 08:30-10:00 |
Check-in & Registration |
|
|
Best Practice Approaches to Migrate your Provisioning Products – for Sun and Others |
OAuth, OpenID Connect, SAML, SCIM – How to Deal with all the Identity Providers and how to Federate? Moderator: Craig Burton, KuppingerCole
|
|
|
Room: Alpsee |
Room: Schliersee |
|
| 09:00-10:30 |
Migrating away from your Current Provisioning Product - Options and Challenges
Martin Kuppinger, KuppingerCole
Mike Neuenschwander, Oracle
|
Agile Business: What your Business Expects from IT today
John Bradley, OpenID Foundation, Kantara
Craig Burton, KuppingerCole
|
| 10:30-11:00 |
Coffee Break |
|
| 11:00-12:30 |
Migration Destinations Round Table
Luke Forsyth, AlixPartners
Niels von der Hude, Beta Systems Software
Mike Neuenschwander, Oracle
Jim Taylor, NetIQ
Paul Walker, Quest Software (now a part of Dell)
|
Agile Security: The Services you Need to Provide in your Identity and Security Infrastrucutre
John Bradley, OpenID Foundation, Kantara
Craig Burton, KuppingerCole
|
| 12:30-13:30 |
Lunch Break |
|
|
Mobile Security, BYOD & How to do it Right |
Connected Vehicle Moderator: Martin Kuppinger, KuppingerCole
|
|
|
Room: Alpsee |
Room: Schliersee |
|
| 13:30-15:00 |
Securing the communication of Mobile Devices
Alexei Balaganski, KuppingerCole
Eric Fulton, Lake Missoula Group
Axel Grosse, Vordel
|
Identity Management for the Connected Vehicle
|
| 15:00-16:00 |
Process Maturity Needs
Alexei Balaganski, KuppingerCole
Eric Fulton, Lake Missoula Group
Axel Grosse, Vordel
|
Connecting your Vehicle to your Personal Data Vault
|
Quick Links
Stay Connected
Information
European Identity & Cloud Conference 2012
- Language:
- English
- Registration fee:
-
€1980.00
€1980.00
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
[email protected]
- Apr 17 - 20, 2012 Munich, Germany
Partners
The EIC is proud to present a huge number of partners
Learn more