|
|
研讨会
OIDF: Overview and Update of Key Internet Identity Protocols: OpenID Connect, Backplane and Account Chooser
14.05.2013
09:00-13:00
A high level overview of the protocol, and an explanation of why major technology companies have standardized on it including Google, Microsoft, Yahoo, etc. We will discuss how the functionality of OAuth 2.0 to create OpenID Connect. The session will also review the new Backplane Exchange and Account Chooser protocols and discuss the security problems of websites that run their own password based login systems.
More information
|
|
|
OASIS Workshop
14.05.2013
9:00-13:00
Implementing Privacy by Design: Building Data Privacy into Applications to Meet Regulatory Requirements and Consumer Confidence. Workshop attendees will learn about “Privacy by Design” and a new Use Case template/tool, based on the OASIS PMRM committee specification and developed to help stakeholders understand the privacy elements and risks in new and existing business applications.
More information
|
|
| |
EIC Warm-Up
14.05.2013
9:00-13:00
In this pre-Conference meeting, you will learn how to get the most out of EIC 2013. The conference is renown for it´s very rich and intensive program, with 5 parallel session streams, workshops, "beergarden talks", keynotes and round tables. Too much to follow it all - and therefore this pre-conference meeting will describe the main contents of the different tracks and help you find your individual way making sure that you take loads of information back home which will help you solving your professional challenges.
More information
|
|
|
Kantara Workshop
14.05.2013
9:00-13:30
Bridges to Trusted Federations, Connecting Nations and Markets in a Big-Data Economy.
More information
|
|
| |
Cloud Provider Assurance Workshop
17.05.2013
09:00-16:00
Cloud services are outside the direct control of the customer organization and their use places control of the IT service and infrastructure in the hands of the CSP (Cloud Service Provider). A structured approach is essential to ensure organizational readiness for the cloud, to select the right service to meet business needs and other non-functional requirements like security and compliance and to enable that service to be assured. This approach applies good governance to the cloud through a combination of internal processes, standards and independent assessments.
More information
|
|
|
Access Governance Workshop
17.05.2013
9:00-16:00
This workshop provides a dense overview of Access Governance, its prerequisites from an organizational perspective, and the approaches to integrate Access Governance into today’s IT infrastructures.
More information
|
|
| |
Real-World IAM in Practice
17.05.2013
9:00-16:00
The workshop will guide participants through what IAM is, what it can do and more importantly what it cannot do. This will also focus on where IAM helps to ensure compliance and can bring increased levels of assurance and financial gains when focusing on the business enabling aspects that IAM can bring. During this part we will also discuss collaboration between companies and how it can help in increased momentum and development of standards.
More information
|
|
|
|