|
|
Agenda
| Wednesday, 14.05.2014 |
| 08:30-08:50 |
Developing a Strategy for Business-Aligned Information Security
Roman Chaplygin, Head of Information Security, DeltaCredit Bank
|
| 08:50-09:10 |
Borderless Identity: Managing Identity in a Complex World
Paul Fremantle, WSO2
|
| 09:10-09:30 |
Authentication in 2020
Per H�ger�, CTO, neXus
|
| 09:30-09:50 |
Mastering the IAG Challenge
Dirk Venzke, Direktor, Commerzbank AG
|
|
The Future of Corporate IT
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
|
ABC: Agile Business � Connected
Moderator:
Dr. Horst Walther, KuppingerCole
|
Privacy & Compliance
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
|
IAM Infrastructure Trends & Concepts
Moderator:
Graham Williamson, KuppingerCole
|
Roundtable: Cloud, Customer, Community, Citizen Identity
Moderator:
Andrew Nash, KuppingerCole
|
| 11:00-12:00 |
Strategic IT Planning Strategic IT Planning: Foundations, Controls, Processes
Prof. Dr. Sachar Paulus, KuppingerCole
Bridging the Gap between Business and IT: How to Translate IT Wording into Business Language
Roberto Baratta, Novagalicia Banco
Roman Chaplygin, DeltaCredit Bank
Sharon Farber, CA Technologies
Pavlos Makridakis, Aurionpro Solutions plc
Dr. Barbara Mandl, Daimler AG
Marco Venuti, CrossIdeas
Identity Governance in Merge/Split Processes
Roberto Baratta, Novagalicia Banco
|
ABC: Agile Business � Connected The new ABC for Information Security: How to Support the New Types of Businesses � and Why
Martin Kuppinger, KuppingerCole
The new ABC and the role of Cloud IAM
Ravi Bindra, Novartis
Ramses Gallego, Dell
Jason Hart, SafeNet
Marco Rohrer, IPG AG
Thierry Winter, Evidian
|
Privacy in Communication Discussion: How Strong could Privacy in Internet Communication be - and where are the Legal Barriers?
Scott David, University of Washington (Seattle) - School of Law
Dr. Michael B. Jones, Microsoft
Dr. Karsten Kinast LL.M., KuppingerCole
Ladar Levison, Lavabit LL.C
Amar Singh, KuppingerCole
|
Killing IAM Killing Identity Management in Order to Save It
Ian Glazer, salesforce.com
Weaving Identity into Business Services - Is this the Future of Identity & Access Management?
Kim Cameron, Microsoft
Pamela Dingle, Ping Identity
Ian Glazer, salesforce.com
Mike Neuenschwander, iC Consult Americas
Christian Patrascu, Oracle Corp.
|
BYOID is Stepping Up
Andrew Nash, KuppingerCole
National Identity Initiatives Compared - Convergence or Divergence?
Colin Wallis, Internal Affairs Dept, New Zealand Government
The Challenges of Third-party Identity Credentials & How a Trusted Identity Registry May Help: Example Initiatives in the UK and the US
Don Thibeau, OpenID Foundation
Belgian eID as Trust Generator Accross Sectors, Banking Included
Frank Leyman, FedICT Belgium
BYOI � Making Citizen and Consumer IdM Easy using Social IDs � and Secure using Attribute Verifiers and 2FA
Don Schmidt, Microsoft
Attribute-Based Credentials (ABCs) for Privacy-Preserving Authentication
Dr. Joerg Abendroth, Nokia Solutions and Networks
|
| 12:00-13:00 |
IAM/IAG Organization The IAM/IAG Organization that will Make your Project Succeed
Martin Kuppinger, KuppingerCole
Identity Management as Strategic Driver - A Bank�s Journey to the Cloud
Luis Saiz, BBVA
2020 Vision - IAM for the Next Decade
Martin Kuppinger, KuppingerCole
Ravi Srinivasan, IBM Security Strategy
|
Identity in the Extended Enterprise Identity Relationship Management: From IAM to IRM
Joni Brennan, Kantara Initiative
Identity Challenges for the Extended Enterprise
Stuart Boardman, KPN
|
Big Data in Security vs. Privacy Preventing your Enterprise from Cyber Attacks and Threats: Can this be Illegal?
Dr. Karsten Kinast LL.M., KuppingerCole
Deep Security Monitoring Versus Privacy � Is There a Middle Ground?
Scott David, University of Washington (Seattle) - School of Law
Ramses Gallego, Dell
Matthew Gardiner, RSA
|
Dynamic Authorization Management Dynamic Authorization Management: The Market and its Future
Graham Williamson, KuppingerCole
RBAC, ABAC, or Both?
Allan Foster, ForgeRock
Finn Frisch, Axiomatics
Peter Gietz, DAASI International GmbH
Ian Glazer, salesforce.com
Patrick Parker, EmpowerID
Geoff Webb, NetIQ
OpenRBAC: Why using an LDAP based Backend for Role Based Access Control Information
Peter Gietz, DAASI International GmbH
|
|
IAM/IAG Strategic Planning
Moderator:
Prof. Dr. Sachar Paulus, KuppingerCole
Amar Singh, KuppingerCole
|
Mobile Security
Moderator:
Mike Small, KuppingerCole
|
Information Stewardship in Practice: Secure Information Sharing
Moderator:
Martin Kuppinger, KuppingerCole
|
IAM Infrastructure Trends & Concepts
Moderator:
Graham Williamson, KuppingerCole
|
Roundtable: Implementing Life Management Platforms
Moderator:
Scott David, University of Washington (Seattle) - School of Law
Andrew Nash, KuppingerCole
|
| 14:30-15:30 |
Evolving your Existing IAM/IAG Infrastrucure IAM/IAG: Balancing Existing Investments with your Future Needs
Prof. Dr. Sachar Paulus, KuppingerCole
People, Processes, Solutions: Maturing IAM/IAG at Commerzbank AG
Dirk Venzke, Commerzbank AG
|
Social & Mobile Login Evaluating the Risks of Social Login
Mike Small, KuppingerCole
How to Enable Social and Mobile Login � and Beyond
Ian Glazer, salesforce.com
Dr. Michael B. Jones, Microsoft
Christian Patrascu, Oracle Corp.
Daniel Raskin, ForgeRock
Don Schmidt, Microsoft
|
Information Rights Management Information Rights Management: Finally Ready for Prime Time
Martin Kuppinger, KuppingerCole
Understanding Information Rights Management Architectures
Philippe Beraud, Microsoft
Yuval Eldar, Secure Islands
Tim Upton, TITUS Inc.
|
Dynamic Access Control Drivers and Lessons learned from a Recent ABAC Implementation at Generali
Manuel Schneider, Generali Deutschland Informatik Services
ABAC - Visions and Reality
Finn Frisch, Axiomatics
Stephan Schweizer, AdNovum Informatik AG
Thierry Winter, Evidian
|
Standards Based Identity at Scale OpenID Connect, OAuth, UMA, SCIM, SAML... - Standards for an Open Life Management Infrastructure
User-Managed Access: Key to Life Management Platforms
Domenico Catalano, Oracle
Dr. Maciej Machulak, UMA WG
A Life Management Platform Goes Live: Launching the Respect Network in 2014
Drummond Reed, Connect.Me
Social Networking 2.0: Privacy Designed Social Interaction - The MetaSociety Project
Martin Kuppinger, KuppingerCole
Vladimir Samokhvalov, Metasociety
|
| 15:30-16:30 |
IAM/IAG Vendor Landscape Access Governance Vendor Panel
Ramses Gallego, Dell
Pervez Goiporia, Oracle
Morgan Holm, empowerID
Sebastian Kornblueh, G+H Netzwerk-Design
Roy Peretz, Whitebox Security
Marco Venuti, CrossIdeas
The 5 Critical Tenets of Identity and Access Management
Mike Neuenschwander, iC Consult Americas
Darran Rolls, SailPoint
Amar Singh, KuppingerCole
|
Secure Mobile Access & Identity Extending Identity and Access to the Mobile World
Eitan Bauch, Nativeflow
Niklas Brask, PointSharp AB
Bart Renard, VASCO Data Security
Stephan Schweizer, AdNovum Informatik AG
Hans Zandbelt, Ping Identity
Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World
Per H�ger�, neXus
Thomas van Vooren, Everett
|
Document Based Compliance Management The Business Drivers for Information Rights Management
Borja Rosales, Druva
Don Schmidt, Microsoft
Yoran Sirkis, Covertix
The Legal Requirements for Protecting Documents � the IRM Legal Case
Dr. Karsten Kinast LL.M., KuppingerCole
|
Enterprise API Management & Security From Rogue IT to Strategy: Tying API Management into the Enterprise Infrastructure
Chris England, Okta
Mark O'Neill, Axway
An Ecosystem for API Security OAuth 2.0, OpenID Connect, UMA, SAML, SCIM and XACML
Prabath Siriwardena, WSO2
|
| 17:30-18:30 |
Access & Data Governance What Is the Level of Detail, an IAM Solution Must Cover?
Niels von der Hude, Beta Systems Software
Rene Mulder, Everett
Darran Rolls, SailPoint
Andrea Rossi, CrossIdeas
Entitlement & Access Governance: How to do Data Governance Right?
Pervez Goiporia, Oracle
Borja Rosales, Druva
Amar Singh, KuppingerCole
|
Enterprise Mobility Management How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem
Chris England, Okta
Pavlos Makridakis, Aurionpro Solutions plc
Dominic Schmidt-Rieche, AirWatch
|
Secure Information Sharing in Health Care eHealthcare Done Right: Strong Identities, Privacy, Secure Information Access and Sharing
Kim Cameron, Microsoft
Martin Kuppinger, KuppingerCole
Don Schmidt, Microsoft
Peter Weierich, iC Consult GmbH
|
Leadership Compass: Enterprise Single Sign-On Mature, Well Established, Inevitable: Guiding you through the Current Enterprise Single Sign-On Market
Rob Newby, KuppingerCole
Graham Williamson, KuppingerCole
|
LMP Business Models Life Management Platforms - How to Reach the Critical Mass
Marcel van Galen, Qiy Foundation
Peter Mark Graham, Verizon Enterprise Solutions
Dr. Maciej Machulak, UMA WG
Drummond Reed, Connect.Me
|
| 18:30-18:50 |
Governance and Awareness
Stefan Van Gansbeke, CISO, CM/MC Health Insurance Fund Belgium
|
| 18:50-19:10 |
What do Moby, The Bushmen and The Cloud have in Common?
Dragan Pendic, Chief Security Architect, Diageo
|
| 19:10-19:30 |
Heartbleed, NSA & Trust
Amar Singh, Senior Analyst, KuppingerCole
|
|