European Identity & Cloud Conference 2014 Agenda
Switch to Detailed ViewPlease note that presentations and other event materials are available only to registered participants.
You need to log in to be able to download them.
Tuesday, May 13, 2014 | ||||
08:00-18:00 |
Check-in & Registration Room: EXPO AREA |
|||
09:00-13:00 |
Enterprise Application of OpenID Connect, Mobile Apps SSO, Account Chooser
Ronny Bjones, Microsoft
John Bradley, OpenID Foundation, Kantara
Pamela Dingle, Ping Identity
Peter Mark Graham, Verizon Enterprise Solutions
Dr. Michael B. Jones, Microsoft
Dr. Torsten Lodderstedt, Deutsche Telekom AG
Anthony Nadalin, Microsoft
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
|
Get to know the IAM Essentials in 4 hours
Martin Kuppinger, KuppingerCole
|
Designing Privacy into our "Smart" Systems and Services
David Brossard, Axiomatics AB
Michelle Chibba, Office of the Information and Privacy Commissioner Ontario
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
John Sabo, OASIS Idtrust
|
Consumer Identity - International Use Cases and Approaches
Joni Brennan, Kantara Initiative
Allan Foster, ForgeRock
Robert Labelle, IEEE
Dr. Maciej Machulak, Cloud Identity Limited
Sandy Porter, Avoco
Michel Prompt, Radiant Logic
David Simonsen, WAYF
Matthew Trigg, UK Cabinet Office
Colin Wallis, Internal Affairs Dept, New Zealand Government
Michelle Waugh, CA Technologies
|
Room: ALPSEE |
Room: BEER GARDEN |
Room: AMMERSEE I |
Room: AMMERSEE II |
|
13:00-14:00 |
Lunch & Networking Room: EXPO AREA |
|||
14:00-14:40 |
Opening Keynote Martin Kuppinger, Principal Analyst, KuppingerCole
Room: AUDITORIUM |
|||
14:40-15:00 |
In the Light of Snowden's Revelations: Do they Change the Way how we Decide on Information Security? Heike Raab, CIO, German State of Rhineland-Palatinate
|
|||
15:00-15:20 |
NSA and Snowden - a Useful Contribution to Information Security Awareness? Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
|
|||
15:20-15:40 |
The Future of Email Privacy Ladar Levison, Founder, Lavabit
|
|||
15:40-16:00 |
The Cyber Paradox Dr. Andreas Knäbchen, Partner Cyber Risk Services, Deloitte
|
|||
16:00-17:00 |
Coffee & Networking Room: EXPO AREA |
|||
17:00-17:20 |
Why the Future of IDM Still Needs Us Mike Neuenschwander, CEO, iC Consult Americas
|
|||
17:20-17:40 |
The Identity of Everything Geoff Webb, Senior Director of Solution Strategy, NetIQ
|
|||
17:40-18:00 |
Endconsumerization Requires Agile Risk Management - Risk Mitigation Through a Consequent Cloud Strategy Dr. Barbara Mandl, Senior Manager, Daimler AG
|
|||
18:00-18:20 |
Applied Information Stewardship: Protect your Jewelry Kim Cameron, Chief Architect of Identity, Microsoft
|
|||
18:20-18:40 |
Mitigate Targeted Attacks with Privileged Account Analytics Roy Adar, Vice President of Product Management, CyberArk
|
|||
18:40-19:00 |
Identity Governance in the Context of a Connected Security Strategy Ramses Gallego, Security Strategist, Dell
|
|||
19:00-19:20 |
IAM Meat and Potatoes Best Practices Patrick Parker, Founder and CEO, EmpowerID
|
|||
19:30-21:00 |
Snacks, Drinks & Networking / Evening Reception Room: EXPO AREA |
Wednesday, May 14, 2014 | |||||
08:00-18:00 |
Check-in & Registration Room: EXPO AREA |
||||
08:30-08:50 |
Developing a Strategy for Business-Aligned Information Security Roman Chaplygin, Director, Risk Assurance, PwC Russia
Room: AUDITORIUM |
||||
08:50-09:10 |
Borderless Identity: Managing Identity in a Complex World Paul Fremantle, WSO2
|
||||
09:10-09:30 |
Authentication in 2020 Per Hägerö, CTO, neXus
|
||||
09:30-09:50 |
Mastering the IAG Challenge Dirk Venzke, Director, Commerzbank AG
|
||||
09:50-11:00 |
Coffee & Networking Room: EXPO AREA |
||||
The Future of Corporate IT Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
|
ABC: Agile Business – Connected Moderator: Dr. Horst Walther, KuppingerCole
|
Privacy & Compliance Moderator: Dr. Karsten Kinast, KuppingerCole
|
IAM Infrastructure Trends & Concepts Moderator: Graham Williamson, KuppingerCole
|
Roundtable: Cloud, Customer, Community, Citizen Identity Moderator: Andrew Nash, KuppingerCole
|
|
Room: AUDITORIUM |
Room: AMMERSEE I |
Room: ALPSEE |
Room: AMMERSEE II |
Room: BODENSEE I |
|
11:00-12:00 |
Strategic IT Planning: Foundations, Controls, Processes
Prof. Dr. Sachar Paulus, KuppingerCole
Bridging the Gap between Business and IT: How to Translate IT Wording into Business Language
Roberto Baratta, Novagalicia Banco
Roman Chaplygin, PwC Russia
Sharon Farber, CA Technologies
Pavlos Makridakis, Aurionpro Solutions plc
Dr. Barbara Mandl, Daimler AG
Marco Venuti, CrossIdeas
Identity Governance in Merge/Split Processes
Roberto Baratta, Novagalicia Banco
|
The new ABC for Information Security: How to Support the New Types of Businesses – and Why
Martin Kuppinger, KuppingerCole
The new ABC and the role of Cloud IAM
Ramses Gallego, Dell
Jason Hart, SafeNet
Marco Rohrer, IPG AG
Thierry Winter, Evidian
|
Discussion: How Strong could Privacy in Internet Communication be - and where are the Legal Barriers?
Dr. Scott David, LL.M., KuppingerCole
Dr. Michael B. Jones, Microsoft
Dr. Karsten Kinast, KuppingerCole
Ladar Levison, Lavabit
Amar Singh, KuppingerCole
|
Killing Identity Management in Order to Save It
Ian Glazer, Salesforce
Weaving Identity into Business Services - Is this the Future of Identity & Access Management?
Kim Cameron, Microsoft
Pamela Dingle, Ping Identity
Ian Glazer, Salesforce
Mike Neuenschwander, iC Consult Americas
Christian Patrascu, Oracle Corp.
|
BYOID is Stepping Up
Andrew Nash, KuppingerCole
National Identity Initiatives Compared - Convergence or Divergence?
Colin Wallis, Internal Affairs Dept, New Zealand Government
The Challenges of Third-party Identity Credentials & How a Trusted Identity Registry May Help: Example Initiatives in the UK and the US
Don Thibeau, OpenID Foundation
Belgian eID as Trust Generator Accross Sectors, Banking Included
Frank Leyman, FedICT Belgium
BYOI – Making Citizen and Consumer IdM Easy using Social IDs … and Secure using Attribute Verifiers and 2FA
Don Schmidt, Microsoft
Attribute-Based Credentials (ABCs) for Privacy-Preserving Authentication
Dr. Joerg Abendroth, Nokia Solutions and Networks
|
12:00-13:00 |
The IAM/IAG Organization that will Make your Project Succeed
Martin Kuppinger, KuppingerCole
Identity Management as Strategic Driver - A Bank´s Journey to the Cloud
Luis Saiz, BBVA
2020 Vision - IAM for the Next Decade
Martin Kuppinger, KuppingerCole
Ravi Srinivasan, IBM Security Systems
|
Identity Relationship Management: From IAM to IRM
Joni Brennan, Kantara Initiative
Identity Challenges for the Extended Enterprise
Stuart Boardman, KPN
|
Preventing your Enterprise from Cyber Attacks and Threats: Can this be Illegal?
Dr. Karsten Kinast, KuppingerCole
Deep Security Monitoring Versus Privacy – Is There a Middle Ground?
Dr. Scott David, LL.M., KuppingerCole
Ramses Gallego, Dell
Matthew Gardiner, RSA
|
Dynamic Authorization Management: The Market and its Future
Graham Williamson, KuppingerCole
RBAC, ABAC, or Both?
Allan Foster, ForgeRock
Finn Frisch, Axiomatics
Peter Gietz, DAASI International GmbH
Ian Glazer, Salesforce
Patrick Parker, EmpowerID
Geoff Webb, NetIQ
OpenRBAC: Why using an LDAP based Backend for Role Based Access Control Information
Peter Gietz, DAASI International GmbH
|
|
13:00-14:30 |
Lunch & Networking Room: EXPO AREA |
||||
IAM/IAG Strategic Planning Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
Amar Singh, KuppingerCole
|
Mobile Security Moderator: Mike Small, KuppingerCole
|
Information Stewardship in Practice: Secure Information Sharing Moderator: Martin Kuppinger, KuppingerCole
|
IAM Infrastructure Trends & Concepts Moderator: Graham Williamson, KuppingerCole
|
Roundtable: Implementing Life Management Platforms Moderator: Dr. Scott David, LL.M., KuppingerCole
Andrew Nash, KuppingerCole
|
|
Room: AUDITORIUM |
Room: AMMERSEE I |
Room: ALPSEE |
Room: AMMERSEE II |
Room: BODENSEE I |
|
14:30-15:30 |
IAM/IAG: Balancing Existing Investments with your Future Needs
Prof. Dr. Sachar Paulus, KuppingerCole
People, Processes, Solutions: Maturing IAM/IAG at Commerzbank AG
Dirk Venzke, Commerzbank AG
|
Evaluating the Risks of Social Login
Mike Small, KuppingerCole
How to Enable Social and Mobile Login – and Beyond
Ian Glazer, Salesforce
Dr. Michael B. Jones, Microsoft
Christian Patrascu, Oracle Corp.
Daniel Raskin, ForgeRock
Don Schmidt, Microsoft
|
Information Rights Management: Finally Ready for Prime Time
Martin Kuppinger, KuppingerCole
Understanding Information Rights Management Architectures
Philippe Beraud, Microsoft
Yuval Eldar, Secure Islands
Tim Upton, TITUS Inc.
|
Drivers and Lessons learned from a Recent ABAC Implementation at Generali
Manuel Schneider, Generali Deutschland Informatik Services
ABAC - Visions and Reality
Finn Frisch, Axiomatics
Stephan Schweizer, AdNovum Informatik AG
Thierry Winter, Evidian
|
OpenID Connect, OAuth, UMA, SCIM, SAML... - Standards for an Open Life Management Infrastructure User-Managed Access: Key to Life Management Platforms
Domenico Catalano, Oracle
Dr. Maciej Machulak, Cloud Identity Limited
A Life Management Platform Goes Live: Launching the Respect Network in 2014
Drummond Reed, Connect.Me
Social Networking 2.0: Privacy Designed Social Interaction - The MetaSociety Project
Martin Kuppinger, KuppingerCole
Vladimir Samokhvalov, Metasociety
|
15:30-16:30 |
Access Governance Vendor Panel
Ramses Gallego, Dell
Pervez Goiporia, Oracle
Morgan Holm, empowerID
Sebastian Kornblueh, G+H Netzwerk-Design
Roy Peretz, Whitebox Security
Marco Venuti, CrossIdeas
The 5 Critical Tenets of Identity and Access Management
Mike Neuenschwander, iC Consult Americas
Darran Rolls, SailPoint
Amar Singh, KuppingerCole
|
Extending Identity and Access to the Mobile World
Niklas Brask, PointSharp AB
Bart Renard, VASCO Data Security
Stephan Schweizer, AdNovum Informatik AG
Avi Yehuda, Nativeflow
Hans Zandbelt, Ping Identity
Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World
Per Hägerö, neXus
Thomas van Vooren, Everett
|
The Business Drivers for Information Rights Management
Philippe Beraud, Microsoft
Borja Rosales, Druva
Don Schmidt, Microsoft
Yoran Sirkis, Covertix
The Legal Requirements for Protecting Documents – the IRM Legal Case
Dr. Karsten Kinast, KuppingerCole
|
From Rogue IT to Strategy: Tying API Management into the Enterprise Infrastructure
Chris England, Okta
Mark O'Neill, Axway
An Ecosystem for API Security OAuth 2.0, OpenID Connect, UMA, SAML, SCIM and XACML
Prabath Siriwardena, WSO2
|
|
16:30-17:30 |
Coffee & Networking Room: EXPO AREA |
||||
17:30-18:30 |
What Is the Level of Detail, an IAM Solution Must Cover?
Niels von der Hude, Beta Systems Software
Darran Rolls, SailPoint
Andrea Rossi, IBM
Thomas van Vooren, Everett
Entitlement & Access Governance: How to do Data Governance Right?
Pervez Goiporia, Oracle
Borja Rosales, Druva
Amar Singh, KuppingerCole
|
How to Secure Corporate Content in the Cloud within a Connected Mobile Ecosystem
Chris England, Okta
Pavlos Makridakis, Aurionpro Solutions plc
Dominic Schmidt-Rieche, AirWatch by VMware
Dirk Wahlefeld, Centrify
|
eHealthcare Done Right: Strong Identities, Privacy, Secure Information Access and Sharing
Kim Cameron, Microsoft
Martin Kuppinger, KuppingerCole
Don Schmidt, Microsoft
Peter Weierich, iC Consult GmbH
|
Mature, Well Established, Inevitable: Guiding you through the Current Enterprise Single Sign-On Market
Rob Newby, KuppingerCole
Graham Williamson, KuppingerCole
|
Life Management Platforms - How to Reach the Critical Mass
Marcel van Galen, Qiy Foundation
Peter Mark Graham, Verizon Enterprise Solutions
Dr. Maciej Machulak, Cloud Identity Limited
Drummond Reed, Connect.Me
|
18:30-18:50 |
Governance and Awareness Stefan van Gansbeke, CISO, CM/MC Health Insurance Fund Belgium
Room: AUDITORIUM |
||||
18:50-19:10 |
What do Moby, The Bushmen and The Cloud have in Common? Dragan Pendic, Chief Security Architect, Diageo
|
||||
19:10-19:30 |
Heartbleed, NSA & Trust Amar Singh, Senior Analyst, KuppingerCole
|
||||
19:30-22:00 |
European Identity Awards Gala & Dinner Room: AUDITORIUM |
Thursday, May 15, 2014 | |||||
08:00-18:00 |
Check-in & Registration Room: EXPO AREA |
||||
08:30-08:50 |
Security as a Service - The New Normal? Prof. Dr. Hartmut Pohl, CEO, softScheck GmbH
Room: AUDITORIUM |
||||
08:50-09:10 |
Reducing Identity Fragmentation in the New Digital Economy Christian Patrascu, Director of Product Management, Oracle Corp.
|
||||
09:10-09:30 |
Future2: A Cloud of Emerging Risks in the Finance Industry Dr. Iordanis Chatziprodromou, Lead Data Analytics - P&C; Business Management, Swiss Re
|
||||
09:30-09:50 |
Defending Your Data in the Wild: Eliminating the Risks of Mobile Data Martin Edwards, Director of Sales Engineering – EMEA, Druva
Borja Rosales, Managing Director, Europe, Druva
|
||||
09:50-11:00 |
Coffee & Networking Room: EXPO AREA |
||||
Access Governance & Privilege Management Moderator: Dr. Horst Walther, KuppingerCole
|
Cyber Security Leadership Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
Prof. Dr. Hartmut Pohl, softScheck GmbH
|
Adaptive & Risk based Authentication Moderator: Amar Singh, KuppingerCole
|
IAM Infrastructure Trends & Concepts Moderator: Mike Small, KuppingerCole
|
Roundtable: IAM in Large Corporations Moderator: Dr. Karsten Kinast, KuppingerCole
Dr. Barbara Mandl, Daimler AG
|
|
Room: AUDITORIUM |
Room: AMMERSEE I |
Room: ALPSEE |
Room: AMMERSEE II |
Room: BODENSEE I |
|
11:00-12:00 |
Securing Elevated Privileges: Integrating Access Governance and Privilege Management
Martin Kuppinger, KuppingerCole
Erich Vogel, Computacenter
Dr. Horst Walther, KuppingerCole
Early Check-in with Identity and Access Governance Best Practices
Idita Israeli Sabag, El Al Israel Airlines
|
Cyber Security Best Practice in the Light of Snowden's Revelations
Prof. Dr. Sachar Paulus, KuppingerCole
Prof. Dr. Hartmut Pohl, softScheck GmbH
Getting the Basics Right: How we are Protecting BT Against Today´s and Tomorrow´s Cyber Threats
Aernout Reymer, BT
|
Authentication Trends – will Wearables take us _BAC to the Future?
Amar Singh, KuppingerCole
Do We Need To Put Secrecy Back In To Security? The Reinvention of Authentication
John Bradley, OpenID Foundation, Kantara
Steven Hope, Winfrasoft
Anthony Nadalin, Microsoft
Mike Neuenschwander, iC Consult Americas
Bart Renard, VASCO Data Security
|
Best Practice: IAM @ Franke
Martin Saeckel, Franke Management AG
Long Term Success Factors for IDM
Eleni Richter, EnBW
|
Agile IAM Risk Management with large Corporations and the Importance of Standards
Dr. Barbara Mandl, Daimler AG
Andre Priebe, iC Consult
The Legal View
Dr. Karsten Kinast, KuppingerCole
Growing Complexity and Business Relevance of Centralized IAM Platforms – A Balancing Act
Udo Guenther, Daimler AG
The Consumer Adoption & Information Security View
Don Schmidt, Microsoft
|
12:00-13:00 |
Securely Managing Privileged Users: Selecting the Solution that fits to your Needs
Martin Kuppinger, KuppingerCole
Rob Newby, KuppingerCole
Privileged Account Analytics in the Context of Realtime Analytics - Challenges and Benefits
Roy Adar, CyberArk
Martin Kuppinger, KuppingerCole
|
Why SIEM failed - and why we need Realtime Security Intelligence
Prof. Dr. Sachar Paulus, KuppingerCole
Prescription Security Lenses for the 4A Vision: Anywhere, Anytime, with Anyone, on Any Device
Dragan Pendic, Diageo
Big Data for Information Security: Preventing your Enterprise from Cyber Attacks and Threats
Yuval Illuz, ECI Telecom
|
The Future of Authentication (is Now)
Rolf Lindemann, Nok Nok Labs
Dr. Paul Madsen, Ping Identity
John Salter, Yubico
Cloud Security & Authentication
Michael Barrett, FIDO Alliance
Daniele Catteddu, ENISA
Jason Hart, SafeNet
Sampath Srinivas, Google
|
Defining your Path Towards a Software Defined Datacenter
Jason Hill, VMware
Mike Small, KuppingerCole
Ron Williams, IBM
Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC
Mike Small, KuppingerCole
|
|
13:00-14:30 |
Lunch & Networking Room: EXPO AREA |
||||
IAM/IAG Maturity Moderator: Dr. Horst Walther, KuppingerCole
|
Cyber Security Leadership Moderator: Prof. Dr. Sachar Paulus, KuppingerCole
Peter J. Wirnsperger, Deloitte
|
Internet of Things Moderator: Rob Newby, KuppingerCole
|
Secure Cloud Moderator: Mike Small, KuppingerCole
|
Finance Industry Round Table Moderator: Andrew Nash, KuppingerCole
|
|
Room: AUDITORIUM |
Room: AMMERSEE I |
Room: ALPSEE |
Room: AMMERSEE II |
Room: BODENSEE I |
|
14:30-15:30 |
IAM/IAG Maturity Levels: Introducing the new KuppingerCole Maturity Level Ratings
Martin Kuppinger, KuppingerCole
From Chaos to Collaboration – Orchestrating Identity & Access Governance Properly
John Barco, ForgeRock
Dr. Martin Kuhlmann, Omada
Darran Rolls, SailPoint
Marco Venuti, CrossIdeas
Edwin van der Wal, Everett
|
The Next Generation of Privacy Tools: What can we expect?
Kim Cameron, Microsoft
Dr. Scott David, LL.M., KuppingerCole
Ladar Levison, Lavabit
Nat Sakimura, Nomura Research Institute
|
Connecting the Real World with the Virtual World: Use Cases, Application Categories and Business Models for the IoE
Rob Newby, KuppingerCole
Hans Zandbelt, Ping Identity
Challenges from the Identities of Things
Ingo Friese, Deutsche Telekom AG
|
Cloud Identity & Access Management: Defining the Market
Mike Small, KuppingerCole
One Identity for All – Efficient and Cost-Effective Identity Management in the Cloud and for the Cloud
Per Hägerö, neXus
Dr. Paul Madsen, Ping Identity
Bart Renard, VASCO Data Security
Don Schmidt, Microsoft
Max Waldherr, Dell Software
|
The Future Model of Banking
Roberto Baratta, Novagalicia Banco
Roman Chaplygin, PwC Russia
Dr. Iordanis Chatziprodromou, Swiss Re
Luis Saiz, BBVA
Lewis Tam, Ping An Insurance Group
Dirk Venzke, Commerzbank AG
|
15:30-16:30 |
Maturity Assessment Dos and Dont´s
Dr. Horst Walther, KuppingerCole
IAM/IAG Vendor & Solution Selection Process
Martin Waldbauer, E.ON Global Commodities SE
|
Security Software as a Risk
Prof. Dr. Hartmut Pohl, softScheck GmbH
Application Security – Beyond Secure Configurations and Access Controls.
Peter J. Wirnsperger, Deloitte
Protecting your Applications Against the Threat of Attacks and Data Breaches
Prof. Dr. Hartmut Pohl, softScheck GmbH
Juergen Vollmer, Security & Quality Software GmbH
Peter J. Wirnsperger, Deloitte
|
Security in a World of 50 Billion Connected Devices
Michelle Chibba, Office of the Information and Privacy Commissioner Ontario
Gershon Janssen, OASIS Open Standards Group
Prof. Dr. Dawn Jutla, Saint Mary´s University
Alex Kritikos, Software AG
Peter Niblett, IBM
|
Searching over Encrypted Data in Cloud Database as a Service Environments
Dr. Andreas Schaad, SAP AG
Cloud Encryption: Protecting Privacy, Preventing Data Loss in the Age of Snowden and Heartbleed
Paige Leidig, CipherCloud
Mike Small, KuppingerCole
|
|
16:30-17:00 |
Coffee & Networking Room: EXPO AREA |
||||
17:00-18:00 |
Do's and Don'ts for a Successful Identity Management Project (Manpower)
Rainer Knorpp, Devoteam
A Practitioner´s Recommendations for a Successful IAM Program
Dr. Horst Walther, KuppingerCole
|
Building your SOC: Realtime Security Intelligence On-Premise and/or as a Service?
Prof. Dr. Sachar Paulus, KuppingerCole
Plan, Build, run. What Makes up a Real SOC?
Reto Bachmann, Dell Software
Jason Hill, VMware
Amar Singh, KuppingerCole
|
Unexpected and Complex Implications of the Internet of Everything (IoE)
Dr. Karsten Kinast, KuppingerCole
Jeff Stollman, Secure Identity Consulting
Security and Identity Challenges for the Internet of Everything
John Barco, ForgeRock
Paul Fremantle, WSO2
Jason Hart, SafeNet
Per Hägerö, neXus
Rob Newby, KuppingerCole
Geoff Webb, NetIQ
|
Efficiency Gains in the Cloud
Vladislava Toukalek, WMO
Embracing Cloud Services : Roadmap to Reality
Amol Sawarkar, International Federation of Red Cross and Red Crescent Societies (IFRC)
|
Roundtable: The Future Model of Banking (continued)
|
18:00-18:30 |
Closing Keynote Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
Room: AUDITORIUM |
Friday, May 16, 2014 | |||
08:30-10:00 |
Check-in & Registration Room: HOTEL |
||
Workshop I |
Workshop II |
Workshop III |
|
Room: AMMERSEE I |
Room: AMMERSEE II |
Room: BODENSEE I & II |
|
09:00-12:30 |
Understanding the Legal Framework for Using Big Data Approaches in Security Analytics
Dr. Karsten Kinast, KuppingerCole
|
Negotiating the Cloud Standards and Advice Jungle
Mike Small, KuppingerCole
|
FIDO Alliance Workshop - Business Track
Michael Barrett, FIDO Alliance
Rajiv Dholakia, Nok Nok Labs
Dr. Paul Madsen, Ping Identity
Dr. Kim Nguyen, D-Trust
|
12:30-13:30 |
Lunch Break Room: HOTEL |
||
13:30-16:00 |
Migrating Away from your Current Identity Provisioning Solution
Martin Kuppinger, KuppingerCole
|
Internet of Everything and Big Data: Benefits and how to Manage Risk
Mike Small, KuppingerCole
|
FIDO Alliance Workshop - Technical Tutorials
Dirk Balfanz, Google
Rolf Lindemann, Nok Nok Labs
|
Quick Links
Stay Connected
Information
European Identity & Cloud Conference 2014
- Language:
- English
- Registration fee:
-
€1980.00
€1980.00
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
[email protected]
- May 13 - 16, 2014 Munich, Germany
Partners
The EIC is proud to present a huge number of partners
Learn more