English   Deutsch   Русский   中文    

Information

Language:
English
Date:
May 05 - 08, 2015
Location:

Dolce BallhausForum
Andreas-Danzer-Weg 1
85716 Unterschleißheim, Munich
Registration fee:
€1980.00
plus 19% VAT
€  $ 






Agenda

Monday, 05/04/2015
14:00-18:00 Complimentary Seminar
FIDO Alliance Update
Alexei Czeskis, Software Engineer, Google
Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs
Donal O'Shea, FIDO Alliance

Tuesday, 05/05/2015
08:00-18:00 Check-in & Registration
COUNTER EXPO AREA
09:00-13:00
Forum Systems Workshop: API Security
The Foundations of API Security and API Gateway Technology
Alexei Balaganski, KuppingerCole
Dr. Dirk Krafzig, SOAPARK
Jason Macy, Forum Systems
Mamoon Yunus, Forum Systems
AMMERSEE I
OpenID Foundation Workshop
Early Insight on Latest Innovations in Online Identity Standards
John Bradley, OpenID Foundation, Kantara
Jörg Connotte, Deutsche Telekom AG
Pamela Dingle, Ping Identity
Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Eve Maler, ForgeRock
Nat Sakimura, Nomura Research Institute
Don Thibeau, OpenID Foundation
CHIEMSEE
Kantara Workshop
Access Management 2.0 - Consent, Context, and User Engagement
Victor Ake, ForgeRock
Andre Boysen, SecureKey Technologies
Joni Brennan, Kantara Initiative
Ingo Friese, Deutsche Telekom AG
Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Ian Glazer, Salesforce
Mark Lizar, SmartSpecies
Dr. Maciej Machulak, Cloud Identity Limited
Eve Maler, ForgeRock
Andrea Servida, European Commission
Michelle Waugh, CA Technologies
Robin Wilton, Internet Society
ALPSEE
Balabit Workshop: Contextual Security Intelligence
Getting Smart With Security in the Age of Digital: Moving from Control to Monitoring
Martin Grauel, Balabit
Péter Gyöngyösi, BalaBit
Dr. Csaba Krasznay, BalaBit
Martin Kuppinger, KuppingerCole
AMMERSEE II
13:00-14:00 Lunch & Networking
EXPO AREA
14:00-14:40 Identity, Access, Security: The Fundaments for Digital Risk Mitigation in the Age of Transformation
Martin Kuppinger, Principal Analyst, KuppingerCole
AUDITORIUM
14:40-15:00 Moving the Security Perimeter: What Needs to be Done Before the Internet Firewalls are Removed?
Ravi Bindra, Head IT Security Architecture, Engineering and Design, Pharmaceutical Company
15:00-15:20 Digital Transformation: New Dimensions of Risk and Risk Mitigation
Dr. Scott David, LL.M., Fellow Analyst, KuppingerCole
15:20-15:40 Digital Risk & the Analog World
Hanns Proenen, Chief Informaton Security Officer Europe, GE Europe
15:40-16:00 Boosting Trust in the Digital Market: the Role of eIDAS Regulation
Andrea Servida, Head of Task Force "Legislation Team", European Commission
16:00-17:00 Coffee & Networking
EXPO AREA
17:00-17:20 How to Manage Authorizations in Cloud Services: Getting a Grip on Both Microsoft Azure and Amazon AWS
Patrick Parker, Founder and CEO, EmpowerID
AUDITORIUM
17:20-17:40 The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value
Jackson Shaw, Identity Management Expert, Dell
17:40-18:00 Identity Services 2020
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
18:00-18:20 User-Managed Identity and Access for the Digitally Transformative Enterprise
Eve Maler, VP Innovation & Emerging Technology, ForgeRock
18:20-18:40 Stop Treating your Customers like your Employees
Ian Glazer, Senior Director, Identity, Salesforce
18:40-19:00 I Am a Black Swan
Howard Mannella, Managing Principal, Alternative Resiliency Services Corp
19:00-19:20 The Good, the Bad and the Ugly of IAM: An Enterprise View
Nick Tuffs, Principal Delivery Manager, Vodafone
19:30-21:00 Snacks, Drinks & Networking / Evening Reception
EXPO AREA

Wednesday, 05/06/2015
08:00-18:00 Check-in & Registration
COUNTER EXPO AREA
08:30-08:50 Cryptography for the People
Dr. Jan Camenisch, Scientist, IBM Research
AUDITORIUM
08:50-09:10 A smarter, More Secure Internet of Things?
David Mount, Solutions Consulting Director, NetIQ
09:10-09:30 Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems
Yariv Lenchner, Senior Product Manager, Operational Technologies, Cyber-Ark Software
09:30-09:50 Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM
Louis-Marie Fouchard, IAM Products Director, Atos Cybersecurity
09:50-10:10 The EU Draft General Data Protection Regulation: Where are we and what can we expect?
Kuan Hon, Research Consultant, Queen Mary University of London
Dr. Karsten Kinast LL.M., Fellow Analyst, KuppingerCole
10:10-11:00 Coffee & Networking
The New Risk Landscape: IT, Operational Technology and IoT
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
AMMERSEE I
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
Mario Hoffmann, Fraunhofer AISEC
AMMERSEE II
11:00-12:00
Mapping the Changes in Data and Identity Risk Landscapes
From Security to Information Security to Digital Risk
Hanns Proenen, GE Europe

Mapping the Changes in Data and Identity Risk Landscapes - From Physical Security to Information Security to Digital Security to Interaction Security
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Security for the Digital Business
What are the Requirements for your Future IAM to Enable Digital Security?
Martin Kuppinger, KuppingerCole

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint

The Role of IAM in Hack Prevention
Patrick Parker, EmpowerID
Matthias Reinwarth, KuppingerCole
Cloud Identity & Security
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Amar Singh, KuppingerCole
Mike Small, KuppingerCole

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?
Marc Bütikofer, Ergon Informatik AG
Ralf Knöringer, Atos IT Solutions and Services GmbH
Robert Levine, Aurionpro
James Litton, Identity Automation
Max Waldherr, Dell Software
User Empowerment - The Building Blocks
Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols
Mario Hoffmann, Fraunhofer AISEC

Extending the Power of Consent with User-Managed Access and OpenUMA
Eve Maler, ForgeRock

Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise
Robert Lapes, Capgemini
12:00-13:00
Preconceptions of Risk
Flushing Away Preconceptions of Risk
Thom Langford, Sapient

Negotiating the Risk of Privacy - Understanding Privacy and its Risks
Prof. Dr. Rüdiger Grimm, University Koblenz-Landau, Faculty of Informatics
IRM & the Business Side
No Person is an Island: How Relationships Make the IT World More Manageable
Ian Glazer, Salesforce

The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
Troy Moreland, Identity Automation
Matthias Reinwarth, KuppingerCole
Jackson Shaw, Dell
Markus Weber, ForgeRock
Rudolf Wildgruber, Atos IT Solutions and Services GmbH
Next Generation (Mobile) Cloud
Enterprise Mobility Management: Best Practices & Lessons Learned
Pavlos Makridakis, Aurionpro Solutions plc
Christian Patrascu, Oracle Corp.
Dominic Schmidt-Rieche, AirWatch by VMware

What’s Next in Cloud IAM – Moving Beyond Single Sign-On
Pamela Dingle, Ping Identity
Dr. Martin Kuhlmann, Omada
Daniel Raskin, ForgeRock
Richard Walters, Intermedia
Internet Scale Encryption, Authentication, Authorization
Idemix: Secure, Attribute-Based Authentication
Dr. Jan Camenisch, IBM Research

uProve: The Pricipal of Minimal Disclosure at Work
Ronny Bjones, Microsoft

Qiy Scheme: Trusted Exchange of Personal Information
Marcel van Galen, Qiy Foundation
13:00-14:30 Lunch & Networking
EXPO AREA
Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Moderator:
John Hermans, KPMG
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
The Future of Identity & Access Management
Moderator:
Matthias Reinwarth, KuppingerCole
Graham Williamson, KuppingerCole
AMMERSEE I
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Dr. David Goodman, KuppingerCole
AMMERSEE II
14:30-15:30
Digital Risk Officer & Chief Digital Officer
It Takes a Community to Reduce Risk – Company Leadership and Recruitment of Supply Chains Stakeholders in Risk Mitigation Strategies
Amar Singh, KuppingerCole

Recruiting Customers, Suppliers and Even Competitors to Help Reduce Risk
Ravi Bindra, Pharmaceutical Company
Thom Langford, Sapient
Dr. Adriana Nugter, Independant Senior Consultant
Arieh Shalem, Orange
Amar Singh, KuppingerCole

One Step Closer to the Unhackable Enterprise: Applying an Effective Information Security Strategy
Stefan Van Gansbeke, CM/MC Health Insurance Fund Belgium
Best Practice
Identity @ The Guardian - SSO at Web Scale
Mark Butler, The Guardian

Rethinking Digital Identity: The Australian Government Story
Ben Bildstein, Department of Industry and Science (Australian Government)
Cloud Encryption; Securing IaaS
Customer-Managed Encryption Keys: Controlling Your Data’s Privacy in the Cloud
Richard Anstey, Intralinks
Dan Plastina, Microsoft

Best Practice: From Zero to Secure in 1 Minute
Nir Valtman, NCR Corporation
Standards & Protocols
Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
Pamela Dingle, Ping Identity

OpenID Connect Certification
Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Dr. Michael B. Jones, Microsoft

The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0
Dominick Baier, Thinktecture
15:30-16:30
Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
John Hermans, KPMG
Mario Hoffmann, Fraunhofer AISEC
Olga Kulikova, KPMG
Mike Small, KuppingerCole

Dynamic Control Selection Framework for Onboarding Cloud Solutions
Olga Kulikova, KPMG

Dynamic Certification of Cloud Ecosystems
Mario Hoffmann, Fraunhofer AISEC

Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.
Mike Small, KuppingerCole
FIDO Alliance: Simplifying User Authentication
The Death of the Password - Is It Finally Coming True?
Alexei Czeskis, Google
Tord Fransson, Yubico
Dr. Michael B. Jones, Microsoft
Rolf Lindemann, Nok Nok Labs
Anthony Nadalin, Microsoft
Donal O'Shea, FIDO Alliance
Hybrid Cloud & Beyond
Best Practice: A Hybrid Enterprise in a Cloud First World
Brian Puhl, Microsoft

Identity-as-a-Service Securing PostNL’s 100% Cloud Strategy
Theo Punter, PostNL
OASIS SAML & XACML for Consumer Identity
Securing Sensitive Data While Enhancing Privacy
Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Gerry Gebel, Axiomatics Americas
Karyn Higa-Smith, U.S. Department of Homeland Security
Soren Peter Nielsen, NineConsult
Daniel Raskin, ForgeRock
John Tolbert, Queralt
16:30-17:30 Coffee & Networking
17:30-18:30
Think Globally, Act Locally
Understanding and Dealing with Macro-Level Risks that Affect your Institution’s Risk Profile
Ben Bildstein, Department of Industry and Science (Australian Government)
Karyn Higa-Smith, U.S. Department of Homeland Security
Howard Mannella, Alternative Resiliency Services Corp
Robin Wilton, Internet Society
Privilege Management
Privilege Management Use Cases
Jason Currill, ObserveIT
Christian Götz, CyberArk
Amar Singh, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic

The Snowden Effect: Why seeing is believing
Chris Pace, Wallix
Wolfgang Roesch, Tesis Sysware
Michael Yaffe, BeyondTrust
Business-Critical Infrastructure & Applications
The Future of Directory Services: Data Models - Performance - Security
Andrew Ferguson, KuppingerCole Asia Pacific
Peter Gietz, DAASI International GmbH
Thorsten Niebuhr, WedaCon Informationstechnologien GmbH

Business Critical Application Security
Dr. Sridhar Muppidi, IBM
Carsten Olt, SECUDE GmbH
Christian Patrascu, Oracle Corp.
Gerhard Unger, Onapsis Inc.
Telcos & Innovation
Identity Strategy for Innovation
Chema Alonso, Eleven Paths, Telefonica

Facing The Future: Identity Opportunities for Telco Operators
Chema Alonso, Eleven Paths, Telefonica
John Bradley, OpenID Foundation, Kantara
Philippe Clement, Orange
Jörg Connotte, Deutsche Telekom AG
Marco Dütsch, Swisscom
Maarten Louman, Qiy
Dr. Adriana Nugter, Independant Senior Consultant
18:30-18:50 RISK is Not a @#$%&! Dirty Word!
Thom Langford, Director Global Security Office, Sapient
AUDITORIUM
18:50-19:10 Connected Identity : Benefits, Risks & Challenges
Prabath Siriwardena, Director, Security Architecture, WSO2
19:10-19:30 No Security without Identity
André Durand, Founder & CEO, Ping Identity
19:30-20:15 European Identity Awards Ceremony
20:15-22:00 Award Reception & Dinner
    

Thursday, 05/07/2015
08:00-18:00 Check-in & Registration
COUNTER EXPO AREA
08:30-08:50 "Guiding" the Management and Supervisory Boards to Choose the Right Investment Priorities for Cyber Risk Mitigation
John Hermans, Partner, KPMG
AUDITORIUM
08:50-09:10 Identity & Access Process Automation: Improving Business Alignment & Reducing Digital Risk
Dirk Venzke, Director, Commerzbank AG
09:10-09:30 Digital Identities = Security Threats. Is your IAM Program Ready?
Ravi Srinivasan, Director, IBM Security Systems
09:30-09:50 Evolution or Revolution: Unlocking The Potential of The New Digital Economy
Luca Martelli, Director, Identity Management, EMEA, Oracle
Christian Patrascu, Director of Product Management, Oracle Corp.
09:50-11:00 Coffee & Networking
Designing, Developing and Deploying Sustainable Distributed Risk Solutions for your Enterprise
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
AMMERSEE I
Secure Information Sharing through Rights Management
Moderator:
Dr. David Goodman, KuppingerCole
ALPSEE
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Prof. Dr. Sachar Paulus, KuppingerCole
AMMERSEE II
11:00-12:00
EU Privacy Regulation
The Proposed New European Union Data Protection Regulation - Status and Implications
Rhiannon Davies, DAC Beachcroft LLP
Kuan Hon, Queen Mary University of London
Dr. Karsten Kinast LL.M., KuppingerCole

The Role of Privacy by Design in the New EU Data Protection Regulation
Dr. Karsten Kinast LL.M., KuppingerCole
André Lutermann, Dell Software
Access Governance Best Practice
One-Click Insight, Lean Recertification, Improved Compliance: Redefining Access Governance for the Digital Business
Matthias Reinwarth, KuppingerCole

Externalized Access Management (ABAC, RBAC) at Talanx Systeme AG for Bancassurance
Frank Wittlich, Talanx Systeme AG

IAM Processes and their Communication Loops
Stephanie Jaecks, Bayer BBS
The Future of Collaboration
Digital Rights Management – UBS Case Study
Marek Pietrzyk, UBS

Experiences in getting Rights Management Deployed
Andrew Church, Coutts

Secure Information Sharing - The User Experience
Andrew Church, Coutts
Marek Pietrzyk, UBS
Amol Sawarkar, International Federation of Red Cross and Red Crescent Societies (IFRC)
Life Management Best Practice
Life Management in Finance & Insurance Industry
Frank Cooler, Intrasurance
Marcel van Galen, Qiy Foundation
Ad van Loon, X-media Strategies
Dr. Adriana Nugter, Independant Senior Consultant
12:00-13:00
Cloud Contracting Risks
Reaching Compliance Across Jurisdictions: Fundamental Considerations Before Signing a Cloud Services Contract
John Hermans, KPMG
Dr. Karsten Kinast LL.M., KuppingerCole
Edwin Sturrus, KPMG Advisory N.V.
IAM Standard Processes
Roles or no Roles, that’s the Question. Two Different Approaches for Compliant IAM Processes.
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole

RBAC & ABAC Hybrid Approaches
Frank Böhm, FSP
Thorsten Niebuhr, WedaCon Informationstechnologien GmbH
Patrick Parker, EmpowerID
Frank Wittlich, Talanx Systeme AG
Market Maturity
Protecting and Tracking Sensitive Data
Dr. David Goodman, KuppingerCole
Dan Plastina, Microsoft

Information Centric Security; the Way to Go?
Rui Melo Biscaia, Watchful Software
John Grillos, Seclore
Henk Van der Heijden, TecHarbor
Eyal Manor, Secure Islands
Scott Masson, TITUS
Dan Plastina, Microsoft
Jose Manuel Rodriguez, Prot-On
Bring Your Own Privacy
Life Management Use Cases & Business Models
Katryna Dow, Meeco

Empowering the Consumer for Digital Business and the Identity Economy
Prof. Dr. Sachar Paulus, KuppingerCole
13:00-14:30 Lunch & Networking
EXPO AREA
Managing Digital Risk: Deploying People, Standards, Metrics, and Enforcement
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
Redefining Access Governance
Moderator:
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
AMMERSEE I
Identity Defined Security
Moderator:
Dr. David Goodman, KuppingerCole
Dave Kearns, KuppingerCole
ALPSEE
Securing Operational Technology (OT) and the Internet of Things (IoT)
Moderator:
John Sabo, OASIS Idtrust
Mike Small, KuppingerCole
AMMERSEE II
14:30-15:30
Software Defined Everything
The Role of Policy Management in the Software-Defined Era
Tim Grance, NIST
Andy Land, IBM
Anthony Nadalin, Microsoft
Ken Owens, Cisco Systems
Hemma Prafullchandra, HyTrust
Dynamic Authorization
Adaptive Policy-Based Access Management: Beyond ABAC and RBAC
Martin Kuppinger, KuppingerCole

The Future of Authorization
Gerry Gebel, Axiomatics Americas
Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint
Markus Weber, ForgeRock
Frank Wittlich, Talanx Systeme AG
New Security Solutions for the Enterprise
What If the Future of Security Means Not Knowing It’s There?
Kim Cameron, Microsoft
Nishant Kaushik, CA
Dr. Sridhar Muppidi, IBM
Christian Patrascu, Oracle Corp.
Jackson Shaw, Dell

User Discovery: Changing Best Practices and Protocol Convergence
Pamela Dingle, Ping Identity
IoT/OT Privacy & Security
Security and the Internet of Everything and Everyone
Mike Small, KuppingerCole

IoT Privacy Risks, Legislation and Solutions
Kuan Hon, Queen Mary University of London
Yariv Lenchner, Cyber-Ark Software
Peter Niblett, IBM
John Sabo, OASIS Idtrust
Erik Sucksdorff, GlobalSign
15:30-16:30
Risk Metrics
What Gets Measured Gets Done – Identifying New Metrics for Distributed Digital System Performance to Evaluate and Mitigate Risk.
Robert Lapes, Capgemini
Dr. Roy Lindelauf, Netherlands Defence Academy
Luca Martelli, Oracle
Nathan Wenzler, Thycotic

How to Measure the Real Access Risk?
Niels von der Hude, Beta Systems Software
Dr. Sridhar Muppidi, IBM
Wolfgang Roesch, Tesis Sysware
Best Practice
IAM/IAG @ Continental AG: Clearing Process as a Basis for Identity Management
Theodor Heindl, Continental Corporate Infrastructure

Identity Relationship and Access Management and Dynamic Authorisation Management as a Driver for New Business Opportunities
Laura Lätti, DNA Finland
IAM as a Managed Service
IAM as a Service Best Practice: B.Braun Melsungen AG
Martin Oberlies, B.Braun Melsungen AG

Experiences with IAM as a Service and/or IAM Managed Service
Martin Oberlies, B.Braun Melsungen AG
Theo Punter, PostNL
Darran Rolls, SailPoint
Maarten Stultjens, iWelcome
Yso Vonk, NXP Semiconductors
Peter Weierich, iC Consult GmbH
Identity of Things
Putting Identity at the Center of IoT- Kantara IDoT Strategic Review
Victor Ake, ForgeRock
Andre Boysen, SecureKey Technologies
Ingo Friese, Deutsche Telekom AG
Hannes Tschofenig, ARM

Process Control, Production IT and Operational Technology - No Go Areas for IDM?
Eleni Richter, EnBW
16:30-17:00 Coffee & Networking
17:00-18:00
Adopting the New Thinking on Digital Risk
Bringing it All Together – Distributed Strategy Solutions for Distributed Risk
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Access Intelligence
Access Intelligence, User Activity Monitoring, Recertification: What do we Really Need?
Ramses Gallego, Dell
Dr. Michael B. Jones, Microsoft
Rainer Knorpp, Devoteam
Thierry Winter, Evidian
Next Generation IAM
The Anthem Breach and how it could have been Avoided
Dave Kearns, KuppingerCole

Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions
Martin Kuppinger, KuppingerCole
Integration
Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT
Gershon Janssen, OASIS Open Standards Group
Peter Niblett, IBM
Jeff Stollman, Secure Identity Consulting
Dirk Wahlefeld, ITConcepts
Souheil Ben Yacoub, Verisign
18:00-18:30 Closing Keynote
Prof. Dr. Sachar Paulus, Scientific Advisor, KuppingerCole
AUDITORIUM

Friday, 05/08/2015
08:30-10:00 Check-in & Registration
COUNTER HOTEL
Workshop Stream I
AMMERSEE I
Workshop Stream II
AMMERSEE II
Workshop Stream III
ALPSEE
09:00-12:30 Roles, Recertification, Access Governance: The Lean Approach
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Cloud Risk Assessment
Mike Small, KuppingerCole
Industry Focus Workshop: Insurance & Financial Services
Prepare your Organization for the Digital Transformation: Enable the Agile, Connected Business
Martin Kuppinger, KuppingerCole
Wolfgang Rupprath, FSP
12:30-13:30 Lunch Break
RESTAURANT
13:30-16:00 Roles, Recertification, Access Governance: The Lean Approach
Matthias Reinwarth, KuppingerCole
Dr. Horst Walther, KuppingerCole
Beyond your On-Premise IT: Privilege Management for Cloud, Virtualization, SDE, OT, and IoT
Dave Kearns, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic
Identity Mixer, uProve, Qiy Trust Framework, UMA: Providing Control to the Individual
Ronny Bjones, Microsoft
Joni Brennan, Kantara Initiative
Dr. Maria Dubovitskaya, IBM Research
Marcel van Galen, Qiy Foundation
Bram Neuteboom, Qiy Foundation
Daniel Raskin, ForgeRock


© 2015 KuppingerCole