|
|
Agenda
| Wednesday, 05/06/2015 |
| 08:30-08:50 |
Cryptography for the People
Dr. Jan Camenisch, Scientist, IBM Research
AUDITORIUM
|
| 08:50-09:10 |
A smarter, More Secure Internet of Things?
David Mount, Solutions Consulting Director, NetIQ
|
| 09:10-09:30 |
Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems
Yariv Lenchner, Senior Product Manager, Operational Technologies, Cyber-Ark Software
|
| 09:30-09:50 |
Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM
Ralf Knöringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH
|
|
The New Risk Landscape: IT, Operational Technology and IoT
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM |
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
AMMERSEE I |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE |
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
Mario Hoffmann, Fraunhofer AISEC
AMMERSEE II |
| 11:00-12:00 |
Mapping the Changes in Data and Identity Risk Landscapes From Security to Information Security to Digital Risk
Hanns Proenen, GE Europe
Mapping the Changes in Data and Identity Risk Landscapes - From Physical Security to Information Security to Digital Security to Interaction Security
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
|
Security for the Digital Business What are the Requirements for your Future IAM to Enable Digital Security?
Martin Kuppinger, KuppingerCole
IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint
The Role of IAM in Hack Prevention
Patrick Parker, EmpowerID
Matthias Reinwarth, KuppingerCole
|
Cloud Identity & Security Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?
Marc Bütikofer, Ergon Informatik AG
Ralf Knöringer, Atos IT Solutions and Services GmbH
James Litton, Identity Automation
Mike Nelsey, Aurionpro Solutions plc
Max Waldherr, Dell Software
|
User Empowerment - The Building Blocks Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols
Mario Hoffmann, Fraunhofer AISEC
More panelists TBA
Extending the Power of Consent with User-Managed Access and OpenUMA
Eve Maler, ForgeRock
Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise
Robert Lapes, Capgemini
|
| 12:00-13:00 |
Preconceptions of Risk Data and Identity Systems Risk in the Larger Distributed Risk Context
Thom Langford, Sapient
Negotiating the Risk of Privacy - Understanding Privacy and its Risks
Prof. Dr. Rüdiger Grimm, University Koblenz-Landau, Faculty of Informatics
|
Identity Relationship Management (IRM) & the Business Side No Person is an Island: How Relationships Make the IT World More Manageable
Ian Glazer, Salesforce
The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
Bill Evans, Dell Software
Matthias Reinwarth, KuppingerCole
Markus Weber, ForgeRock
Rudolf Wildgruber, Atos IT Solutions and Services GmbH
|
Next Generation (Mobile) Cloud Enterprise Mobility Management: Best Practices & Lessons Learned
Pavlos Makridakis, Aurionpro Solutions plc
Christian Patrascu, Oracle Corp.
Dominic Schmidt-Rieche, AirWatch
What’s Next in Cloud IAM – Moving Beyond Single Sign-On
Pamela Dingle, Ping Identity
Dr. Martin Kuhlmann, Omada
Daniel Raskin, ForgeRock
Richard Walters, Intermedia
|
Internet Scale Encryption, Authentication, Authorization Idemix: Secure, Attribute-Based Authentication
Dr. Jan Camenisch, IBM Research
uProve: The Pricipal of Minimal Disclosure at Work
Ronny Bjones, Microsoft
Qiy Scheme: Trusted Exchange of Personal Information
Marcel van Galen, Qiy Foundation
|
|
Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Moderator:
John Hermans, KPMG
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM |
The Future of Identity & Access Management
Moderator:
Matthias Reinwarth, KuppingerCole
Graham Williamson, KuppingerCole
AMMERSEE I |
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE |
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Dr. David Goodman, KuppingerCole
AMMERSEE II |
| 14:30-15:30 |
Digital Risk Officer & Chief Digital Officer It Takes a Community to Reduce Risk – Company Leadership and Recruitment of Supply Chains Stakeholders in Risk Mitigation Strategies
Amar Singh, KuppingerCole
Recruiting Customers, Suppliers and Even Competitors to Help Reduce Risk
Thom Langford, Sapient
Dr. Adriana Nugter, Independant Senior Consultant
Arieh Shalem, Orange
Amar Singh, KuppingerCole
One Step Closer to the Unhackable Enterprise: Applying an Effective Information Security Strategy
Stefan Van Gansbeke, CM/MC Health Insurance Fund Belgium
|
Best Practice Identity @ The Guardian - SSO at Web Scale
Mark Butler, The Guardian
Rethinking Digital Identity: The Australian Government Story
Ben Bildstein, Department of Industry and Science (Australian Government)
|
Cloud Encryption; Securing IaaS Customer-Managed Encryption Keys: Controlling Your Data’s Privacy in the Cloud
Richard Anstey, Intralinks
Dan Plastina, Microsoft
More panelists TBA
Best Practice: From Zero to Secure in 1 Minute
Nir Valtman, NCR Corporation
|
Standards & Protocols Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
Pamela Dingle, Ping Identity
OpenID Connect Certification
Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Dr. Michael B. Jones, Microsoft
The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0
Dominick Baier, Thinktecture
|
| 15:30-16:30 |
Cloud Risk Assessment Assessing and Mitigating Cloud Risks
John Hermans, KPMG
Mario Hoffmann, Fraunhofer AISEC
Olga Kulikova, KPMG
Mike Small, KuppingerCole
Dynamic Control Selection Framework for Onboarding Cloud Solutions
Olga Kulikova, KPMG
Dynamic Certification of Cloud Ecosystems
Mario Hoffmann, Fraunhofer AISEC
Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.
Mike Small, KuppingerCole
|
FIDO Alliance: Simplifying User Authentication The Death of the Password - Is It Finally Coming True?
Alexei Czeskis, Google
Tord Fransson, Yubico
Dr. Michael B. Jones, Microsoft
Rolf Lindemann, Nok Nok Labs
Anthony Nadalin, Microsoft
Donal O'Shea, FIDO Alliance
|
Hybrid Cloud & Beyond Best Practice: A Hybrid Enterprise in a Cloud First World
Brian Puhl, Microsoft
Identity-as-a-Service Securing PostNL’s 100% Cloud Strategy
Theo Punter, PostNL
|
OASIS SAML & XACML for Consumer Identity Securing Sensitive Data While Enhancing Privacy
Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Gerry Gebel, Axiomatics Americas
Karyn Higa-Smith, U.S. Department of Homeland Security
Soren Peter Nielsen, NineConsult
Daniel Raskin, ForgeRock
John Tolbert, Queralt
|
| 17:30-18:30 |
Think Globally, Act Locally Understanding and Dealing with Macro-Level Risks that Affect your Institution’s Risk Profile
Ben Bildstein, Department of Industry and Science (Australian Government)
Karyn Higa-Smith, U.S. Department of Homeland Security
Dr. Roy Lindelauf, Netherlands Defence Academy
Howard Mannella, Alternative Resiliency Services Corp
Robin Wilton, Internet Society
|
Privilege Management Privilege Management Use Cases
Christian Götz, CyberArk
Serge Ingber, ObserveIT
Amar Singh, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic
The Snowden Effect: Why seeing is believing
Chris Pace, Wallix
Wolfgang Roesch, Tesis Sysware
Michael Yaffe, BeyondTrust
|
Business-Critical Infrastructure & Applications The Future of Directory Services: Data Models - Performance - Security
Andrew Ferguson, KuppingerCole Asia Pacific
Peter Gietz, DAASI International GmbH
Thorsten Niebuhr, WedaCon Informationstechnologien GmbH
Business Critical Application Security
Christian Patrascu, Oracle Corp.
Gerhard Unger, Onapsis Inc.
More panelists TBA
|
Telcos & Innovation Identity Strategy for Innovation
Chema Alonso, Eleven Paths, Telefonica
Facing The Future: Identity Opportunities for Telco Operators
Chema Alonso, Eleven Paths, Telefonica
John Bradley, OpenID Foundation, Kantara
Jörg Connotte, Deutsche Telekom AG
Marco Dütsch, Swisscom
Maarten Louman, Qiy
Dr. Adriana Nugter, Independant Senior Consultant
Arieh Shalem, Orange
Nick Tuffs, Vodafone
|
| 18:30-18:50 |
RISK is Not a @#$%&! Dirty Word!
Thom Langford, Director Global Security Office, Sapient
AUDITORIUM
|
| 18:50-19:10 |
Connected Identity : Benefits, Risks & Challenges
Prabath Siriwardena, Director, Security Architecture, WSO2
|
| 19:10-19:30 |
No Security without Identity
André Durand, Founder & CEO, Ping Identity
|
|