English   Deutsch   Русский   中文    

Information

Language:
English
Date:
May 05 - 08, 2015
Location:

Dolce BallhausForum
Andreas-Danzer-Weg 1
85716 Unterschleißheim, Munich
Registration fee:
$2772.00
plus 19% VAT
 






Agenda

Wednesday, 05/06/2015
08:00-18:00 Check-in & Registration
COUNTER EXPO AREA
08:30-08:50 Cryptography for the People
Dr. Jan Camenisch, Scientist, IBM Research
AUDITORIUM
08:50-09:10 A smarter, More Secure Internet of Things?
David Mount, Solutions Consulting Director, NetIQ
09:10-09:30 Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems
Yariv Lenchner, Senior Product Manager, Operational Technologies, Cyber-Ark Software
09:30-09:50 Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM
Ralf Knöringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH
10:00-11:00 Coffee & Networking
EXPO AREA
The New Risk Landscape: IT, Operational Technology and IoT
Moderator:
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
The Future of Identity & Access Management
Moderator:
Martin Kuppinger, KuppingerCole
Matthias Reinwarth, KuppingerCole
AMMERSEE I
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE
User Managed Identity & Access
Moderator:
Dr. David Goodman, KuppingerCole
Mario Hoffmann, Fraunhofer AISEC
AMMERSEE II
11:00-12:00
Mapping the Changes in Data and Identity Risk Landscapes
From Security to Information Security to Digital Risk
Hanns Proenen, GE Europe

Mapping the Changes in Data and Identity Risk Landscapes - From Physical Security to Information Security to Digital Security to Interaction Security
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
Security for the Digital Business
What are the Requirements for your Future IAM to Enable Digital Security?
Martin Kuppinger, KuppingerCole

IAM Under Fire: Best Practices for Protecting the Keys to your Kingdom
Martin Kuppinger, KuppingerCole
Darran Rolls, SailPoint

The Role of IAM in Hack Prevention
Patrick Parker, EmpowerID
Matthias Reinwarth, KuppingerCole
Cloud Identity & Security
Top 5 Cloud Security Threats and how to Mitigate the Risk of High Impact
Amar Singh, KuppingerCole
Mike Small, KuppingerCole

Simplify your IAM – what’s first: User Interface, Processes, or Infrastructure?
Marc Bütikofer, Ergon Informatik AG
Ralf Knöringer, Atos IT Solutions and Services GmbH
James Litton, Identity Automation
Mike Nelsey, Aurionpro Solutions plc
Max Waldherr, Dell Software
User Empowerment - The Building Blocks
Designing the Privacy-Aware Internet: Standards, Trust Frameworks, Encryption, Protocols
Mario Hoffmann, Fraunhofer AISEC
More panelists TBA

Extending the Power of Consent with User-Managed Access and OpenUMA
Eve Maler, ForgeRock

Crossing The Chasm: Bridging The Divide Between Consumer Identity And Identity In The Enterprise
Robert Lapes, Capgemini
12:00-13:00
Preconceptions of Risk
Data and Identity Systems Risk in the Larger Distributed Risk Context
Thom Langford, Sapient

Negotiating the Risk of Privacy - Understanding Privacy and its Risks
Prof. Dr. Rüdiger Grimm, University Koblenz-Landau, Faculty of Informatics
Identity Relationship Management (IRM) & the Business Side
No Person is an Island: How Relationships Make the IT World More Manageable
Ian Glazer, Salesforce

The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
Bill Evans, Dell Software
Matthias Reinwarth, KuppingerCole
Markus Weber, ForgeRock
Rudolf Wildgruber, Atos IT Solutions and Services GmbH
Next Generation (Mobile) Cloud
Enterprise Mobility Management: Best Practices & Lessons Learned
Pavlos Makridakis, Aurionpro Solutions plc
Christian Patrascu, Oracle Corp.
Dominic Schmidt-Rieche, AirWatch

What’s Next in Cloud IAM – Moving Beyond Single Sign-On
Pamela Dingle, Ping Identity
Dr. Martin Kuhlmann, Omada
Daniel Raskin, ForgeRock
Richard Walters, Intermedia
Internet Scale Encryption, Authentication, Authorization
Idemix: Secure, Attribute-Based Authentication
Dr. Jan Camenisch, IBM Research

uProve: The Pricipal of Minimal Disclosure at Work
Ronny Bjones, Microsoft

Qiy Scheme: Trusted Exchange of Personal Information
Marcel van Galen, Qiy Foundation
13:00-14:30 Lunch & Networking
Managing Digital Risk: Mapping the New Distributed Risk Landscapes
Moderator:
John Hermans, KPMG
Dr. Karsten Kinast LL.M., KuppingerCole
Dr. Scott David, LL.M., KuppingerCole
AUDITORIUM
The Future of Identity & Access Management
Moderator:
Matthias Reinwarth, KuppingerCole
Graham Williamson, KuppingerCole
AMMERSEE I
Architecting the Digital Enterprise: Securing Cloud, Data & Mobility
Moderator:
Amar Singh, KuppingerCole
Mike Small, KuppingerCole
ALPSEE
User Managed Identity & Access
Moderator:
Joni Brennan, Kantara Initiative
Dr. David Goodman, KuppingerCole
AMMERSEE II
14:30-15:30
Digital Risk Officer & Chief Digital Officer
It Takes a Community to Reduce Risk – Company Leadership and Recruitment of Supply Chains Stakeholders in Risk Mitigation Strategies
Amar Singh, KuppingerCole

Recruiting Customers, Suppliers and Even Competitors to Help Reduce Risk
Thom Langford, Sapient
Dr. Adriana Nugter, Independant Senior Consultant
Arieh Shalem, Orange
Amar Singh, KuppingerCole

One Step Closer to the Unhackable Enterprise: Applying an Effective Information Security Strategy
Stefan Van Gansbeke, CM/MC Health Insurance Fund Belgium
Best Practice
Identity @ The Guardian - SSO at Web Scale
Mark Butler, The Guardian

Rethinking Digital Identity: The Australian Government Story
Ben Bildstein, Department of Industry and Science (Australian Government)
Cloud Encryption; Securing IaaS
Customer-Managed Encryption Keys: Controlling Your Data’s Privacy in the Cloud
Richard Anstey, Intralinks
Dan Plastina, Microsoft
More panelists TBA

Best Practice: From Zero to Secure in 1 Minute
Nir Valtman, NCR Corporation
Standards & Protocols
Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
Pamela Dingle, Ping Identity

OpenID Connect Certification
Roland Hedberg, ICT Services and System Development (ITS), Umeå University
Dr. Michael B. Jones, Microsoft

The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0
Dominick Baier, Thinktecture
15:30-16:30
Cloud Risk Assessment
Assessing and Mitigating Cloud Risks
John Hermans, KPMG
Mario Hoffmann, Fraunhofer AISEC
Olga Kulikova, KPMG
Mike Small, KuppingerCole

Dynamic Control Selection Framework for Onboarding Cloud Solutions
Olga Kulikova, KPMG

Dynamic Certification of Cloud Ecosystems
Mario Hoffmann, Fraunhofer AISEC

Cloud Risk Assessment – An "Action-Oriented” Approach to Merge Engineering, Economic and Legal Analyses.
Mike Small, KuppingerCole
FIDO Alliance: Simplifying User Authentication
The Death of the Password - Is It Finally Coming True?
Alexei Czeskis, Google
Tord Fransson, Yubico
Dr. Michael B. Jones, Microsoft
Rolf Lindemann, Nok Nok Labs
Anthony Nadalin, Microsoft
Donal O'Shea, FIDO Alliance
Hybrid Cloud & Beyond
Best Practice: A Hybrid Enterprise in a Cloud First World
Brian Puhl, Microsoft

Identity-as-a-Service Securing PostNL’s 100% Cloud Strategy
Theo Punter, PostNL
OASIS SAML & XACML for Consumer Identity
Securing Sensitive Data While Enhancing Privacy
Dr. Michael Garcia, National Institute of Standards and Technology (NIST)
Gerry Gebel, Axiomatics Americas
Karyn Higa-Smith, U.S. Department of Homeland Security
Soren Peter Nielsen, NineConsult
Daniel Raskin, ForgeRock
John Tolbert, Queralt
16:30-17:30 Coffee & Networking
17:30-18:30
Think Globally, Act Locally
Understanding and Dealing with Macro-Level Risks that Affect your Institution’s Risk Profile
Ben Bildstein, Department of Industry and Science (Australian Government)
Karyn Higa-Smith, U.S. Department of Homeland Security
Dr. Roy Lindelauf, Netherlands Defence Academy
Howard Mannella, Alternative Resiliency Services Corp
Robin Wilton, Internet Society
Privilege Management
Privilege Management Use Cases
Christian Götz, CyberArk
Serge Ingber, ObserveIT
Amar Singh, KuppingerCole
Edwin van der Wal, Everett
Nathan Wenzler, Thycotic

The Snowden Effect: Why seeing is believing
Chris Pace, Wallix
Wolfgang Roesch, Tesis Sysware
Michael Yaffe, BeyondTrust
Business-Critical Infrastructure & Applications
The Future of Directory Services: Data Models - Performance - Security
Andrew Ferguson, KuppingerCole Asia Pacific
Peter Gietz, DAASI International GmbH
Thorsten Niebuhr, WedaCon Informationstechnologien GmbH

Business Critical Application Security
Christian Patrascu, Oracle Corp.
Gerhard Unger, Onapsis Inc.
More panelists TBA
Telcos & Innovation
Identity Strategy for Innovation
Chema Alonso, Eleven Paths, Telefonica

Facing The Future: Identity Opportunities for Telco Operators
Chema Alonso, Eleven Paths, Telefonica
John Bradley, OpenID Foundation, Kantara
Jörg Connotte, Deutsche Telekom AG
Marco Dütsch, Swisscom
Maarten Louman, Qiy
Dr. Adriana Nugter, Independant Senior Consultant
Arieh Shalem, Orange
Nick Tuffs, Vodafone
18:30-18:50 RISK is Not a @#$%&! Dirty Word!
Thom Langford, Director Global Security Office, Sapient
AUDITORIUM
18:50-19:10 Connected Identity : Benefits, Risks & Challenges
Prabath Siriwardena, Director, Security Architecture, WSO2
19:10-19:30 No Security without Identity
André Durand, Founder & CEO, Ping Identity
19:30-22:00 European Identity Awards Ceremony & Buffet Dinner


© 2015 KuppingerCole