Financials

The first wave of massive regulatory pressure after the Financial Crisis now has passed the Finance Industry. Many organizations have achieved significant improvements in their Access Governance deployments or are on the way. However, it is not about taking a rest now for the next years. The pressure on IAM and IAG, as well as on GRC in general, remains high. And beyond tackling the initial findings, organizations need to extend their deployments so that they are audit-proof for the future. Working to the business instead of working to the audit: That is today�s challenge. Beyond that, the Extended Enterprise increasingly becomes a challenge for the Finance Industry as well. New sales models and external sales organizations in the insurance industry and closer collaboration with the customer stand for this. IAM and IAG are the foundation for enabling that change. IAM/IAG long has moved from being an administration-only technology towards becoming a business enabling technology.

The Finance Virtual Track is a guideline through the high priority topics for the Finance Industry. GRC and Access Governance, Identity Federation and the Extended Enterprise, Life Management Platforms and the API Economy as enabler for new forms of collaboration � and the Finance Industry Roundtable itself: All these sessions deliver what you need for future-proof IAM, IAG, and GRC in the Finance Industry.

Wednesday, 15.05.2013
08:30-09:00 Access Govenance: A pragmatic Approach on how to deal with almost Unmanageable Complexity
Berthold Kerl, Deutsche Bank AG

  • Access Governance: Why is it so difficult?
  • There is no easy way out!
  • Does Access Govenance have a business case?
  • It�s a multi-dimensional challenge therefore many stakeholders need to contribute (e.g. HR, IT, Business, Legal, Data protection)
  • How to define priorities?
  • Strong program governance is key
  • Deutsche Bank�s roadmap forward
AUDITORIUM
09:00-09:30 European Cloud Partnership - Shaping a Competitive Strategy
Prof. Dr. Reinhard Posch, Republic of Austria

The European Cloud Partnership (ECP), a European Commission Initiative, is aiming at bringing together industry and the public sector to establish a Digital Single Market for cloud computing in Europe. Prof. Dr. Reinhard Posch, who is a member of the ECP Steering Board, will talk about the objectives of this initiative and his thoughts on eID within this context.

09:30-10:00 Post-Privacy: Yet to come or has it already arrived?
Dr. Karsten Kinast, LL.M., KuppingerCole

Google´s Goggles and augmented reality, remote medical diagnosis and eHealth, superdrones and your phone - the number and the evil potential of technologies undermining your privacy needs are on a fast and strong increase. KuppingerCole Fellow Analyst and Privacy Expert Dr. Karsten Kinast will talk about the question wether the worst is yet to come, and will interview Austria´s CIO Prof. Dr. Reinhard Posch, Deutsche Bank Head of Information & Technology Risk Berthold Kerl, and Austria´s CIO Prof. Dr. Posch.

10:30-11:30 The Business Case of Access Governance
Access Governance as a Multiyear and Multidimensional Program
Berthold Kerl, Deutsche Bank AG

  • Access Governance: Why is it so difficult?
  • There is no easy way out!
  • Does Access Govenance have a business case?
  • It�s a multi-dimensional challenge therefore many stakeholders need to contribute (e.g. HR, IT, Business, Legal, Data protection)
  • How to define priorities?
  • Strong program governance is key
Access Governance & Intelligence at Deutsche Bank AG
Carolin Pfeil, Deutsche Bank AG

Following the worldwide financial crisis all Financial Institutions are facing increasing regulatory requirements globally. A major focus is put on the evidence for having implemented a consistent approach to the “Segregation of Duties” (SoD) principle.

A key challenge is to not only achieve this within a specific application or organizational unit, but to continuously check and monitor the implementation across applications, business processes or entire departments in a complex, heterogeneous and global environment. Typical samples are the segregation of Front and Back Office or Development and Production.

To address this problem, in January 2012 Deutsche Bank launched the "Global SoD Program" involving all divisions and functions in designing and implementing SoD rules to cover all relevant scenarios. These rules are automatically executed detecting any SoD conflict or critical access right within the applications in scope. The designated SoD Managers are tasked to resolve these non-compliances by either revoking access or granting temporary exceptions e.g. if such a critical access right combination is required for a hand over period. Caroline Pfeil will describe the highlights of this project which had been finished in 2012.

AUDITORIUM
11:30-12:30 Going beyond static Assignments
Redefining Access Governance: Going well beyond Recertification
Martin Kuppinger, KuppingerCole

When looking back at the evolution of Access Governance, this is a history of change and rapid innovation. From the days of “Enterprise Role Management”, before the term Access Governance even was known, to common marketing terms like IAG (Identity and Access Governance) or Access Intelligence, a lot has happened. Virtually all major players have entered this market. Products became more mature. Access Governance has replaced Identity Provisioning as the typical starting point for IAM (Identity and Access Management) initiatives. It delivered at least partially at the promise of a business instead of an IT tool. Advanced analytics are on the rise.

Nevertheless, Access Governance still hasn’t reached its final maturity level. It is still a relatively new segment and KuppingerCole expects to see massive innovation over the course of the next few years. Given that Information Security is facing new challenges in these days of the Computing Troika (Cloud, Mobile, Social Computing), given that more and more access is based on system-to-system communication (The API Economy) and resulting in the fact, that Dynamic Authorization Management and risk-/context-based authentication and authorization must and will gain massively on momentum, Access Governance is facing new challenges. It is about going beyond traditional, static role-based approaches. It is about integration with other GRC products. It is about integration with Service Catalogs. There are far more challenges Access Governance is facing.

Martin Kuppinger will define and prioritize these challenges and show how Access Governance can and should mature. He will talk about maturity levels for Access Governance. He will provide criteria for picking the Access Governance solution of choice, depending on the short-term priorities but with a longer term evolution in mind. And he for sure will also have a look at the brand new KuppingerCole Leadership Compass on Access Governance. This will be the session which gives you the information you need to make sustainable investments will also having some quick wins. It is a must attend session for all: Customers planning to start with Access Governance, customers rethinking their Access Governance investments, system integrators, and vendors thinking about their product roadmap.

Access Governance: How to Govern all Access
Dr. Martin Kuhlmann, Omada
Christian Patrascu, Oracle
Darran Rolls, SailPoint
Jackson Shaw, Quest Software, now part of Dell
Deepak Taneja, Aveksa
Marco Venuti, CrossIdeas

Access Governance is a key building block in IAM (Identity and Access Management) deployments and as part of IT GRC. However, traditionally Access Governance focuses on managing access based on roles and thus on static assignments. It frequently lacks tight integration with Privilege Management for highly critical IT users like root, system accounts, or shared accounts. It also typically lacks support for managing business and security rules within Dynamic Authorization Management, for instance for XACML-based systems. However, managing not only roles but also rules consistently, with well-defined workflows for definition and approval, and managing all types of accounts appears to be increasingly important for customers. Other major trends are around Data Governance, i.e. a deeper view on systems holding less structured information like file systems or Microsoft SharePoint. And there is still the discussion about the level of integration with target systems: Shall Access Governance fully include Identity Provisioning? This panel will look at the future trends in the market around expanding Access Governance to all types of access and to support for direct reconciliation.

AUDITORIUM
14:00-15:00 A Success Story Introducing User Access Management for an Energy Trading Company
Dr. Carsten Mielke, E.ON Energy Trading SE

  • Background and Motivation for introducing User Access Management
  • Project challenges
  • Critical success factors
  • Obstacles and how to overcome them
  • Recommendations and Lessons learned
IAM Governance Outside IT
Ulrich Haumann, HypoVereinsbank

For organizations that are under strong governance control and dealing  with sensitive information on a daily basis, it is essential to know who has access to which data. One of the most important topics is to know this along the  business process. Before granting access to data or applications there must be done several reviews to assure compliance. In the classical approach this is done in the organization manly with paperwork and organizational processes and ends then in the IT process.

The approach is now to do this by a central system before any access is granted in the IT system. This ensures traceability, segregation of duties and need to know principle, ordered access has to be checked before any action is taking in the IT system. Building up user friendly interface, online tracking and reporting also for historical data of all access rights towards all different systems without touching target systems is a challenge.

AUDITORIUM
15:00-16:00 Access Intelligence: The New Standard Feature of Access Governance?
Olivier Bandle, Cambridge Technology Partners
Niels von der Hude, Beta Systems Software
Darran Rolls, SailPoint
Rick Wagner, NetIQ
Thierry Winter, Evidian
Abhimanyu Yadav, Simeio Solutions

Access Intelligence is a hot new topic within the discipline of Access Governance. But what is this really about? Is it just better reporting? Or is it about applying advanced Data Warehouse capabilities to analyze existing access rights, the use of them, the access risks etc.? Should it be built based on standard BI tools or should it become more tightly integrated? What is the real benefit compared to standard reporting of Access Governance tools? These are questions customers are raising – and these will be answered within this session.

Risk-based Access Management @Swiss Re
Daniel Frei, Swiss Reinsurance Company Ltd

The objective of the Enhanced Access Management @Swiss Re is to improve and simplify access management. Shifting Swiss Re’s access rights philosophy from the "need-to-know", where only the information one needs to know is accessible, to the "need-to-protect" approach, a risk-based focus on protection of critical information. Strong business support and rule-based automation enabled this change.

AUDITORIUM
17:00-18:00 Access Risk Management: Continuously Identifying and Tracking Access Risks
Stefan Dodel, Oracle
Henk van der Heijden, CA Technologies
Andrea Rossi, CrossIdeas
Sabrina Weimer, G+H Netzwerk-Design

Ever since the big financial scandals, checking and reviewing of access rights, access rights concepts as well as compliance with the separation of functions in a company have been gaining more and more significance. We all know sensitive data in the wrong hands could cause substantial damage. Especially with growing IT landscapes and systems of multiple manufacturers it is important to overview the access rights situation continuously.

Let´s talk about segregation of duties (SoD), statutory requirements, MaRisk, continuous auditing and all those little changes they just happen within a company’s life cycle always and every day:

  • The systems of international and national subsidiaries may need to be linked to each other.
  • Employees switch departments or they may leave the company.
  • Employees work together in different teams.
  • They may also work with external staff who have access to systems for a certain project.
  • Interns pass through all departments and thus collect numerous access rights, irrespective of regulations.

How is it possible to keep the overview of all those potential risks? The answer will be given within the discussion.

AUDITORIUM
18:00-18:20 The Internet of Me and My Things
Doc Searls, Berkman Center for Internet and Society at Harvard University

The history of computing and communications has seen a series of leaps forward in personal empowerment: first with the PC, then with Internet and then with smartphones and tablets. The next step will be life management platforms, which will give individuals independence and power through their own means — notably personal clouds. With these individuals will have the power to create and control interactions between their own "Internet of things," using their own data, their own logic and their own APIs, in real time. These will not make big API services obsolete, but rather give all APIs much more to do, much more effectively.

AUDITORIUM
18:20-18:40 Life Management Platforms � Examples, Prototypes, Best Practices
Marcel van Galen, Qiy Foundation

The Dutch Qiy foundation has been working on the concept of Life Management Platforms since 2005, with quite a few services and apps already in production or just being produced. Qiy´s founder and president Marcel van Galen will lead lead the audience in his keynote through some of these services and apps to make the value of Life Management Platforms better understandable. 

18:40-19:00 Life Management Platforms Evolution
Craig Burton, KuppingerCole

Life Management Platform evolution is increasing in pace and significance. With the advent of new technologies like personal data stores, cloud-based os platforms, and trust frameworks the evolutionary state also gets complicated. This session will look at the current state of things, new innovations and what to expect for LMPs in the future.


Thursday, 16.05.2013
08:30-09:00 If Your Customers Don�t Feel Safe, They Will Leave You
Peter Boyle, BT

More than 559 million adults have been victims of cyber-crime - that´s more than the population of the European Union. More businesses are trying to connect with customers on social and mobile but, 15% of social networking users have had accounts infiltrated and 21% have fallen prey to mobile or social attacks. Only one incident can cause a customer to shift brands. If you are trying to find new paths to market online, don´t miss this session. Securing the customer experience should be the top priority for any business initiative involving cloud, mobile and social. Faced with the need to secure a growing hosting business with more than 10,000 customers accessing services on-line, British Telecom Identity enabled their applications to secure their customer data and transactions. In this session, Peter Boyle Head of Identity Services for BT will discuss how to keep your customer safe, loyal to your brand and keep them coming back for more.

AUDITORIUM
09:00-09:30 ONE Identity � Heaven or Hell? Do we need more than one �ME� ?
Ralf Kn�ringer, Atos IT Solutions and Services GmbH

In the area of the social media, smart mobile devices and worldwide eBusiness the idea of ONE unique electronic identity no longer seems to be the holy grail – long-yearned-for but never to be gained.

Today users of internet services increasingly accept this concept as a necessity to make mobile internet experience convenient, secure and effective.

Has the world finally understood that what is good for the enterprise is good for everybody (The long-term shared wisdom of enterprise identity management always starts with the idea of creating ONE ID.) ?

Will our world become more secure when there is only ONE “me” outside? In this keynote we will have a look at several aspects of the ONE ID paradigm and the role of the classical enterprise IAM.

09:30-10:00 Can �App� Phones Help Users to Manage their Identity and Privacy?
Prof. Dr. Kai Rannenberg, Goethe University in Frankfurt

The many credentials needed on the Internet pose the question where to store and how to use them in a secure fashion. Smart Cards are the classic device, however they usually lack the user interface needed for secure interactions, e.g. choosing or customizing the right attribute-based credential for a given situation and relying party.

Mobile (smart) phones could be the platform of choice given their now very rich user interfaces. However their downside is their insecurity caused by e.g. the complexity of their operating systems, the difficulty for users to control the data flows on the systems and the risks posed by flood of applications (“Apps”) that can be installed quickly and easily

This presentation will discuss opportunities and risks of storing sensitive information on a smart phone and also approaches to help users to judge Apps based on their privacy properties.

14:00-15:00 Cloud Governance, Risk, Compliance
The Upcoming Cybersecurity Strategy for the European Union - What does it mean for your Enterprise?
Dr. J�rg Hladjk, Hunton & Williams LLP

On February 7, 2013, the European Commission launched its cybersecurity strategy for the European Union (“Strategy”). As part of this Strategy, the European Commission also proposed a draft directive on measures to ensure a common level of network and information security (“NIS”) across the EU. The proposed Directive is a key component of this Strategy. It introduces a number of measures to enhance cybersecurity, including:

  • The requirement for EU Member States to adopt a NIS strategy and to designate national NIS authorities to prevent, handle and respond to NIS risks and incidents;
  • The creation of a cooperation network to enable the national NIS authorities, the European Commission and, in certain cases, the European Network and Information Security Agency (“ENISA”) and the Europol Cybercrime Center, to share early warnings on risks and incidents and cooperate on further steps;
  • The obligation for (1) operators of “critical” infrastructures in certain sectors (financial services, transport, energy and health), (2) providers of information society services and (3) public administrations to implement appropriate security measures and to report incidents having a “significant” impact on the services they provide (e.g., the unavailability of a cloud computing service as a result of which users cannot access their data). Such incidents would have to be reported to the national NIS authorities, who may then decide to inform the public or require companies and public administrations to do so.

The FAQs that accompany the proposed NIS Directive include examples of companies that would be obliged to report cyber incidents, such as cloud computing service providers, search engines; e-Commerce platform providers, Internet payment service providers,

providers of VoIP and other communications services, social network providers, platforms enabling the provision and sharing of videos, platforms enabling the provision and sharing of music, major online computer games, and application stores.

Compliance in Hybrid Clouds - Integrated Process Management Despite Regulatory Requirements?
Wolfgang Schmidt, Cloud-EcoSystem e.V.

How can hybrid clouds join together so that a user company operating the respective compliance requirements in the necessary deployment option (leave) and still be able to ensure a consistent and legally compliant process execution? Hybrid cloud connectivity capabilities are a key enabler of the near and long term usage of cloud services. During this session we will show what kind of different hybrid scenarios we see as applicable today at our members, what are the detailed challenges and key obstacles from their point of view and how different approaches were seen by them.

AUDITORIUM
15:00-16:00 Cloud Best Practice
Fast Tracking your Risk Strategy for the Cloud
Nikita Reva, MARS Inc.

Will your Cloud fail the next audit? Do you have a handle on your risk strategy for the Cloud? Is this level of maturity only suited for Enterprises? Can a smaller businesses do this effectively? This session will outline how to build a scalable Cloud risk strategy based on ISO 27005 and CSA Guidance. This talk will set the tone and enable delegates to come home and fast track a Cloud risk strategy.

Cloud Security is only valuable if you have a robust process to identify risk. Managing risk for consuming Cloud is often overlooked. Many organizations feel that only the largest Enterprises can afford to understand and assess the potential or future risks. Instead of security, they focus on the perceived outcome of utilizing the Cloud- the supposed silver lining.In this session, we will describe how to fast track a Cloud risk strategy. Discussing how we built an effective toolkit based on trusted industry tools: ISO/IEC 27005, The Cloud Security Alliance (CSA) Guidance and CCM.

We will bring two true-to-life examples with case studies showing how this was done at a $34B enterprise and then scaled to an e-commerce SMB. We will explain how CSA and ISO 27005 set the tone for our Cloud risk assessment strategy. We will rationalize how these were complemented by external attestations such as SOC1/2/3, penetration and vulnerability testing. We will expand on areas of concern between SMBs and Enterprises.

We will discuss how one gets started by providing a checklist driven road-map to fast-track a Cloud risk strategy. We will start with identifying assets and their overall value to your organization. We will jump into the deep-end on asset classification and explore the particular importance of understanding implementation models and mapping out your data-flow. We will identify how this feeds into a holistic questionnaire to establish a baseline. We will educate delegates on how to assess responses through real-world examples that illustrate how to poke holes.

The Reason why RLB Moved to the Cloud
Mark Evans, Rider Levett Bucknall

The presentation details how insecure RLB´s IT systems and infrastructure once were; the server infrastructure was held in a local government building with open public access, the building was classified by the British security services as being a terrorist target and there were periods where we couldn´t enter the building safely in case of an emergency because the building is often used for filming TV series (I walked past Robert Vaughan from "The Magnificent Seven" once!) and for holding outdoor pop concerts.

AUDITORIUM
16:30-17:30 Trust, Assurance
Top Ten Tips for Negotiating and Assuring Cloud Services
Mike Small, KuppingerCole

How can an organization safely adopt cloud services to gain the benefits they provide? The easy availability of cloud services has sometimes led to line of business managers bypassing the normal procurement processes to obtain cloud services directly without any consideration of the governance and risks involved. There is a confusing jungle of advice on the risks of cloud computing and how to manage these risks. This talk considers advice available and the practical approaches to negotiating and assuring cloud services.

AUDITORIUM
17:30-18:00 Software Integrity and Active Defense - The Future of Information Security
Prof. Dr. Sachar Paulus, KuppingerCole

The development of Information Technology, specifically cloud, mobile and social computing, has led to an environment that has become really open. Moreover, the integration with the real world (smart devices, SCADA systems and alike) significantly raises the potential impact of attacks - and failures. Activities managing the risk in these environments are identity management, security information management and network security. But will these be enough? Sachar Paulus will explain that more is needed to realize adequate protection, and will focus on elements for software (and hardware) integrity - so that processes work as designed - and active defense - so that deviations become visible.

AUDITORIUM

« Return to the full agenda

© 2013 KuppingerCole