april 17 – 20, 2012 · keynotes tuesday, 17.04.2012 16:30-16:50 ripped from the headlines – the...
TRANSCRIPT
April 17 – 20, 2012 MUNICH I GERMANY
HOT TOPICS EIC 2012
Making Information Security a Strategic Priority
Planning, Managing & Governing IAM & Cloud
Service Focused IT in the Age of Cloud Computing
How to Audit Cloud Services
(Cloud) Access Governance Strategies
What to Focus on for Future-Proof Identity & Access Management
Evaluating and Reducing the Risks of Cyber Crime
Mobile Privacy and Security
Cloud Computing Contracts & Law
Data Protection and Privacy: How to Prepare for the New European Privacy Legislation
Personal Data: Life Management Platforms
Device Security & BYOD (Bring Your Own Device)
Platinum Sponsor:
Dr. Jacques BusDigital Enlightenment Forum
Dr. Nigel CameronCenter for Policy on Emerging Technologies
Prof. Dr. Mireille HildebrandtRadboud University Nijmegen
Prof. Dr. Dawn JutlaSaint Mary‘s University, Halifax
Berthold KerlDeutsche Bank AG
Martin KuppingerKuppingerCole
Dr. Barbara MandlDaimler AG
Doc SearlsHarvard Law School
www.id-conf.com
European Identity Conference 2012
EIC 2012, the European Identity and Cloud Conference, will be again the leading conference in Europe around the key topics of Information Security and Cloud Computing. EIC 2012 is about the hot topics of not only CIOs and CISOs, but even the board and the business organization. Cloud Identity and Access, Auditing for the Cloud and On-Premise environments, Enterprise Governance from the high-level Dashboard down to IT, Risk Management, industry-specific sessions and many more hot topics will help you to make your corporate information more secure, to comply with regulations, and to run lean and focused projects around Information Security and Cloud Computing. And all of that providedin a single conference. Even more: KuppingerCole will unveil its KuppingerCole IT Model, the guideline for movingyour IT to the next level. You shouldn’t miss the related sessions. And like every year, EIC will be the conference that provides a perfect mix of thought leadership and best practices. It is where the experts, end users, analysts and others meet. And like every year, KuppingerCole analysts will share their insights from advisories and research. EIC is the conference where you will learn all you need to know about the future of Information Security today. So don’t miss EIC 2012 – which again will become the best EIC ever.
Martin Kuppinger Co-Founder KuppingerCole
5 REASONS WHY YOU SHOULD ATTEND EIC 2012
13 (4) days, over 80 sessions across 5 tracks: EIC is full of world class content, brought to you by the world s best expert speakers and panelists. You will carry back with you much more than you expect and as much as you need to solve your issues.
2 You define the key topics: The EIC agenda is built on top of hundreds of discussions with IT and business professionals all over the world, reflecting real-world challenges your peers are facing every day.
3All the top names of the industry under one roof: Expect all important vendors to send their brilliant experts to EIC and share case studies and explain their key strategies.
4 Over 500 attendees mean 500 great networking opportunities for you: EIC is growing strongly and fast, giving you the opportunity to network and meet with more experts than during the whole year.
5A New Format: Roundtable sessions. EIC is renown for its interactive and lively sessions. In 2012, we are adding a new format, which will be even more interactive: Roundtable meetings for workshop-like deep dives into key topics.
Who you will meet and what you will gain
The European Identity & Cloud Conference will draw together a wide range of thought leaders, experts, c-level officers, project managers and program managers from Europe and all over the world, including CISOs, CSOs, Chief Risk Officers, IT Architects, Project Managers and Program Managers, ITa Security and Information Security Experts and Audit Managers.
strategies to defend your business from internal and external threats without missing the need to share information and increase agility
hundreds of experts to exchange ideas, and to identify new areas of collaboration
your peers from many other countries and share your experiences with them
effectively and securely move into the cloud
and how to avoid data protection and privacy issues
future-proof and cloud-aware IAM infrastructure
Schedule at a Glance17.04.201208:00 - 18:0009:00 - 13:0013:00 - 19:0014:00 - 18:5018:50 - 20:00
Pre Conference & KeynotesConference RegistrationPre Conference WorkshopsEIC 2012 ExpoKeynote SessionsSnacks + Drinks, EXPO AREA
18.04.201208:00 - 18:0008:30 - 10:0009:00 - 19:0010:30 - 18:0018:00 - 18:4018:40 - 22:00
Main Conference Day 1Conference RegistrationKeynote SessionsEIC 2012 ExpoTrack SessionsKeynote SessionsEuropean Identity Awards Ceremony and Buffet Dinner, EXPO AREA
19.04.201208:00 - 18:0008:30 - 10:0009:00 - 18:0010:30 - 17:3017:30 - 18:00
Main Conference Day 2Conference RegistrationKeynote SessionsEIC 2012 Expo*Track SessionsClosing Keynote
20.04.2012*08:30 - 10:0009:00 - 12:3013:30 - 16:00
Workshop Day*Workshop RegistrationWorkshops Workshops
* Expo ends on April 19th, 2012
Gold Sponsor:
KuppingerCole Analysts
Martin KuppingerCo-Founder & Principal Analyst
Alexei BalaganskiSenior Analyst
Craig BurtonDistinguished Analyst
Fulup Ar FollSenior Analyst
Prof. Dr. Friedrich HollSenior Analyst
Dave Kearns Senior Analyst
Prof. Dr. Sachar PaulusSenior Analyst
Sebastian RohrSenior Analyst
Mike SmallFellow Analyst
Dr. Horst WaltherSenior Analyst
Pre Conference Workshops
Tuesday, 17.04.201209:00-13:00
A Review of the Status of Key Internet Iden-tity Protocols OpenID Connect, OAuth 2.0 and Account Chooser Mike Jones, MicrosoftEric Sachs, GoogleJohn Bradley, OpenID Foundation Axel Nennker, DT
OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?Gershon Janssen, OASIS Open Standards GroupProf. Dr. Dawn Jutla, Saint Mary’s University, HalifaxJohn Sabo, CA TechnologiesAnil Saldhana, Red Hat Inc.Mike Small, KuppingerCole
ISACA Workshop: Cloud AssuranceMarc Vael, ISACA
Kantara Initiative SummitJohn Bradley, OpenID Joni Brennan, Kantara InitiativeDr. Maciej Machulak, UMA WGChristine Runnegar, ISOCColin Wallis, New Zealand Government
Keynotes
Tuesday, 17.04.201214:00-14:40
.
Opening KeynoteDr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)Martin Kuppinger, Co-Founder & Principal Analyst, KuppingerCole
14:40-15:00
Dr. Emilio Mordini, CEO, Centre for Science, Society and Citizenship CSSC
15:00-15:20 eID new challenges with Digital Agenda and Cloud Computing
Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria
15:20-15:40
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft
15:40-16:10
Interview: What are the Privacy and Information Security Challenges 2012 and Beyond?Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)Martin Kuppinger, Co-Founder & Principal Analyst, KuppingerColeUdi Mokady, Founder, President & CEO, Cyber-ArkShirief Nosseir, Marketing Manager, CA TechnologiesJim Taylor, VP Identity and Security Management, NetIQ
Silver Sponsor:
www.id-conf.com
KeynotesTuesday, 17.04.201216:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved!
Udi Mokady, Founder, President & CEO, Cyber-Ark
16:50-17:10 Cloud, Consumerization & Identity: Time to Transform the Security Model
Shirief Nosseir, Marketing Manager, CA Technologies
17:10-17:30 Externalized Authorization – What is it Good for?
Peter Weierich, Senior Strategy Consultant, iC Consult GmbH
17:30-17:50 What Standards Have Done and Will Do for Cloud Identity
Dr. Laurent Liscia, Executive Director, OASIS
17:50-18:10
Jackson Shaw, Active Directory, Identity Management Expert, Quest Software
18:10-18:30
Dr. Barbara Mandl, Senior Manager, Daimler AG
18:30-18:50 Free Customers: The New Platform
Doc Searls, Berkman Fellow, Harvard Law School
Wednesday, 18.04.201208:30-09:00 Leveraging Identity to Manage Enterprise Change and Complexity
Jim Taylor, VP Identity and Security Management, NetIQ
09:00-09:30 Securing Critical Banking Infrastructures in the Age of Cyber Warfare
Dr. Waldemar Grudzien, Head of Department Retail Banking and Banking Technology, Association of German Banks
09:30-10:00 Berthold Kerl, Managing Director, Head of Information & Technology Risk Governance,
Deutsche Bank AG
18:00-18:20 How Mobility Clouds the Future and SOA / Web 2.0 gives way to the Cloud API
André Durand, Founder & CEO, Ping Identity
18:20-18:40 Top Challenges and Threats Security Managers Should Watch Out For
Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
Thursday, 19.04.201208:30-09:00 How Identity Management and Access Governance as a Service make your Cloud
Work and your Business more AgileRalf Knoeringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH
09:00-09:30 Prof. Dr. Kai Rannenberg, T-Mobile Chair of Mobile Business & Multilateral Security,
Goethe University in Frankfurt
09:30-10:00 Trust and Complexity in Digital Space
Dr. Jacques Bus, Secretary General, Digital Enlightenment Forum
17:30-18:00 Closing Keynote
Silver Sponsor:
Roundtables
EIC Round Tables add a new dimension to the agenda: Deep dives into some of the most important topics, high interaction, small groups.
Moderation: Consumer Identity
While consumer expectations of their online experience is becoming ever more sophisticated, with privacy, security and ease of use being critical requirements for online success. Are current offerings sufficient to meet those expectations? What has to be changed? What is in the pipeline?
Dave KearnsKuppingerCole
Moderation: Digital Enlightenment Forum
The DIGITAL ENLIGHTENMENT FORUM, founded 2011 in Brussels, is providing a broad framework for debate and guidance on the rapid technological changes and their perceived impact on society and its gov-ernance. With Dr. Jacques Bus, Kim Cameron, Dr. Malcolm Crompton, Prof. Dr. Mireille Hildebrandt, Prof. Dr. Reinhard Posch, Prof. Dr. Kai Ran-nenberg and honorary member Prof. Dr. Ann Cavoukian, the membership list of this forum reads like the who-is-who in privacy-by-design and user controlled identity. Join this round table to discuss with these experts on emerging technologies for modern privacy protecting and trustworthy e-Identity.
Dr. Jacques BusDigital Enlightenment Forum
Moderation: Personal Data: Life Management Platforms
Just imagine how big the data quantity is which you need to organize your daily life. Insurance documents, your salary statements, banking details, your car´s service requirements, flight tickets, miles accounts, your rela-tionships to online and offline vendors, and much more. How much time do you spend to aggregate all these information stored in so many loca-tions which all are outside of your area of influence into something man-ageable?Imagine that you had a personal, secure container system where all those data are automatically delivered to. Join this roundtable to meet the per-sonal data pioneers and learn, how your company can take advantage in early adopting a business model based on this new ecosystem.
Martin KuppingerKuppingerCole
Doc SearlsHarward Law School
Moderation: Mobile Privacy and Security
Even though mobile devices bring along many advantages, privacy and security are not among their strengths.In this round table, we will look into the main issues of mobile privacy and security breaches – and explore what can be done against it. Fulup Ar Foll
KuppingerCole
Bronze Sponsor:
www.id-conf.com
Wednesday, 18.04.2012
Making Information Security a Strategic PriorityModerator: Berthold Kerl, Deutsche Bank AG
10:30-11:30
CYBER CRIMEThe Risks of Cyber Crime for the Financial IndustryBerthold Kerl, Deutsche Bank AG
Facing the Online Threats against Retail and Banking Customers – What are the Future Perspectives?Prof. Dr. Sachar Paulus, KuppingerCole
11:30-12:30
REGULATIONCurrent and Future Information Security in Banks – The Regulator´s View
14:00-15:00
IDENTITY & ACCESS GOVERNANCE –FINANCE INDUSTRYIAM Governance in the New CommerzbankDirk Venzke, Commerzbank AG
Aligning Information Security Architecture and IAM Architecture with XACMLRakesh Radhakrishnan, Bank of America
15:00-16:00
RISK IDENTIFICATION & EVALUATIONDelivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation ProcessDr. Waldemar Grudzien, Association of German BanksBerthold Kerl, Deutsche Bank AGProf. Dr. Sachar Paulus, KuppingerCole
17:00-18:00
VALUE FOCUSED SECURITYIdentity & Access Management as a Key Element for a Value focused Security StrategyRalf Knoeringer, Atos IT Solutions and Services GmbHHassan Maad, EvidianShirief Nosseir, CA TechnologiesPeter Weierich, iC Consult GmbH
You cannot Stop Usage of Social Media - What can you do to make it Secure?
Thursday, 19.04.2012
Planning, Managing and Governing IAM & Cloud Moderators: Craig Burton, KuppingerColeMartin Kuppinger, KuppingerCole
10:30-11:30
BRING YOUR OWN DATA (BYOD)Cornerstones for Successful BYOD and Mobile IT StrategiesCraig Burton, KuppingerCole
Bring your own DataMarcel van Galen, QiyDrummond Reed, Connect.Me
11:30-12:30
THE KUPPINGERCOLE IT MODEL AND THE API ECONOMYHow the API Economy Leverages our Capabilities for Delivering Business ServicesCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole
API Economy: The Consumer ViewFulup Ar Foll, KuppingerCole
API Economy: The Provider View14:00-15:00
VIRTUALIZATIONFrom Virtualization to the Cloud and BeyondCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole
15:00-16:00
IDENTITY AS A SERVICEOne IT, one IAM: Why you should not believe in Cloud-only SolutionsCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole
16:30-17:30
FEDERATION VS. SYNCHRONIZATIONWhat Federation is About – in Theory and in PracticeDave Kearns, KuppingerCole
Federation or Synchronization – the Future of the CloudPatrick Harding, Ping IdentityDarran Rolls, SailPointEric Sachs, Google
Business Insights
Moderation:This track is for CIOs, CISOs, IT Managers, and the project managers and IT people who want to better understand the business side of IAM, GRC, and Cloud Security – plus all the ones who are not primarily IT but have to drive the projects in these areas. Learn how IT really can help the business and provide business benefits.Martin Kuppinger
KuppingerColeBerthold KerlDeutsche Bank AG
Craig BurtonKuppingerCole
Bronze Sponsor:
Cloud Computing
Moderation:If you are responsible for defining cloud strategies and/or involved in projects around Cloud Computing, especially with focus on security, track 2 will deliver the answers you are looking for. Learn how to not only move to the cloud but to mitigate cloud (security) risks and build your secure, hybrid environment making real value of Cloud Computing.Dr. Laurent Liscia
OASISProf.Dr. Sachar PaulusKuppingerCole
Mike SmallKuppingerCole
Wednesday, 18.04.2012
Cloud Computing AuditModerators: Dr. Laurent Liscia, OASISProf. Dr. Sachar Paulus, KuppingerCole
10:30-11:30
CLOUD AUDITAddressing Cloud Audit, Assurance and Compliance Needs – A Progress ReportDr. Marnix Dekker, ENISADr. Laurent Liscia, OASISBrendan M. Peter, CA TechnologiesMike Small, KuppingerCole
11:30-12:30
CLOUD AUDITGlobal Perspectives on Cloud Auditing Challenges and SolutionsSteve Jones, CapgeminiDr. Laurent Liscia, OASISProf. Dr. Sachar Paulus, KuppingerColeJohn Sabo, CA TechnologiesMarc Vael, ISACA
Cloud Identity & AccessModerator: Mike Small, KuppingerCole
14:00-15:00
CLOUD INFORMATION SECURITYThe Cornerstones of Information Securityin the CloudCraig Burton, KuppingerCole
Extending your Identity & Access Management into the CloudGerry Gebel, Axiomatics AmericasDr. Barbara Mandl, Daimler AGPrabath Siriwardena, WSO2aJim Taylor, NetIQ
15:00-16:00
SCIMIs SCIM a Scam?Craig Burton, KuppingerCole
Simple Cloud Identity Management (SCIM)Patrick Harding, Ping IdentityKurt Johnson, Courion CorporationDarran Rolls, SailPoint
17:00-18:00
CLOUD SECURITY ISSUESEyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control themMike Small, KuppingerCole
Thursday, 19.04.2012
Cloud SecurityModerator: Mike Small, KuppingerCole
10:30-11:30
TRUSTWORTHY CLOUDProviding and Maintaining a Secure Cloud Infrastructure – from Planning to AdministrationHenning Arendt, @bc - Arendt Business ConsultingProf. Dr. Clemens Jochum, Goethe-University Frankfurt, House of FinanceAljosa Pasic, Atos Research & InnovationMike Small, KuppingerCole
11:30-12:30
THE OPEN DATA CENTER ALLIANCE VIEWCustomer Driven Cloud Services – What Cloud Customers needProviders to do to better alignIan Lamont, Open Data Center Alliance
14:00-15:00
CLOUD RESILIENCYProtecting and Managing Critical Data in the Cloud
15:00-16:00
CLOUD SERVICE TERMINATIONWhat you should know about Cloud Service Termination before you sign a Contract
16:30-17:30
CLOUD MULTI-TENANCYWhat you should know about the different Types of Multi-Tenancy in Cloud-Services
Association Sponsor:
www.id-conf.com
Identity & Access Management
Moderation:If you are responsible for IAM in your company, if you manage IAM related projects or if you are an IT architect or otherwise involved in IAM projects, this is the track to not miss. Learn about the newest trends from KuppingerCole analyst and Industry Expert thought leadership, learn about best practices, and get the information you need to success-fully run your projects around all areas of IAM.
Craig BurtonKuppingerCole
Fulup Ar FollKuppingerCole
Dr. Horst WaltherKuppingerCole
Wednesday, 18.04.2012
What to Focus on for Future-Proof IAMModerator: Craig Burton, KuppingerCole10:30-11:30
THE BUSINESS VALUE OF ITIncrease Value to the Business: The KuppingerCole IT ModelMartin Kuppinger, KuppingerCole
How IAM can Catalyze the Secure EnterpriseCraig Burton, KuppingerColeGerry Gebel, Axiomatics AmericasMartin Kuppinger, KuppingerColeMike Neuenschwander, Oracle
11:30-12:30
THE FUTURE IT ORGANIZATIONWinds of Change in your IT Organization: Get ready for the FutureCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole
The Future of Identity & Access Management: Embrace, Extend – and don’t Replace?Hassan Maad, EvidianMike Neuenschwander, OracleAlberto Ocello, CrossideasDarran Rolls, SailPointJonathan Sander, Quest SoftwareJim Taylor, NetIQ
IAM Architectur Moderator: Fulup Ar Foll, KuppingerCole14:00-15:00
IDENTITY FEDERATIONIdentity Federation Challenges and how to approach themThomas Gundel, IT CrewPatrick Harding, Ping IdentityColin Wallis, New Zealand Government
Best Practice in Out-sourced Federation: WAYFDavid Simonsen, WAYF
15:00-16:00
PRIVILEGED ACCESSBest Practice: Managing Privileged Users
PCI-DSS, SOX, Basel: How to ManagePrivileged Access and Pass the AuditUdi Mokady, Cyber-Ark
17:00-18:00
DIRECTORIESSingle Point of Access: The IAM Strategy at TeleflexNick Sabinske, Teleflex
17:00-18:00
One Identity Service, Many Initiatives: Exploring Use Cases for Identity VirtualizationFulup Ar Foll, KuppingerColeNick Sabinske, TeleflexUlrich Schulz, Radiant Logic
Thursday, 19.04.2012
IAM Architectur Moderator: Dr. Horst Walther, KuppingerCole
10:30-11:30
RE-ENGINEERING IAMRe-engineering IAM to better serve your Business NeedsMartin Kuppinger, KuppingerCole
Building Identity & Access Management as a Public Administration Service for the Trento Autonomous ProvinceFabrizio Russo, Trento Autonomous Province
11:30-12:30
AUTHENTICATIONCase Study: Large Scale Authentication, Australian GovernmentTrish Porter, Australian Department of Innovation, Industry, Science and ResearchMalcolm Young, Australian Department of Innovation, Industry, Science and Research
14:00-15:00
SECURITY INTELLIGENCEBest Practices for Lean, Efficient and Focused Information Security ProjectsDr. Horst Walther, Kuppinger Cole
Identity and Security IntelligenceKim Cameron, MicrosoftMatthew Gardiner, RSARobert Griffin, RSA, the Security Division of EMC
15:00-16:00
ACCESS & ENTITLEMENTSIntroducing an Entitlement Managment System – a Travel ReportManuel Schneider, Generali Deutschland Informatik Services
Access & EntitlementsGerry Gebel, Axiomatics AmericasManuel Schneider, Generali Deutschland Informatik ServicesMarco Venuti, CrossIdeas
16:30-17:30
IAM OPEN SOURCE SOFTWAREIdentity Management & Open SourceMichael Kleinhenz, tarent AG
Media Partner:
Legal & GRC
Moderation:CIO, CISO, Data Protection Officers, Risk and Compliance Officers, Internal Audit, line managers and project managers confronted with the legal and GRC issues, as well as all the ones involved in Access Governance, IT GRC, and Business GRC projects. Learn what to look at from the legal per-spective and how to build a real Enterprise GRC covering all types of risks and integrating the Business and IT view of GRC.
Dr. Joerg HladjkHunton & Williams LLP
Prof.Dr. Sachar PaulusKuppingerCole
Wednesday, 18.04.2012
Cloud Legal, Privacy, Data Protection Moderator:Dr. Joerg Hladjk, Hunton & Williams LLP
10:30-11:30
EU PRIVACY NEWSNew EU Data Protection Rules: What will cause the most Pain, who will suffer and how can you gear up for them?Dr. Joerg Hladjk, Hunton & Williams LLP
11:30-12:30
PRIVACY BY DESIGNUnwanted Automated ProfilingProf. Dr. Mireille Hildebrandt, Radboud University Nijmegen
Privacy Governance in Software OrganizationsProf. Dr. Dawn Jutla, Saint Mary’s University, Halifax
14:00-15:00
CLOUD SERVICE CONTRACTSAvoiding hidden Clauses and other Pitfalls –How to Deal a Good Cloud Service ContractTimothy R.W. Cowen, Sidley Austin LLP
15:00-16:00
THE BUSINESS OF IDENTITYIdentity Provider Business ModelsAndrew Nash, GoogleAxel Nennker, Deutsche Telekom LaboratoriesNat Sakimura, Nomura Research InstitueDon Thibeau, OpenID Foundation
17:00-18:00
EU CITIZEN PRIVACYHow the EU handles Citizen Privacy at Present and how it will evolve in the FutureDr. Alea Fairchild, Constellation Research Group
Panel: The Future of Citizen PrivacyDr. Alea Fairchild, Constellation Research GroupProf. Dr. Reinhard Posch, Republic of AustriaColin Wallis, New Zealand Government
Thursday, 19.04.2012
Governance, Risk Management & Compliance (GRC)Moderator:Prof. Dr. Sachar Paulus, KuppingerCole
10:30-11:30
MATURING GRCHow to Mature GRC Processes Before you Buy a GRC ToolBerthold Kerl, Deutsche Bank AGProf. Dr. Sachar Paulus, KuppingerCole
11:30-12:30
(CLOUD) ACCESS RISKSIdentifying your Critical Information Assets. Moving from System Security to Information SecurityProf. Dr. Sachar Paulus, KuppingerCole
Managing Cloud Computing Access RisksKurt Johnson, Courion CorporationDeepak Taneja, Aveksa
14:00-15:00
ACCESS INTELLIGENCEBeyond the Pioneer Approaches –The next Level in Access Governance and RiskDave Fowler, Courion CorporationAlberto Ocello, CrossideasProf. Dr. Sachar Paulus, KuppingerColeDarran Rolls, SailPointRudolf Wildgruber, Atos
15:00-16:00
GRC FRAMEWORKSIntegrating GRC Frameworks and PracticesProf. Dr. Sachar Paulus, KuppingerCole
Governance of Cloud Services16:30-17:30
AUTHORIZATIONCloud Ready Authorization ArchtitecturesGerry Gebel, Axiomatics AmericasProf. Dr. Sachar Paulus, KuppingerCole
Media Partner:
www.id-conf.com
Best Practice Approaches to Migrate your Provisioning Products – for Sun and OthersModerator: Fulup Ar Foll, KuppingerCole
We have seen quite a lot of acquisitions in the market during the past years, which influence the customer’s strategies for Provisioning in particular and IAM in common. There are also many situations where customers for other reasons want to migrate away from the Provisioning tool they once had installed. In this workshop you will learn, why moving from one Identity Manager to another is not necessarily the best choice, and what other alternatives for IAM infrastructures you have nowadays.
OAuth, OpenID, SAML, … –What do you need to Federate When?Moderator: Craig Burton, KuppingerCole
Have you ever asked yourself, how all these standards fit together, where they overlap and what the advantages and disadvantages are when deciding for a certain path? In this workshop, you will learn by examples and best practices, how these technologies work together.
Mobile Security, BYOD and How to do it RightModerator: Fulup Ar Foll, KuppingerCole
How do I enforce my security requirement on a device that I do not control? How prevents company data to spread out when an employee quit ? How to separate ownership of private and company data? These are some of the most important questions to be answered before starting into the adventure of a bring-your-own-device (BYOD) strategy. In this workshop, KuppingerCole Senior Analyst Fulup Ar Foll will guide you to the right answers.
Connected VehicleModerator: Prof. Dr. Friedrich Holl, KuppingerColeDave Miller, Covisint
Automotive technology has significantly advanced in the past few years, and cars nowadays seem to have become computers on wheels. But why would I need Internet in my car if I have a smartphone in my pocket which would connect to my car speakers through bluetooth? Where is the business case for a really connected car? What are the technical, legal and privacy challenges? In this Innovation Lab, we will show you, that the digital future of mobility will look very different to what we exptect it to look like today.
KuppingerCole
Enterprise IT Research, Decision Support and Networking for IT Professionals
KuppingerCole, founded in 2004, is a leading analyst company for identity focused information security, both in classical and in cloud environments.KuppingerCole stands for expertise, thought leadership, and a vendor-neutral view on these information security market segments, covering all relevant aspects like Informa-
tion Security, IT Service and Security Management, Identity and Access Management (IAM), Governance, Risk Manage-ment and Compliance (GRC), IT Risk Management, Authen-tication and Authorization, Single Sign-On, Federation, User Centric Identity Management, eID cards, Cloud Security and Management, Cloud Identity and Virtualization.
Business Team
Kuppinger Cole Ltd.
Arnheimer Str. 46 | 40489 Düsseldorf | GermanyPHONE +49 (0)211 – 23 70 77- 0FAX +49 (0)211 – 23 70 77-11EMAIL [email protected]
Beate MinorChief Executive Officer
Joerg ReschCo-Founder & Managing Director
Rainer Boss Chief Financial Officer
Bettina Buthmann Marketing & Key Account Manager
Reiner Fingas Sales Manager
Levent KaraOffice Manager
Thomas Steinmayer Sales Partner
Workshops
Friday, 20.04.2012
Bronze Sponsoripg ag | information process group
www.ipg-ag.ch
Omada A/S
www.omada.net
OSIAM GmbH
www.osiam.de
RadiantLogic, Inc.
www.radiantlogic.com
Symplified, Inc
www.symplified.com
Venafi
www.venafi.com
Gold SponsorBeta Systems Software AG
www.betasystems.com
Evidian SARue Jean Jaurès, BP68
www.evidian.com
ORACLE Deutschland B.V. & Co. KG
www.oracle.com/de
Sailpoint Technologies
Partner
Platinum SponsorAtos IT Solutions and Services GmbH
www.atos.net
CA Technologies
www.ca.com/security
Cyber-Ark Software Ltd
www.cyber-ark.com
iC Consult GmbH
www.ic-consult.de
NetIQ Central Europe
www.netiq.com
Quest Software GmbH
www.quest.com
Silver SponsorAveksa
www.aveksa.com
Blackbird Group, Inc.
www.blackbird-group.com
Centrify Corporation
www.centrify.com
Courion Corporation1900 West Park Drive, 1st Floor
CrossIdeas
www.crossideas.com
Hitachi ID Systems, Inc.
www.hitachi-id.com
syscovery AG
www.syscovery.com
Platinum PartnerAxiomatics AB
www.axiomatics.com
BLUECARAT AG
www.bluecarat.de
Computacenter AG & Co. oHG
www.computacenter.com
Devoteam Danet GmbH
www.devoteam.de
Peak Solution GmbH
www.peak-solution.de
Ping Identity Corporation
www.pingidentity.com
Semantics AG
www.semantics.ch
Siemens Enterprise Communications GmbH & Co. KG
www.siemens-enterprise.com
Vordel
www.vordel.de
Association SponsorKantara Initiativewww.kantarainitiative.org/confluence/display/GI/Home
OASIS
Team DiscountsIf you sign in for more than one person from your Company at the same time, we grant a 10% reduction of the participation fee to the second participant. In case of three or more registrations, the fee for the third and all further participants is reduced by 15 %. Should you wish to register 5 or more persons, we offer a reduction of 40%, should you want to register 10 or more persons, we offer a reduction of 50%. To qualify for team discounts, all team members attending the conference must be employed by the same organization and all team members must submit their registrations at the same time. To arrange for your team discount, please contact: Levent Kara ([email protected]).
Further informationFor questions concerning participation of the conference, sponsorship or exhibition possibilities, use one of the following contact options:
MAIL Kuppinger Cole Ltd. Arnheimer Str. 46 | D-40489 DüsseldorfFAX +49 (0)211 – 23 70 77-11PHONE +49 (0)211 – 23 70 77-0EMAIL [email protected]
Web Registration now open: For faster and immediate confirmation, check out the online registration form at:
www.id-conf.comEvent LocationThe Conference and Expo will take place at:
Dolce Ballhaus-ForumAndreas-Danzer-Weg 185716 Unterschleißheim | Germany
Phone: +49 (89) 370 530 0http://www.dolcemunich.com
http://www.id-conf.com/events/eic2012/locations
AccomodationsKuppingerCole has reserved rooms at several hotels nearby the event location. You can find a list of these hotels at the conference website under http://www.id-conf.com/events/eic2012/locations.Note that reservation should be made directly with the hotel you choose as early as possible. As an alternative, you can find an excellent online hotel reservation service at www.hrs.com. If you choose a hotel which is not too far from center Munich, it is not a problem to reach the event location by public transport or taxi.
Dates and FeesOn the left, you will find the participation fees. The indicated fees are per person (plus VAT) and include documentation, confirmation of participation, lunch und drinks. After receipt of your registration, we will send you the confirmation of participation and an invoice. The amount invoiced is payable immediately and in full, at the latest 2 weeks before the beginning of the conferenceCancellation: There will be no fees for cancellations up to 30 days before beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50 % of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.Substitution: Substitutions are allowed with the written permission of the original registrant. Please note there will be a 50 EUR (plus VAT) processing fee for any substitution. Data Privacy: Your personal data will be stored only for internal processing and internal advertising purposes, strictly adhering to BDSG. If applicable, we may forward your address to an enterprise if the offering of this enterprise is of interest to you regarding contents, quality and services. If you do not want us to store or forward your data or send advertising material to your address, please send ashort note to: KuppingerCole Arnheimer Str. 46 | 40489 Düsseldorf | [email protected] Cole Ltd. – Directors: Beate Minor | Joerg ReschRegister: Duesseldorf HRB 57 000 | VAT-Nr. DE 814 816 309
Registration FormPlease copy, fill in and fax:
+49 (0)211 23 70 77 11
1. Surname First Name
Job Position Department
Phone Fax
2. Surname First Name
Job Position Department
Phone Fax
Company Name and Address
Street/Postbox
Postal Code | City
Date Signature
Booking Code
Registration Request April 17 – 20, 2012 MUNICH I GERMANY
Early-bird discount till 10.03.2012
Full Price
after 10.03.2012
EIC Conference 1.695 € 1.980 €EIC Conference + Workshops
2.375 € 2.795 €
Public Services, Hospitals +Academic
580 € 580 €
Day 1 + Day 2 1.295 € 1.495 €Day 2 + Day 3 1.295 € 1.495 €Single day 895 € 995 €Free access for government and military
0 € 0 €
Please send information material concerning sponsorship and exhibition possibilities
Please add VAT (19%) to all prices
April 17 – 20, 2012 MUNICH I GERMANY