april 17 – 20, 2012 · keynotes tuesday, 17.04.2012 16:30-16:50 ripped from the headlines – the...

12
April 17 – 20, 2012 MUNICH I GERMANY HOT TOPICS EIC 2012 Making Information Security a Strategic Priority Planning, Managing & Governing IAM & Cloud Service Focused IT in the Age of Cloud Computing How to Audit Cloud Services (Cloud) Access Governance Strategies What to Focus on for Future-Proof Identity & Access Management Evaluating and Reducing the Risks of Cyber Crime Mobile Privacy and Security Cloud Computing Contracts & Law Data Protection and Privacy: How to Prepare for the New European Privacy Legislation Personal Data: Life Management Platforms Device Security & BYOD (Bring Your Own Device) Platinum Sponsor: Dr. Jacques Bus Digital Enlightenment Forum Dr. Nigel Cameron Center for Policy on Emerging Technologies Prof. Dr. Mireille Hildebrandt Radboud University Nijmegen Prof. Dr. Dawn Jutla Saint Mary‘s University, Halifax Berthold Kerl Deutsche Bank AG Martin Kuppinger KuppingerCole Dr. Barbara Mandl Daimler AG Doc Searls Harvard Law School

Upload: others

Post on 23-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

April 17 – 20, 2012 MUNICH I GERMANY

HOT TOPICS EIC 2012

Making Information Security a Strategic Priority

Planning, Managing & Governing IAM & Cloud

Service Focused IT in the Age of Cloud Computing

How to Audit Cloud Services

(Cloud) Access Governance Strategies

What to Focus on for Future-Proof Identity & Access Management

Evaluating and Reducing the Risks of Cyber Crime

Mobile Privacy and Security

Cloud Computing Contracts & Law

Data Protection and Privacy: How to Prepare for the New European Privacy Legislation

Personal Data: Life Management Platforms

Device Security & BYOD (Bring Your Own Device)

Platinum Sponsor:

Dr. Jacques BusDigital Enlightenment Forum

Dr. Nigel CameronCenter for Policy on Emerging Technologies

Prof. Dr. Mireille HildebrandtRadboud University Nijmegen

Prof. Dr. Dawn JutlaSaint Mary‘s University, Halifax

Berthold KerlDeutsche Bank AG

Martin KuppingerKuppingerCole

Dr. Barbara MandlDaimler AG

Doc SearlsHarvard Law School

Page 2: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

www.id-conf.com

European Identity Conference 2012

EIC 2012, the European Identity and Cloud Conference, will be again the leading conference in Europe around the key topics of Information Security and Cloud Computing. EIC 2012 is about the hot topics of not only CIOs and CISOs, but even the board and the business organization. Cloud Identity and Access, Auditing for the Cloud and On-Premise environments, Enterprise Governance from the high-level Dashboard down to IT, Risk Management, industry-specific sessions and many more hot topics will help you to make your corporate information more secure, to comply with regulations, and to run lean and focused projects around Information Security and Cloud Computing. And all of that providedin a single conference. Even more: KuppingerCole will unveil its KuppingerCole IT Model, the guideline for movingyour IT to the next level. You shouldn’t miss the related sessions. And like every year, EIC will be the conference that provides a perfect mix of thought leadership and best practices. It is where the experts, end users, analysts and others meet. And like every year, KuppingerCole analysts will share their insights from advisories and research. EIC is the conference where you will learn all you need to know about the future of Information Security today. So don’t miss EIC 2012 – which again will become the best EIC ever.

Martin Kuppinger Co-Founder KuppingerCole

5 REASONS WHY YOU SHOULD ATTEND EIC 2012

13 (4) days, over 80 sessions across 5 tracks: EIC is full of world class content, brought to you by the world s best expert speakers and panelists. You will carry back with you much more than you expect and as much as you need to solve your issues.

2 You define the key topics: The EIC agenda is built on top of hundreds of discussions with IT and business professionals all over the world, reflecting real-world challenges your peers are facing every day.

3All the top names of the industry under one roof: Expect all important vendors to send their brilliant experts to EIC and share case studies and explain their key strategies.

4 Over 500 attendees mean 500 great networking opportunities for you: EIC is growing strongly and fast, giving you the opportunity to network and meet with more experts than during the whole year.

5A New Format: Roundtable sessions. EIC is renown for its interactive and lively sessions. In 2012, we are adding a new format, which will be even more interactive: Roundtable meetings for workshop-like deep dives into key topics.

Who you will meet and what you will gain

The European Identity & Cloud Conference will draw together a wide range of thought leaders, experts, c-level officers, project managers and program managers from Europe and all over the world, including CISOs, CSOs, Chief Risk Officers, IT Architects, Project Managers and Program Managers, ITa Security and Information Security Experts and Audit Managers.

strategies to defend your business from internal and external threats without missing the need to share information and increase agility

hundreds of experts to exchange ideas, and to identify new areas of collaboration

your peers from many other countries and share your experiences with them

effectively and securely move into the cloud

and how to avoid data protection and privacy issues

future-proof and cloud-aware IAM infrastructure

Schedule at a Glance17.04.201208:00 - 18:0009:00 - 13:0013:00 - 19:0014:00 - 18:5018:50 - 20:00

Pre Conference & KeynotesConference RegistrationPre Conference WorkshopsEIC 2012 ExpoKeynote SessionsSnacks + Drinks, EXPO AREA

18.04.201208:00 - 18:0008:30 - 10:0009:00 - 19:0010:30 - 18:0018:00 - 18:4018:40 - 22:00

Main Conference Day 1Conference RegistrationKeynote SessionsEIC 2012 ExpoTrack SessionsKeynote SessionsEuropean Identity Awards Ceremony and Buffet Dinner, EXPO AREA

19.04.201208:00 - 18:0008:30 - 10:0009:00 - 18:0010:30 - 17:3017:30 - 18:00

Main Conference Day 2Conference RegistrationKeynote SessionsEIC 2012 Expo*Track SessionsClosing Keynote

20.04.2012*08:30 - 10:0009:00 - 12:3013:30 - 16:00

Workshop Day*Workshop RegistrationWorkshops Workshops

* Expo ends on April 19th, 2012

Gold Sponsor:

Page 3: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

KuppingerCole Analysts

Martin KuppingerCo-Founder & Principal Analyst

Alexei BalaganskiSenior Analyst

Craig BurtonDistinguished Analyst

Fulup Ar FollSenior Analyst

Prof. Dr. Friedrich HollSenior Analyst

Dave Kearns Senior Analyst

Prof. Dr. Sachar PaulusSenior Analyst

Sebastian RohrSenior Analyst

Mike SmallFellow Analyst

Dr. Horst WaltherSenior Analyst

Pre Conference Workshops

Tuesday, 17.04.201209:00-13:00

A Review of the Status of Key Internet Iden-tity Protocols OpenID Connect, OAuth 2.0 and Account Chooser Mike Jones, MicrosoftEric Sachs, GoogleJohn Bradley, OpenID Foundation Axel Nennker, DT

OASIS: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?Gershon Janssen, OASIS Open Standards GroupProf. Dr. Dawn Jutla, Saint Mary’s University, HalifaxJohn Sabo, CA TechnologiesAnil Saldhana, Red Hat Inc.Mike Small, KuppingerCole

ISACA Workshop: Cloud AssuranceMarc Vael, ISACA

Kantara Initiative SummitJohn Bradley, OpenID Joni Brennan, Kantara InitiativeDr. Maciej Machulak, UMA WGChristine Runnegar, ISOCColin Wallis, New Zealand Government

Keynotes

Tuesday, 17.04.201214:00-14:40

.

Opening KeynoteDr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)Martin Kuppinger, Co-Founder & Principal Analyst, KuppingerCole

14:40-15:00

Dr. Emilio Mordini, CEO, Centre for Science, Society and Citizenship CSSC

15:00-15:20 eID new challenges with Digital Agenda and Cloud Computing

Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria

15:20-15:40

Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft

15:40-16:10

Interview: What are the Privacy and Information Security Challenges 2012 and Beyond?Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies (C-PET)Martin Kuppinger, Co-Founder & Principal Analyst, KuppingerColeUdi Mokady, Founder, President & CEO, Cyber-ArkShirief Nosseir, Marketing Manager, CA TechnologiesJim Taylor, VP Identity and Security Management, NetIQ

Silver Sponsor:

Page 4: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

www.id-conf.com

KeynotesTuesday, 17.04.201216:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved!

Udi Mokady, Founder, President & CEO, Cyber-Ark

16:50-17:10 Cloud, Consumerization & Identity: Time to Transform the Security Model

Shirief Nosseir, Marketing Manager, CA Technologies

17:10-17:30 Externalized Authorization – What is it Good for?

Peter Weierich, Senior Strategy Consultant, iC Consult GmbH

17:30-17:50 What Standards Have Done and Will Do for Cloud Identity

Dr. Laurent Liscia, Executive Director, OASIS

17:50-18:10

Jackson Shaw, Active Directory, Identity Management Expert, Quest Software

18:10-18:30

Dr. Barbara Mandl, Senior Manager, Daimler AG

18:30-18:50 Free Customers: The New Platform

Doc Searls, Berkman Fellow, Harvard Law School

Wednesday, 18.04.201208:30-09:00 Leveraging Identity to Manage Enterprise Change and Complexity

Jim Taylor, VP Identity and Security Management, NetIQ

09:00-09:30 Securing Critical Banking Infrastructures in the Age of Cyber Warfare

Dr. Waldemar Grudzien, Head of Department Retail Banking and Banking Technology, Association of German Banks

09:30-10:00 Berthold Kerl, Managing Director, Head of Information & Technology Risk Governance,

Deutsche Bank AG

18:00-18:20 How Mobility Clouds the Future and SOA / Web 2.0 gives way to the Cloud API

André Durand, Founder & CEO, Ping Identity

18:20-18:40 Top Challenges and Threats Security Managers Should Watch Out For

Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems

Thursday, 19.04.201208:30-09:00 How Identity Management and Access Governance as a Service make your Cloud

Work and your Business more AgileRalf Knoeringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH

09:00-09:30 Prof. Dr. Kai Rannenberg, T-Mobile Chair of Mobile Business & Multilateral Security,

Goethe University in Frankfurt

09:30-10:00 Trust and Complexity in Digital Space

Dr. Jacques Bus, Secretary General, Digital Enlightenment Forum

17:30-18:00 Closing Keynote

Silver Sponsor:

Page 5: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

Roundtables

EIC Round Tables add a new dimension to the agenda: Deep dives into some of the most important topics, high interaction, small groups.

Moderation: Consumer Identity

While consumer expectations of their online experience is becoming ever more sophisticated, with privacy, security and ease of use being critical requirements for online success. Are current offerings sufficient to meet those expectations? What has to be changed? What is in the pipeline?

Dave KearnsKuppingerCole

Moderation: Digital Enlightenment Forum

The DIGITAL ENLIGHTENMENT FORUM, founded 2011 in Brussels, is providing a broad framework for debate and guidance on the rapid technological changes and their perceived impact on society and its gov-ernance. With Dr. Jacques Bus, Kim Cameron, Dr. Malcolm Crompton, Prof. Dr. Mireille Hildebrandt, Prof. Dr. Reinhard Posch, Prof. Dr. Kai Ran-nenberg and honorary member Prof. Dr. Ann Cavoukian, the membership list of this forum reads like the who-is-who in privacy-by-design and user controlled identity. Join this round table to discuss with these experts on emerging technologies for modern privacy protecting and trustworthy e-Identity.

Dr. Jacques BusDigital Enlightenment Forum

Moderation: Personal Data: Life Management Platforms

Just imagine how big the data quantity is which you need to organize your daily life. Insurance documents, your salary statements, banking details, your car´s service requirements, flight tickets, miles accounts, your rela-tionships to online and offline vendors, and much more. How much time do you spend to aggregate all these information stored in so many loca-tions which all are outside of your area of influence into something man-ageable?Imagine that you had a personal, secure container system where all those data are automatically delivered to. Join this roundtable to meet the per-sonal data pioneers and learn, how your company can take advantage in early adopting a business model based on this new ecosystem.

Martin KuppingerKuppingerCole

Doc SearlsHarward Law School

Moderation: Mobile Privacy and Security

Even though mobile devices bring along many advantages, privacy and security are not among their strengths.In this round table, we will look into the main issues of mobile privacy and security breaches – and explore what can be done against it. Fulup Ar Foll

KuppingerCole

Bronze Sponsor:

Page 6: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

www.id-conf.com

Wednesday, 18.04.2012

Making Information Security a Strategic PriorityModerator: Berthold Kerl, Deutsche Bank AG

10:30-11:30

CYBER CRIMEThe Risks of Cyber Crime for the Financial IndustryBerthold Kerl, Deutsche Bank AG

Facing the Online Threats against Retail and Banking Customers – What are the Future Perspectives?Prof. Dr. Sachar Paulus, KuppingerCole

11:30-12:30

REGULATIONCurrent and Future Information Security in Banks – The Regulator´s View

14:00-15:00

IDENTITY & ACCESS GOVERNANCE –FINANCE INDUSTRYIAM Governance in the New CommerzbankDirk Venzke, Commerzbank AG

Aligning Information Security Architecture and IAM Architecture with XACMLRakesh Radhakrishnan, Bank of America

15:00-16:00

RISK IDENTIFICATION & EVALUATIONDelivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation ProcessDr. Waldemar Grudzien, Association of German BanksBerthold Kerl, Deutsche Bank AGProf. Dr. Sachar Paulus, KuppingerCole

17:00-18:00

VALUE FOCUSED SECURITYIdentity & Access Management as a Key Element for a Value focused Security StrategyRalf Knoeringer, Atos IT Solutions and Services GmbHHassan Maad, EvidianShirief Nosseir, CA TechnologiesPeter Weierich, iC Consult GmbH

You cannot Stop Usage of Social Media - What can you do to make it Secure?

Thursday, 19.04.2012

Planning, Managing and Governing IAM & Cloud Moderators: Craig Burton, KuppingerColeMartin Kuppinger, KuppingerCole

10:30-11:30

BRING YOUR OWN DATA (BYOD)Cornerstones for Successful BYOD and Mobile IT StrategiesCraig Burton, KuppingerCole

Bring your own DataMarcel van Galen, QiyDrummond Reed, Connect.Me

11:30-12:30

THE KUPPINGERCOLE IT MODEL AND THE API ECONOMYHow the API Economy Leverages our Capabilities for Delivering Business ServicesCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole

API Economy: The Consumer ViewFulup Ar Foll, KuppingerCole

API Economy: The Provider View14:00-15:00

VIRTUALIZATIONFrom Virtualization to the Cloud and BeyondCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole

15:00-16:00

IDENTITY AS A SERVICEOne IT, one IAM: Why you should not believe in Cloud-only SolutionsCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole

16:30-17:30

FEDERATION VS. SYNCHRONIZATIONWhat Federation is About – in Theory and in PracticeDave Kearns, KuppingerCole

Federation or Synchronization – the Future of the CloudPatrick Harding, Ping IdentityDarran Rolls, SailPointEric Sachs, Google

Business Insights

Moderation:This track is for CIOs, CISOs, IT Managers, and the project managers and IT people who want to better understand the business side of IAM, GRC, and Cloud Security – plus all the ones who are not primarily IT but have to drive the projects in these areas. Learn how IT really can help the business and provide business benefits.Martin Kuppinger

KuppingerColeBerthold KerlDeutsche Bank AG

Craig BurtonKuppingerCole

Bronze Sponsor:

Page 7: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

Cloud Computing

Moderation:If you are responsible for defining cloud strategies and/or involved in projects around Cloud Computing, especially with focus on security, track 2 will deliver the answers you are looking for. Learn how to not only move to the cloud but to mitigate cloud (security) risks and build your secure, hybrid environment making real value of Cloud Computing.Dr. Laurent Liscia

OASISProf.Dr. Sachar PaulusKuppingerCole

Mike SmallKuppingerCole

Wednesday, 18.04.2012

Cloud Computing AuditModerators: Dr. Laurent Liscia, OASISProf. Dr. Sachar Paulus, KuppingerCole

10:30-11:30

CLOUD AUDITAddressing Cloud Audit, Assurance and Compliance Needs – A Progress ReportDr. Marnix Dekker, ENISADr. Laurent Liscia, OASISBrendan M. Peter, CA TechnologiesMike Small, KuppingerCole

11:30-12:30

CLOUD AUDITGlobal Perspectives on Cloud Auditing Challenges and SolutionsSteve Jones, CapgeminiDr. Laurent Liscia, OASISProf. Dr. Sachar Paulus, KuppingerColeJohn Sabo, CA TechnologiesMarc Vael, ISACA

Cloud Identity & AccessModerator: Mike Small, KuppingerCole

14:00-15:00

CLOUD INFORMATION SECURITYThe Cornerstones of Information Securityin the CloudCraig Burton, KuppingerCole

Extending your Identity & Access Management into the CloudGerry Gebel, Axiomatics AmericasDr. Barbara Mandl, Daimler AGPrabath Siriwardena, WSO2aJim Taylor, NetIQ

15:00-16:00

SCIMIs SCIM a Scam?Craig Burton, KuppingerCole

Simple Cloud Identity Management (SCIM)Patrick Harding, Ping IdentityKurt Johnson, Courion CorporationDarran Rolls, SailPoint

17:00-18:00

CLOUD SECURITY ISSUESEyes Wide Shut? Seven Cloud-Computing Security Sins and how to Control themMike Small, KuppingerCole

Thursday, 19.04.2012

Cloud SecurityModerator: Mike Small, KuppingerCole

10:30-11:30

TRUSTWORTHY CLOUDProviding and Maintaining a Secure Cloud Infrastructure – from Planning to AdministrationHenning Arendt, @bc - Arendt Business ConsultingProf. Dr. Clemens Jochum, Goethe-University Frankfurt, House of FinanceAljosa Pasic, Atos Research & InnovationMike Small, KuppingerCole

11:30-12:30

THE OPEN DATA CENTER ALLIANCE VIEWCustomer Driven Cloud Services – What Cloud Customers needProviders to do to better alignIan Lamont, Open Data Center Alliance

14:00-15:00

CLOUD RESILIENCYProtecting and Managing Critical Data in the Cloud

15:00-16:00

CLOUD SERVICE TERMINATIONWhat you should know about Cloud Service Termination before you sign a Contract

16:30-17:30

CLOUD MULTI-TENANCYWhat you should know about the different Types of Multi-Tenancy in Cloud-Services

Association Sponsor:

Page 8: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

www.id-conf.com

Identity & Access Management

Moderation:If you are responsible for IAM in your company, if you manage IAM related projects or if you are an IT architect or otherwise involved in IAM projects, this is the track to not miss. Learn about the newest trends from KuppingerCole analyst and Industry Expert thought leadership, learn about best practices, and get the information you need to success-fully run your projects around all areas of IAM.

Craig BurtonKuppingerCole

Fulup Ar FollKuppingerCole

Dr. Horst WaltherKuppingerCole

Wednesday, 18.04.2012

What to Focus on for Future-Proof IAMModerator: Craig Burton, KuppingerCole10:30-11:30

THE BUSINESS VALUE OF ITIncrease Value to the Business: The KuppingerCole IT ModelMartin Kuppinger, KuppingerCole

How IAM can Catalyze the Secure EnterpriseCraig Burton, KuppingerColeGerry Gebel, Axiomatics AmericasMartin Kuppinger, KuppingerColeMike Neuenschwander, Oracle

11:30-12:30

THE FUTURE IT ORGANIZATIONWinds of Change in your IT Organization: Get ready for the FutureCraig Burton, KuppingerColeMartin Kuppinger, KuppingerCole

The Future of Identity & Access Management: Embrace, Extend – and don’t Replace?Hassan Maad, EvidianMike Neuenschwander, OracleAlberto Ocello, CrossideasDarran Rolls, SailPointJonathan Sander, Quest SoftwareJim Taylor, NetIQ

IAM Architectur Moderator: Fulup Ar Foll, KuppingerCole14:00-15:00

IDENTITY FEDERATIONIdentity Federation Challenges and how to approach themThomas Gundel, IT CrewPatrick Harding, Ping IdentityColin Wallis, New Zealand Government

Best Practice in Out-sourced Federation: WAYFDavid Simonsen, WAYF

15:00-16:00

PRIVILEGED ACCESSBest Practice: Managing Privileged Users

PCI-DSS, SOX, Basel: How to ManagePrivileged Access and Pass the AuditUdi Mokady, Cyber-Ark

17:00-18:00

DIRECTORIESSingle Point of Access: The IAM Strategy at TeleflexNick Sabinske, Teleflex

17:00-18:00

One Identity Service, Many Initiatives: Exploring Use Cases for Identity VirtualizationFulup Ar Foll, KuppingerColeNick Sabinske, TeleflexUlrich Schulz, Radiant Logic

Thursday, 19.04.2012

IAM Architectur Moderator: Dr. Horst Walther, KuppingerCole

10:30-11:30

RE-ENGINEERING IAMRe-engineering IAM to better serve your Business NeedsMartin Kuppinger, KuppingerCole

Building Identity & Access Management as a Public Administration Service for the Trento Autonomous ProvinceFabrizio Russo, Trento Autonomous Province

11:30-12:30

AUTHENTICATIONCase Study: Large Scale Authentication, Australian GovernmentTrish Porter, Australian Department of Innovation, Industry, Science and ResearchMalcolm Young, Australian Department of Innovation, Industry, Science and Research

14:00-15:00

SECURITY INTELLIGENCEBest Practices for Lean, Efficient and Focused Information Security ProjectsDr. Horst Walther, Kuppinger Cole

Identity and Security IntelligenceKim Cameron, MicrosoftMatthew Gardiner, RSARobert Griffin, RSA, the Security Division of EMC

15:00-16:00

ACCESS & ENTITLEMENTSIntroducing an Entitlement Managment System – a Travel ReportManuel Schneider, Generali Deutschland Informatik Services

Access & EntitlementsGerry Gebel, Axiomatics AmericasManuel Schneider, Generali Deutschland Informatik ServicesMarco Venuti, CrossIdeas

16:30-17:30

IAM OPEN SOURCE SOFTWAREIdentity Management & Open SourceMichael Kleinhenz, tarent AG

Media Partner:

Page 9: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

Legal & GRC

Moderation:CIO, CISO, Data Protection Officers, Risk and Compliance Officers, Internal Audit, line managers and project managers confronted with the legal and GRC issues, as well as all the ones involved in Access Governance, IT GRC, and Business GRC projects. Learn what to look at from the legal per-spective and how to build a real Enterprise GRC covering all types of risks and integrating the Business and IT view of GRC.

Dr. Joerg HladjkHunton & Williams LLP

Prof.Dr. Sachar PaulusKuppingerCole

Wednesday, 18.04.2012

Cloud Legal, Privacy, Data Protection Moderator:Dr. Joerg Hladjk, Hunton & Williams LLP

10:30-11:30

EU PRIVACY NEWSNew EU Data Protection Rules: What will cause the most Pain, who will suffer and how can you gear up for them?Dr. Joerg Hladjk, Hunton & Williams LLP

11:30-12:30

PRIVACY BY DESIGNUnwanted Automated ProfilingProf. Dr. Mireille Hildebrandt, Radboud University Nijmegen

Privacy Governance in Software OrganizationsProf. Dr. Dawn Jutla, Saint Mary’s University, Halifax

14:00-15:00

CLOUD SERVICE CONTRACTSAvoiding hidden Clauses and other Pitfalls –How to Deal a Good Cloud Service ContractTimothy R.W. Cowen, Sidley Austin LLP

15:00-16:00

THE BUSINESS OF IDENTITYIdentity Provider Business ModelsAndrew Nash, GoogleAxel Nennker, Deutsche Telekom LaboratoriesNat Sakimura, Nomura Research InstitueDon Thibeau, OpenID Foundation

17:00-18:00

EU CITIZEN PRIVACYHow the EU handles Citizen Privacy at Present and how it will evolve in the FutureDr. Alea Fairchild, Constellation Research Group

Panel: The Future of Citizen PrivacyDr. Alea Fairchild, Constellation Research GroupProf. Dr. Reinhard Posch, Republic of AustriaColin Wallis, New Zealand Government

Thursday, 19.04.2012

Governance, Risk Management & Compliance (GRC)Moderator:Prof. Dr. Sachar Paulus, KuppingerCole

10:30-11:30

MATURING GRCHow to Mature GRC Processes Before you Buy a GRC ToolBerthold Kerl, Deutsche Bank AGProf. Dr. Sachar Paulus, KuppingerCole

11:30-12:30

(CLOUD) ACCESS RISKSIdentifying your Critical Information Assets. Moving from System Security to Information SecurityProf. Dr. Sachar Paulus, KuppingerCole

Managing Cloud Computing Access RisksKurt Johnson, Courion CorporationDeepak Taneja, Aveksa

14:00-15:00

ACCESS INTELLIGENCEBeyond the Pioneer Approaches –The next Level in Access Governance and RiskDave Fowler, Courion CorporationAlberto Ocello, CrossideasProf. Dr. Sachar Paulus, KuppingerColeDarran Rolls, SailPointRudolf Wildgruber, Atos

15:00-16:00

GRC FRAMEWORKSIntegrating GRC Frameworks and PracticesProf. Dr. Sachar Paulus, KuppingerCole

Governance of Cloud Services16:30-17:30

AUTHORIZATIONCloud Ready Authorization ArchtitecturesGerry Gebel, Axiomatics AmericasProf. Dr. Sachar Paulus, KuppingerCole

Media Partner:

Page 10: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

www.id-conf.com

Best Practice Approaches to Migrate your Provisioning Products – for Sun and OthersModerator: Fulup Ar Foll, KuppingerCole

We have seen quite a lot of acquisitions in the market during the past years, which influence the customer’s strategies for Provisioning in particular and IAM in common. There are also many situations where customers for other reasons want to migrate away from the Provisioning tool they once had installed. In this workshop you will learn, why moving from one Identity Manager to another is not necessarily the best choice, and what other alternatives for IAM infrastructures you have nowadays.

OAuth, OpenID, SAML, … –What do you need to Federate When?Moderator: Craig Burton, KuppingerCole

Have you ever asked yourself, how all these standards fit together, where they overlap and what the advantages and disadvantages are when deciding for a certain path? In this workshop, you will learn by examples and best practices, how these technologies work together.

Mobile Security, BYOD and How to do it RightModerator: Fulup Ar Foll, KuppingerCole

How do I enforce my security requirement on a device that I do not control? How prevents company data to spread out when an employee quit ? How to separate ownership of private and company data? These are some of the most important questions to be answered before starting into the adventure of a bring-your-own-device (BYOD) strategy. In this workshop, KuppingerCole Senior Analyst Fulup Ar Foll will guide you to the right answers.

Connected VehicleModerator: Prof. Dr. Friedrich Holl, KuppingerColeDave Miller, Covisint

Automotive technology has significantly advanced in the past few years, and cars nowadays seem to have become computers on wheels. But why would I need Internet in my car if I have a smartphone in my pocket which would connect to my car speakers through bluetooth? Where is the business case for a really connected car? What are the technical, legal and privacy challenges? In this Innovation Lab, we will show you, that the digital future of mobility will look very different to what we exptect it to look like today.

KuppingerCole

Enterprise IT Research, Decision Support and Networking for IT Professionals

KuppingerCole, founded in 2004, is a leading analyst company for identity focused information security, both in classical and in cloud environments.KuppingerCole stands for expertise, thought leadership, and a vendor-neutral view on these information security market segments, covering all relevant aspects like Informa-

tion Security, IT Service and Security Management, Identity and Access Management (IAM), Governance, Risk Manage-ment and Compliance (GRC), IT Risk Management, Authen-tication and Authorization, Single Sign-On, Federation, User Centric Identity Management, eID cards, Cloud Security and Management, Cloud Identity and Virtualization.

Business Team

Kuppinger Cole Ltd.

Arnheimer Str. 46 | 40489 Düsseldorf | GermanyPHONE +49 (0)211 – 23 70 77- 0FAX +49 (0)211 – 23 70 77-11EMAIL [email protected]

Beate MinorChief Executive Officer

Joerg ReschCo-Founder & Managing Director

Rainer Boss Chief Financial Officer

Bettina Buthmann Marketing & Key Account Manager

Reiner Fingas Sales Manager

Levent KaraOffice Manager

Thomas Steinmayer Sales Partner

Workshops

Friday, 20.04.2012

Page 11: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

Bronze Sponsoripg ag | information process group

www.ipg-ag.ch

Omada A/S

www.omada.net

OSIAM GmbH

www.osiam.de

RadiantLogic, Inc.

www.radiantlogic.com

Symplified, Inc

www.symplified.com

Venafi

www.venafi.com

Gold SponsorBeta Systems Software AG

www.betasystems.com

Evidian SARue Jean Jaurès, BP68

www.evidian.com

ORACLE Deutschland B.V. & Co. KG

www.oracle.com/de

Sailpoint Technologies

Partner

Platinum SponsorAtos IT Solutions and Services GmbH

www.atos.net

CA Technologies

www.ca.com/security

Cyber-Ark Software Ltd

www.cyber-ark.com

iC Consult GmbH

www.ic-consult.de

NetIQ Central Europe

www.netiq.com

Quest Software GmbH

www.quest.com

Silver SponsorAveksa

www.aveksa.com

Blackbird Group, Inc.

www.blackbird-group.com

Centrify Corporation

www.centrify.com

Courion Corporation1900 West Park Drive, 1st Floor

CrossIdeas

www.crossideas.com

Hitachi ID Systems, Inc.

www.hitachi-id.com

syscovery AG

www.syscovery.com

Platinum PartnerAxiomatics AB

www.axiomatics.com

BLUECARAT AG

www.bluecarat.de

Computacenter AG & Co. oHG

www.computacenter.com

Devoteam Danet GmbH

www.devoteam.de

Peak Solution GmbH

www.peak-solution.de

Ping Identity Corporation

www.pingidentity.com

Semantics AG

www.semantics.ch

Siemens Enterprise Communications GmbH & Co. KG

www.siemens-enterprise.com

Vordel

www.vordel.de

Association SponsorKantara Initiativewww.kantarainitiative.org/confluence/display/GI/Home

OASIS

Page 12: April 17 – 20, 2012 · Keynotes Tuesday, 17.04.2012 16:30-16:50 Ripped from the Headlines – The ‘Privileged’ Connection – Solved! Udi Mokady, Founder, President & CEO, Cyber-Ark

Team DiscountsIf you sign in for more than one person from your Company at the same time, we grant a 10% reduction of the participation fee to the second participant. In case of three or more registrations, the fee for the third and all further participants is reduced by 15 %. Should you wish to register 5 or more persons, we offer a reduction of 40%, should you want to register 10 or more persons, we offer a reduction of 50%. To qualify for team discounts, all team members attending the conference must be employed by the same organization and all team members must submit their registrations at the same time. To arrange for your team discount, please contact: Levent Kara ([email protected]).

Further informationFor questions concerning participation of the conference, sponsorship or exhibition possibilities, use one of the following contact options:

MAIL Kuppinger Cole Ltd. Arnheimer Str. 46 | D-40489 DüsseldorfFAX +49 (0)211 – 23 70 77-11PHONE +49 (0)211 – 23 70 77-0EMAIL [email protected]

Web Registration now open: For faster and immediate confirmation, check out the online registration form at:

www.id-conf.comEvent LocationThe Conference and Expo will take place at:

Dolce Ballhaus-ForumAndreas-Danzer-Weg 185716 Unterschleißheim | Germany

Phone: +49 (89) 370 530 0http://www.dolcemunich.com

http://www.id-conf.com/events/eic2012/locations

AccomodationsKuppingerCole has reserved rooms at several hotels nearby the event location. You can find a list of these hotels at the conference website under http://www.id-conf.com/events/eic2012/locations.Note that reservation should be made directly with the hotel you choose as early as possible. As an alternative, you can find an excellent online hotel reservation service at www.hrs.com. If you choose a hotel which is not too far from center Munich, it is not a problem to reach the event location by public transport or taxi.

Dates and FeesOn the left, you will find the participation fees. The indicated fees are per person (plus VAT) and include documentation, confirmation of participation, lunch und drinks. After receipt of your registration, we will send you the confirmation of participation and an invoice. The amount invoiced is payable immediately and in full, at the latest 2 weeks before the beginning of the conferenceCancellation: There will be no fees for cancellations up to 30 days before beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50 % of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.Substitution: Substitutions are allowed with the written permission of the original registrant. Please note there will be a 50 EUR (plus VAT) processing fee for any substitution. Data Privacy: Your personal data will be stored only for internal processing and internal advertising purposes, strictly adhering to BDSG. If applicable, we may forward your address to an enterprise if the offering of this enterprise is of interest to you regarding contents, quality and services. If you do not want us to store or forward your data or send advertising material to your address, please send ashort note to: KuppingerCole Arnheimer Str. 46 | 40489 Düsseldorf | [email protected] Cole Ltd. – Directors: Beate Minor | Joerg ReschRegister: Duesseldorf HRB 57 000 | VAT-Nr. DE 814 816 309

Registration FormPlease copy, fill in and fax:

+49 (0)211 23 70 77 11

1. Surname First Name

Job Position Department

Phone Fax

eMail

2. Surname First Name

Job Position Department

Phone Fax

eMail

Company Name and Address

Street/Postbox

Postal Code | City

Date Signature

Booking Code

Registration Request April 17 – 20, 2012 MUNICH I GERMANY

Early-bird discount till 10.03.2012

Full Price

after 10.03.2012

EIC Conference 1.695 € 1.980 €EIC Conference + Workshops

2.375 € 2.795 €

Public Services, Hospitals +Academic

580 € 580 €

Day 1 + Day 2 1.295 € 1.495 €Day 2 + Day 3 1.295 € 1.495 €Single day 895 € 995 €Free access for government and military

0 € 0 €

Please send information material concerning sponsorship and exhibition possibilities

Please add VAT (19%) to all prices

April 17 – 20, 2012 MUNICH I GERMANY