iam - ipg group · but not only people “things” will also be connected to the internet via...

8
Giuseppe Mantero Managing Director Linea Comune Grace Mollison Senior Solutions Architect Google Tudor Goicea Manager Strategic Partnerships TypingDNA Sebastian Rohr CTO Apiida Sébastien Faivre Owner/CTO Brainwave Francois Dumont IAM Governance and Process Expert Sibelga Matthijs Kempers Project Manager Dutch Ministry of Security and Justice Garry Binder Enterprise Security Solution Architect Intel Arne Vodegel Solution Sales Specialist IPG Group Antti Backman IAM visionary and partner manager Propentus Amir Alsbih COO KeyIdentity Ralf Knöringer Head of the Competence Center Identity Management Atos Barry Scott CTO - EMEA Centrify SPEAKER LINE-UP CHAIRMAN Jean-Pierre Vincent Programme Manager Dutch Ministry of Security and Justice IAM TECHNOLOGIES 2017 7-8 SEPTEMBER • BERLIN, GERMANY www.luxatiainternational.com

Upload: others

Post on 26-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

Giuseppe Mantero Managing Director Linea Comune

Grace Mollison Senior Solutions Architect Google

Tudor GoiceaManager Strategic PartnershipsTypingDNA

Sebastian Rohr CTO Apiida

Sébastien Faivre Owner/CTO Brainwave

Francois DumontIAM Governance andProcess ExpertSibelga

Matthijs KempersProject ManagerDutch Ministry of Security and Justice

Garry BinderEnterprise Security Solution ArchitectIntel

Arne VodegelSolution Sales SpecialistIPG Group

Antti BackmanIAM visionary and partner managerPropentus

Amir AlsbihCOOKeyIdentity

Ralf KnöringerHead of the Competence Center Identity ManagementAtos

Barry ScottCTO - EMEACentrify

SPEAKER LINE-UP

CH

AIR

MAN

Jean-Pierre VincentProgramme ManagerDutch Ministry of Security and Justice

IAMTECHNOLOGIES 20177-8 SEPTEMBER • BERLIN, GERMANY

www.luxatiainternational.com

Page 2: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

WHO SHOULD ATTENDThis summit will gather together CEOs, CISOs, CIOs, Directors, VPs, Heads, Managers and Senior Level Executives dealing with issues such as:

> Enterprise Architecture > Information Security > IAM Program Management > Endpoint Security > IAM Governance & Administration > Authentication & Access Control > Integrated Systems > Network Security > IoT Infrastructure > Digital Transformation > IAM Strategy > eID & Identity Assurance > Risk Management

THIS YEAR WE LOOK AT THEMES SUCH AS > IAM Challenges and Expectations in the Upcoming Years > Evolving Technology and Access Management > Leveraging IAM Technology for Gaining Maximal Business Value > How to Deliver IAM in Large Organizational Infrastructure > Disruptive Technologies and Digital Transformation > Access Management for Employees and Partner Ecosystem > Adaptive Access Control and Risk Mitigation Techniques > Coping with Different Identity Systems in Public Sector

Identity and Access Management is currently one of the fastest growing IT sectors. Companies of all sizes are starting to see the benefits of IAM solutions and the emergence of cloud-based IAM has added a remarkable share to the market growth. The ever-tightening policies for data protection are driving SMEs and large enterprises to use identity and access management systems, to protect their sensitive data and applications with context-based access control, identity governance and security policy enforcement. The summit will delve into current issues and future challenges within Identity & Access Management and it will offer a fresh overview of issues faced in today’s IAM technologies.

PLATINUM SPONSOR ABOUT THE VENUE

X 14+

X 20+

X 100+

industry Case Studies

hours of networking: create new professional contacts during numerous networking breaks between sessions and during our special Networking Dinner on 20 April

pages of conference materials available upon

IAMTECHNOLOGIES 20177-8 SEPTEMBER • BERLIN, GERMANY

www.luxatiainternational.com

Ella-Trebe-Strasse 5

10557 Berlin

Germany

+49 30 740743-0

[email protected]

Page 3: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

08:30 Registration and Welcome Coffee

09:00 Welcome and Summit Introduction

09:10 Speed Networking Session

09:40

11:00

11:40

14:00

14:40

16:00

Chairman’s Closing Remarks and End of Day One

PUBLIC SECTOR & E-GOVERNMENT SERVICES

IDENTITY, CLOUD & SECURITY

Networking DinnerMeet and confer with colleagues in a relaxing atmosphere during the networking dinner

Social Agenda - Beer Tasting

GIUSEPPE MANTERO Managing Director Linea Comune

MANAGING REGIONAL INNOVATION PROJECTS IN PUBLIC SECTOR -Focus on e-government services-Developing and managing infrastructure that allow citizens, visitors and companies to interact with municipalities without the need to physically go to the office-Putting in place a set of information services, with multi-channel access under a single identity system-Developing the system for Florence plus 25 other cities and towns around, for a total of around 670.000 citizens and more than 9 million of visitors per year-Challenges faced when updating the system that went live for the first time in 2007-Feedback from citizens, 2016 figures and evolution of identity standards in Italy

JEAN-PIERRE VINCENT Programme Manager Dutch Ministry of Security and Justice

IMPLEMENTATION OF IAM AUTHORISATION MODEL & FEDERATION SOLUTION - IAM2020 vision: Dynamic business managed system access- A Roadmap from Role-Based to Attribute-Based Access Control- Reaching high level access governance by automated verification processes

STOP RIDING THE DEAD HORSE OF PASSWORDS AND START TRANSACTION SECURITY - A explanation why passwords have failed in the past and will fail in the future- A description how we can succeed in securing authentication with a risk based token approach- Why you should start caring about transaction security AMIR ALSBIH COO KeyIdentity

IAM DONE RIGHT Are you moving your applications to the Cloud or have a Cloud First Strategy?Most recent data breaches have focused on user accounts and privileged access to sensitive resources, both in the data center and in the cloud. While you are migrating to cloud platforms, now is the time to re-think security.In this session, we will explore proven best practices for protecting:- Identities - Privileged access - Across data centers and cloud-based servicesBARRY SCOTT CTO - EMEA Centrify

ARNE VODEGEL Solution Sales SpecialistIPG Group

THE ART OF KNOWING YOUR IDENTITY We are generating more and more online information. The average scan of a user delivers up to 130 registered accounts to an email address.Who am I? And when, how many? In 2007, Richard David Precht published a book on the subject and followed these questions. If we are aware of the dangers / risks of digital accounts, we are more likely to see the consequences.But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections. This will have a lasting effect on many industries.People or things - all digital identities must be protected against unauthorized access. With Identity and Access Management (IAM) the system and data accesses of all employees and things can be defined and controlled.The IPG Group sees itself as an expert for a holistic IAM solution approach and a reliable partner.

MATTHIJS KEMPERS Project Manager Dutch Ministry of Security and Justice

Morning Coffee & Networking Break10:30

Afternoon Tea & Networking Break15:20

16:40

20:00

17:30

Business Lunch13:00

12:20

SIMPLIFYING IDENTITY GOVERNANCE - Streamlining IT and compliance controls- Effective user management- Achieving sustainable organizational complianceSEBASTIEN FAIVRE Owner/CTOBrainwave

www.luxatiainternational.com

SPONSORED BY:

GAINING FULL CONTROL OF YOUR ORGANIZATION’S GOOGLE CLOUD PLATFORM’S RESOURCES Grace discusses how you, as an administrator, can use Google Cloud Platform’s (GCP) management features, including the Organization Node, Folders, Projects, Labels, Service Accounts, IAM, Org Policy and more, to fully control your cloud resources.GRACE MOLLISON Senior Solutions Architect Google

IAM TECHNOLOGIES 2017 • 7-8 SEPTEMBER 2017 • BERLIN, GERMANY DAY ONE

Page 4: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

After a busy first day at the IAM Technologies 2017, we cordially invite you to experience a 90-minute beer tasting at The Brauhaus Lemke Am Alex. Taste some of the finest German beers in a relaxed atmosphere as the

networking opportunities continue throughout the evening.

Address: Karl-Liebknecht-Str. 13, 10178 Berlin, Germany

NETWORKING DINNER

Having now become experts in traditions of The Brauhaus Lemke am Alex beer and

brewing history, the networking opportunities will continue at the Gala Dinner. Meet and confer with colleagues in

a relaxing atmosphere perfect for discussions of the first day of the summit!

SOCIAL AGENDAIAM TECHNOLOGIES 2017

www.luxatiainternational.com

Our founder Oli Lemke had already abandoned a degree in business administration and had graduated from a brewing degree when he decided to set up his own brewery. Even more important: He gained experience, around the world, whilst working for large enterprises in Venezuela and building breweries in Japan. And with all that experience under his belt, he welded his first own brewing plant in a friend’s garage in 1998.

After years of planning and lengthy conversions it finally happened: simultaneous with our rebranding, our own bottling department was being installed. From then onwards our most popular beers were available in bottles. Our logo might be new, but our beer remains what it was and what it always will be: hand crafted from pure natural ingredients in Berlin.

Page 5: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

Chairman’s Closing Remarks and End of Summit

ANTTI BACKMANIAM visionary and partner managerPropentus

IGA STRATEGY IN THE AGE OF DIGITAL TRANSFORMATION- End-to-End governance and administration of managedidentities will be a MUST thing to have for businesses tosucceed in the Digital business environment- Regardless of the identity type (human or thing) and relationto the organization, identities must be centrally managedto ensure holistic view to the security landscape of digitallyprepared business- Increasing the transparency and awareness of businessassets handed over to employees and other stakeholders toensure that business critical information and assets are wellcontrolled according to corporate policies- Aim for one solution for holistic identity perspectivethroughout the whole corporation to increase the total securitymanagement, to increase business performance and tosave operational costs. More importantly enable businessmanagers with truly up-to date information to be able to easilyto see the total security impact over their subordinates andalike

RALF KNORINGER Head of the Competence Center Identity Management Atos

IDENTITY AND ACCESS MANAGEMENT AS FOUNDATION FOR SECURE DIGITALIZATIONIn the early days of the Internet, people were used to communicate and interact with several identities not connected to their physical or business identity. Today we are in the middle of a new industrial revolution. With “Industrie 4.0” - or on a much broader scale with the Internet of Things (IoT) - we are faced with a paradigm shift from the economy of connected people, information and applications to the connectivity of everyone and everything.Leaders in industrial solutions and products are aligning with leaders in information technology to masterthese challenges. Within the Siemens-Atos-Alliance the “Next generation IAM” is one of the topics to buildthe fully connected and secure Industrial Internet.This presentation will give an overview of the evolution in Identity & Access Management and its role inthe new industrial revolution.

08:30 Welcome Coffee

09:00 Day Two Opening Remarks

DIGITAL TRANSFORMATION & IAM STRATEGY

09:50

09:10

11:00

11:40

12:20

FUTURE ASPECTS OF IDENTITY MANAGEMENT: CLOUD - MOBILE - THINGS- New focus on consumer IAM is a minor step whenleveraging 3rd party Social IDs- Establishing IoT device and manufacturing equipment aswell as connected car IDs is next big challenge- Public Key Cryptography pushed to its limits with amount ofdevices and quantum computing threats- Graph-based approaches are promising elements of futureIDM strategies- Securing Mobile Device ID as possible new means forauthentication- Levering ID data and device characteristics for securingaccess to APIs and servicesSEBASTIAN ROHR CTOApiida

PANEL DISCUSSION: ENTERPRISE SECURITY & IAM STRATEGY- Legal and regulatory requirements- Organisation’s security infrastructure- Digital transformation

IAM IN THE ZOMBIE APOCALYPSEWhen you combine limited resources, ever increasing threats and attacks with unlimited expectations from executives, you feel like you are in a zombie apocalypse. The presentation will explain how to work through that with a large deployment and what the future might be holding for us and it will also delve into IAM for Hybrid Cloud.GARRY BINDER Enterprise Security Solution Architect Intel

WHAT HAS CHANGED: IAM IS NO LONGER A PROJECT, IT’S A JOURNEYTechnology evolution often lead to hiding the fundamentals of IAM implementation. New technologies offer new possibilities and dramatic increase of IAM capabilities, but focusing on those niches could distract from the need for global view and understanding of an end to end IAM approach.Which are the new challenges to secure an efficient and future proof IAM track?What has changed in this last decade and what are the critical attention points that will lead to a successful adoption of access control solutions.FRANCOIS DUMONT IAM Governance and Process Expert Sibelga

INTRODUCTION TO TYPING BIOMETRICS- How it works- Advantages and Disadvantages- Use CasesTUDOR GOICEAManager Strategic PartnershipsTypingDNA

15:20

Morning Coffee & Networking Break10:30

Business Lunch13:00

14:00

14:40

www.luxatiainternational.com

IAM TECHNOLOGIES 2017 • 7-8 SEPTEMBER 2017 • BERLIN, GERMANY

DAY TWO

Page 6: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

Sebastian RohrCTOApiida

In 2001 Sebastian Rohr received his Master of Management & Engineering from TU Hamburg-Harburg, majoring in Production Technologies and Information Management. His career led him from roles as Security Consultant at Siemens AG, ICN Division (1998 to 2002), Research Associate and PhD Candidate at Fraunhofer SIT (2002 to 2004) as well as Solution Strategist for IAM at CA (formerly Computer Associates between 2004 and 2006) to being appointed as Chief Security Advisor at Microsoft in 2007. After retiring as CSA, he co-founded accessec GmbH in 2008 where he is Managing Director. In May 2017, he was appointed as CTO of APIIDA AG, a system integrator and ISV working on identity and API technologies.

Arne VodegelSolution Sales SpecialistIPG Group

Arne Vodegel, has been serving customers in the entire DACH area since 2016 as a Solution Sales Specialist. He has extensive and multi-year experience from various activities as a product and sales manager at IAM manufacturers. In addition to the conceptual design, this included the realization of individual projects, especially within complex IT environments. His personal strengths include expert advice as well as active information and suggestion.

Francois DumontIAM Governance and Process ExpertSibelga

Senior consultant IAM Business modeling and governanceActive since two decades in access management for major customers in banking and utilities.Driven by high level challenges regarding governance and best practices, François is focused on the dialog between business and IT that are key in large IAM projects. He has a large experience in negotiating with business stakeholder in order to maintain IAM understanding and motivations in line with global strategy and company business objectives.

Ralf KnöringerHead of the Competence CenterIdentity ManagementAtos

Ralf Knöringer is the head of the Competence Center Identity Management at Atos Germany. Ralf has more than 20 years of professional experience in the international IT security market. His main focus areas are identity and access governance, IoT security and managed cybersecurity services. In his management position, Ralf particularly drives the development of next generation IAM and IAG solutions and services for Industrial Services and IoT. Before Atos, Ralf Knöringer held positions as VP international sales management and head of product management at Siemens AG.

Amir AlsbihCOOKeyIdentity GmbH

Dr. Amir Alsbih is COO for KeyIdentity GmbH. There he runs the business for all revenue generating departments like Product Management, Software development, Product support as well as the security consulting department. He follows a combination of the lean and a pragmatic approach to archive customer satisfaction, operational excellence and efficiency as well as top of class services. Before working for the KeyIdentity Amir was global CISO for Haufe Group and member of the business board. His projects have involved every aspect of corporate security, from the management of enterprise security systems, developing standards and policies, designing cloud- and application security strategies, creating operational and organizational efficiency, business and technical processes optimization in combination with security improvements, overseeing the security of business acquisitions. With the combination of technology, innovative processes and effective people Amir develop methods for providing best support for the business’s goals while limiting risk. Amir graduated from the Albert-Ludwig-University, Freiburg with a PhD in Computer Science, and holds the CISSP-ISSMP, CISSP, CCSP and GCFA certifications. He has spoken at such industry conferences as OWASP, AppSec, Cyber Security Challenge Germany, International Information Security Conference, e-Crime, HP-Discover, and others on various applied security topics.

Barry ScottCTO - EMEACentrify

Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 12 years, Barry has been helping organisations manage their Identity Management and Auditing challenges, focusing on security, regulatory compliance and operational efficiency, especially using “AD bridge” technology. Barry’s current role is focused around enabling Centrify customers to use infrastructure they already own – Microsoft’s Active Directory – to control, secure and audit heterogeneous systems, mobile devices and applications, and also providing them a unified identity service across data centre, cloud and mobile using Centrify’s on-premises and Cloud-based solutions.

Antti BackmanIAM Visionary and Partner ManagerPropentus

Antti Backman is an identity lifecycle master data visionary and partner manager at Propentus Ltd and he has almost 20 years of experience in international software business with focus on identity lifecycle management for the past decade. Antti has worked in different senior positions at Propentus and holds extensive understanding and perspective on identity governance and administration business solutions.

IAM TECHNOLOGIES 2017 • 7-8 SEPTEMBER 2017 • BERLIN, GERMANY

SPOTLIGHT ON THE SPEAKERS

www.luxatiainternational.com

Page 7: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

Sebastien FaivreOwner/CTOBrainwave

Sébastien Faivre is a seasoned professional with great skills in Management, Product Marketing, Product Management, Pre-sales, R&D and Consulting. He is currently owner at Brainwave, the award winning software vendor specialized in Identity and Access Intelligence (IAI) and Identity and Access Governance (IAG) where he is driving the product strategy and the product marketing. Sebastien has over 15 years’ experience with software editors where he has held key positions in engineering, product management, marketing and sales. Sebastien is a telecom engineer, with a degree from the Institut Galilée.

Garry BinderEnterprise Security Solution ArchitectIntel

Garry Binder led the Identity and Access Management effort at Intel for five years. He has served as lead engineer and architect in the High Tech, Healthcare and Logistics industries over the last 20 years. Garry has always focused on security from the network layer through the application layers and spent some time with the Arizona Department of Safety as an analyst in the Explosive Ordinance Disposal unit.He holds degrees in Computer Science and Mathematics as well as CISSP, CISA, CISM, CRISC and Security+ certifications.Currently he serves as an Enterprise Solution Architect in Intel’s Data Center Group focusing on private and hybrid cloud deployments.

Matthijs KempersProject ManagerDutch Ministry of Security and Justice

Matthijs Kempers is a project manager and consultant with 10+ years IAM experience in the financial and government sectors. He advises and supports clients in the establishment, implementation and management of Identity & Access Management solutions.After completing a Master of ICT & Business Innovation degree in 2015, Matthijs is competent at translating business strategy to effective IT solutions.He is currently project manager at the Dutch Prison Service (Dienst Justitiële Inrichtingen, ±15.000 fte, a department of the Dutch Ministry of Security and Justice), where he is responsible for the roll-out of an IAM solution within all business units.

Jean-Pierre VincentProgramme ManagerDutch Ministry of Security and Justice

Jean-Pierre Vincent is a project manager and information architect with more than 10 years’ experience in implementation of IAM solutions, design of authorisation models and their roll-out within organisations, and IAM solutions and methods which allow organisations to be 100% ‘demonstrably in control’. Currently he provides ‘demonstrably in control’ services to a variety of large organisations and is manager of the IAM program at the Dutch Prison Service (Dienst Justitiële Inrichtingen, DJI, ±15.000 fte, part of the Dutch Ministry of Security and Justice). The program includes the realisation and business roll-out of an IAM solution and implementation of federative connections to DJI’s external business partners.

Giuseppe ManteroManaging DirectorLinea Comune

Giuseppe Mantero since 2006 is the general manager of Linea Comune, a company owned by local authorities in Florence area. The Company mission is to develop and manage innovation in the territory. Linea Comune supplies advanced services to the citizens of the area and manages various geographical information systems.Before Linea Comune he spent more than 25 years in leading IT companies, as Digital Equipment Corporation, Compaq, IBS with various activities in professional services, marketing and sales support activities. He holds a degree in Applied Mathematics from Genoa state university.

Tudor GoiceaManager Strategic PartnershipsTypingDNA

Tudor Goicea manages the strategic partnerships for TypingDNA. TypingDNA is an innovative AI-driven cyber security company that focuses on typing biometrics for authenticating people in a new, secure and seamless way. Tudor has an international business background with experience in tech start-ups, venture capital and management consulting. He is passionate about security and machine learning, having done research in natural language processing.

Grace MollisonSenior Solutions ArchitectGoogle

Based in London, UK Grace is a Cloud Solutions Architect where she helps customers to architect, develop and deploy applications on the Google Cloud platform. Before Google Grace was a Solutions Architect at AWS where she worked with the AWS ecosystem and customers to ensure well architected solutions.

IAM TECHNOLOGIES 2017 • 7-8 SEPTEMBER 2017 • BERLIN, GERMANY

SPOTLIGHT ON THE SPEAKERS

www.luxatiainternational.com

Page 8: IAM - IPG Group · But not only people “things” will also be connected to the Internet via “Internet of Things” (IoT). By the year 2020 one counted with 13 billion such connections

IAM TECHNOLOGIES 2017 • 7-8 SEPTEMBER 2017 • BERLIN, GERMANY

SPONSORS & PARTNERS

MEDIA PARTNERS

PLATINUM SPONSOR

Centrify, the leader in securing hybrid enterprises through the power of identity services...Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. To learn more visit www.centrify.com.

The Breach Stops Here

Cyber Security Jobsite is Job Board dedicated to assisting clients and agencies recruiting candidates within the Cyber Security marketplace. With the increasing level of cyber attacks of government and company IT Networks the demand for professionals with Cyber Security experience is on the increase. We look to be the No1 website within this marketplace and to provide a platform where clients and potential candidates can network with each other. Some common Job Titles within Cyber Security are: CISO (Chief Information Security Officer, CIO (Chief Information Officer), Ethical Hacker, Cyber Security Engineer, Cyber Security Architect, Systems Engineer, Software Engineer, IT Security Analyst, Information Assurance, Identity Management, Forensic Investigation, Risk Management, Penetration Testing, Security Architect, Network Security, Security Auditor, Security Manager and many more…

HAPTIC R&D CONSULTING, headquartered in Aricestii Rahtivani, Prahova (Romania), is a consulting of global technology and engineering company providing innovative solutions for customers in industrial, commercial and residential markets. HAPTIC R&D CONSULTING stays focused both on private and public organizations, NGOs, universities, educational institutes and agencies offering various services related to European funded programmes such as Horizon 2020 helping them to access EU funds.

Clocate.com is a leading international directory for worldwide conferences and exhibitions. Clocate.com is equipped with a unique and comprehensive search that helps you find easily any event in any category or location. Each event includes detailed information, like, description, dates, location, map, prices, link to the official event’s website and more…

www.luxatiainternational.com