Early-bird Discount
expires in
Register Now

Agenda

Enterprise Identity and Access Management

Enterprise Identity and Access Management

Combined Session
Thursday, May 08, 2025 14:30—15:30
Location: A 03-04

Risk-Based Approach to Defining IAM Requirements
14:30—14:50
 
The NIS2 Directive requires organizations to adopt a risk-based approach to managing cybersecurity risks. Risk-based approaches are also a key driver in standards such as ISO 27000 and the NIST Cyber Security Framework 2.0.
If you want to learn how to approach compliance reporting and enhance cybersecurity through IAM capabilities, this presentation is for you.
Kari Nousiainen
Manager
Fortum Oyj
Kari Nousiainen has special expertise in the development of Identity Security services, enabling transactions in online services on behalf of the organization. He has versatile work experience in...
Leadership Compass on Identity Verification
14:50—15:10
 
Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...
Access Management: Trends and Insights from KuppingerCole
15:10—15:30
 
Alejandro Leal
Research Analyst
KuppingerCole
Alejandro joined KuppingerCole as a Research Analyst in December 2021. His main areas of expertise include digital transformation in the public and private sector, managing business in...
Almost Ready to Join the EIC 2025?
Reach out to our team with any remaining questions
Get in touch