KuppingerCole Webinar recording
KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
KuppingerCole Webinar recording
KuppingerCole Webinar recording
Good afternoon, ladies and gentlemen, welcome to our Ko cold webinar EIC 2013 review. My name is Martin Kuppinger I'm founder of Ko. Within the next minutes, I will give you an overview about track and some important sessions, etcetera. And some of the highlight topics we'll have at our upcoming European identity and cloud conference, which will be held again May 14th, 17th in, thank you. Let's first start with some information about keeping a cold coalition Analyst company. We are providing enterprise it research advisory, decision support, and networking for it.
Professionals through research services, reports, cetera here providing through advisory services and through our events. And as I've said before, this, the reason for this webinar today, our main event is the European identity cloud conference, which will be out. I think the sixth, seventh time this see in Munich May 14th to 17, and it's the concerns about solid leadership and best practice, digital ID, identity management, cloud, and RC regarding this webinar, some guidelines here, muted center. So you don't have to mute or on yourself. We control these features.
We, the webinar and the recording will be available tomorrow, latest as well as we will provide slide deck. And you can ask questions at any time using the area questions in the go to webinar control panel, which you usually will find at the right side of your screen. I will answer questions at the end of the webinar, if there are any questions and for sure don't hesitate to contact our team with other questions regarding EIC, et cetera. So let's have a look first at the agenda, the agenda of this year, EIC it's like always a four, four day conference was sort of two and a half main days.
We started in the morning of May 14th with some workshops. So one is for example, around getting started workshop, which gives an overview about the conference. There is no ways preconference workshop focusing on current topics around standardizations, etcetera. In the afternoon of May 14th, we have a series of keynote sessions and in the evening we will then provide some snacks and drinks. The second day, the sort of the first full conference day done is split into keynotes and several tracks. The Dr are access, go privacy, data protection, identities, and access and cloud mobile social.
And I am I E infrastructure. In addition, we will round table or two round tables and the same structure we will find at this third inference of May 16th to Thursday, again, keynote, some direct with different topics and round tables. In that case of finance industry forum and an automotive forum Friday, then we will have three optional workshops, one on access governance, one on real world IM and practice, and one on cloud providers assurance. And for sure, so cloud provider selection. So this is the basic structure.
And within the next meeting, I will have a look at some of the sessions, some of the tracks, cetera, as I said before, we we'll have a series of keynotes. We'll have keynotes on Tuesday, Wednesday, and Thursday. And here I have a list of some of the keynote speakers. There's some more keynote speakers, but this is just a sample list of them. So there are a lot of people from the industry like Peter Boyle, like Karl Mara from, I like Dr. Peter Herman, like Beka from the Deutche bank, from the, from Italy.
There are people from the government side and from the, from the data protection area, like professor Dr. He or Dr. VFK from Poland, there are people from standard parties like Lauren Luk from Oasis. And for sure, they're also call Analyst like Craig Burton. So this is trust an overview. And if you have a look at a conference trend, which we find@idcoms.com, then you will see that there are really very interesting topics. There will be some, some really great news there. So I think there are some keynotes here really should be very, very curious about.
And so I think it's will be very interesting start to the, enter the conference, the keynote sessions, and with the keynote sessions and the next days in the morning. And then besides these keynotes, as I've said, we have a series of tracks and one of the tracks is access governance. Access governance is one of these really hot topics in these days. When you look at what is happening currently in identity and access measurement, broader space, that excess governance clearly is sort of the key entry to IM in these days. So it's not provisioning anymore.
It's a directory services, it's through the access governance. It's about how can I keep access under control? And we have a, so I think a very, very interesting crack around this, which focuses on several aspects. So how to use access governance to bridge the gap between business and it, what are the key elements or should be the key elements of your access governance strategy?
Organizational framework is guidelines and policies, how to integrate organization controls not only from your, your technical governance perspective or governance, but the entire trie framework, how to get to a common understanding of risks, etcetera. Also looking a little bit at future concepts for tomorrow's access management. When we move more toward dynamic authorization management, and we'll provide a look at the Wonderland based on our equipping leadership compass on access governance. So it'll be a mix.
That's the case for virtually all the direct, a mix of best practice presentation panels, some experts out of the business, some experts out of the industry. And for sure it could be a call Analyst providing their input there to give you an impression of, of some of these sessions. So we have some highlighted sessions here. So there will be a practice around how bank implemented governance intelligence. There will be a panel looking really towards or into the future, which is around how to govern all access beyond statically assigned entitlements.
So how to deal with environments where, for example, technologies like, which are based standards like exec, exec XML are heavily used, etcetera. Another best practice will be from eon and the global commodities see on part of eon, which introduced an governance tool to each regular regulatory compliance requirements. And so it'll be a very interesting mix with some really great keynotes and really great, really great best practice sessions in that area. And you definitely shouldn't miss that. Correct. A second direct topic is cloud governance.
Cloud governance is clearly one of the, the upcoming challenges I would say, because we really need to extend our, the way we are doing it, governance and special access governance, etcetera, to the cloud. And so we talk about things like why traditional governance processes failing and how to extend them to the new paradigm of cloud. So really how to have sort of a hybrid governance there, but you, we also look at some of the things around big day around cloud provider assurance, cloud provider, service selection, and, and how to manage risks. So they will be several things around.
What are the specifics of managing governance in the cloud? What do you have to look when you, you plan to extend your it infrastructure or it services by using cloud services? What does it mean for your governance? We also will talk about the data governance and big data stewardship. I think it's a very, very interesting topic because big data is one of the hives these days. And I think there for a good reason, there are some concerns regarding privacy regarding access to the data, et cetera. So what we will look at is what does big data mean?
What should big data security and governance look like? What do we need to do here? We will talk about big data stewardship as part of the concept of information stewardship. We recently unwed information stewardship is really the, sort of, of the concept on top of information governance on top of information security, where it really comes together. My colleagues, Mike Small and Dave current, I think November last year published a report on information stewardship. She will find at our website, a call.com/reports. It's something you definitely should have a look at.
We will also talk about moving from big data to smart data. So how can you make the shift from a silo approach where put everything into big silos towards an approach of using data in a very intelligent way. And that's something where the potential of the API economy, a topic my colleague, correct burden has covered in several of his reports recently comes into play. How can we access data that we need at runtime and add value to the data we have in ours? And for sure, we will talk about small privacy and little security for big data. That's also one of the current topics.
So big data, it's really big data and beyond covering at our conference. So the API economy, how can we make data smart security, privacy, and security also from the perspective of how can we use big data technologies to improve our security tools, our capabilities in security. And we will also talk about the relationship of big data and life management platforms, life management platforms. One of the topics we introduced at our last series, European identity confluence.
Again, there's an report available in life management platforms. It's for free. As far as I remember, it could call com search reports. So if you want to understand the topic of life management platforms, just have a look at this. Porwal one of the, I think most challenging topics overall in at least it security, maybe an it at all. That's privacy data protection, it law, especially. So this legal perspective, and luckily we are to have a person on board of Dr.
KA, who on one hand this lawyer, and on the other hand serves this Analyst here at KuppingerCole. So he will provide inside. We will have a lot of other people there, like the data protection for officer of Poland and many other great speakers and people talk about topics like privacy meets business needs. So how to really deal with this, this sort of dilemma, sometimes sort of this challenge overall, you also talk about bring your own device. So this is a loose, loose story situation or trust the right thing to do.
There's a newer problem bringing their own device out, which is also available at our company call website. We'll talk about the EU general data protection regulation, a lot of things which are happening there and a lot of things which will heavily affect the way we are doing it. And we are doing business staff regulation, data protection obligations, and liabilities of cloud providers, starting data and the cloud, etcetera, etcetera.
So again, I think a very interesting list of topics and I've just, again, selected some sessions I want to highlight. So there's a panel around the use general data protection regulation. It's uneasy for any business speakers like us and keen. And Dr.
Viki, there will be Analyst presentation beyond bring your own new WIS for privacy meets business needs from cars and keynotes then. And if you struggle in your organization with, to bring your own device discussions, you must attempt the session. Other topics like I've said, seen versus data protection, privacy, you like legislation on its impact on identity and, and so on. So again, one of these drags, which are sort of a math attempt drag, one of the sort of large drags we have in our trend is managing identities and access and cloud mobile and social.
This is sort of the, the big, this are this big changes we are observing in it, cloud computing, mobile computing, social computing, and it means we have to, to bridge the gaps between internal and external. If I look at our advisor business, then there's one, I really would say dominant topic these days. And that's how to deal with externals, how to extend our identity and access management to our partners, to our customers, cetera, how to deal with cloud and on premise services privilege and normal use cetera, cetera, but also what does it mean for your it organization?
So how does the, how do you need to change it organization? What about cloud and management? Cetera?
And again, a lot of things here, and as I've said, it'll be very much around these, these challenges. So is what my colleague Greg Martin called the computing Shikha. The computing Shikha has sort of the, this three big changes. We are observing in our it in these days, cloud computing, which means we have our deployment model, social computing, which means we have to do this more user populations, mobile computing, more wise types. And we have to, to provide information security for all of them.
And I think that's something which is, which we'll see when you look at a little bit more in depth at our agenda, but it, which is one of the, the underlying topics of, for lot of sessions is how can we address these challenges is imposed by the computing drug. How can we address them in a consistent, in a standardized way, instead of having a point solution here, a little bit for cloud management here, a little bit for virtualization security here, a little bit for social logins, they're a little bit for dealing with smartphones and then for tablets, cetera, how can we do it better?
How can we do it more consistent, more strategic? What are the things we really have to focus on? And you will see, for example, in note, notice that when you look at our agenda at the topic of context and risk based authentication or authorization plays a very central role in a lot of sessions. And that's one of these things. When we look at this picture and think about what should be in the middle, where all these three arrows met, meet what should be in the middle.
And then one of the things that should be in the middle that's around risk context based authentication and authorization, it's about how can we extend this code of information security to really deal with these new challenges in the best way.
And as I, as I've said, one of the challenges and that's really the thing we, we currently observe most when we talk with customers, that's the fact that I introduced this term, the identity and explosion at last year's EICs, where we have some employees there and we have a, usually a foreseeable number of partners, but we have to deal with far more other types of identities. Our prospects leads customers, etcetera. So it's sort of dealing with far more things.
And I remember last year, one of our advisory customers, customers told me, you know, we have 28 sales employees, but we have four, 3 million customers. And that means you are dealing with far more people. You have to deal, you have to give them access, but you have to protect your systems and your information in an adequate way. Not only for the relatively few employees you have, but for the potentially millions of externals, again, this will be one of the, the very dominant, important topics at the se 2013.
Also, we'll talk about as well. So beyond bringing your on device side to key consumerization of the mobile enterprise information, security, mobility, and mobile device management, some of things around that. So there will be sessions in that area. We will talk, especially around this things around cash customer challenges need to share. So centralized it infrastructures. That was what we had some years ago. Then the PCs in the networking came in in the mid eighties. Then the internet came early nineties.
Then we started doing more business partner integration beyond the EDI, beyond the electronic data interchange, since we did for quite a while. And right now it's about tighter integration with customers.
Again, that's one of the things which are around identity explosion around extending your enterprise around, delivering the agility to your business that your business needs. And this will sort of be sort of the, the, the dominant topic. When we done talk in the track about how to build your IM and I infrastructure right way and support your business today. Because the, the balance you need to find today is solving current challenges, solving current issues in a way that is sustainable, that is built for the next year.
So how can you build your IM infrastructure in a way that you can make the steps you need today very quickly, but that you end up with something which holds for a while, which is not outdated immediately again, that's what you need to do. And that's what we'll talk about. So we will again talk about IM and I in the future, and we will talk about the it paradigm, future it, paradigm defined by Coco. We will talk about the IM I achieve vision. So how to shape your infrastructure, future proof. So what do we have in line for the future?
We will talk about the future for our indication authorization, because a lot of things are happening there. A lot of things are changing. We see the move from Sam towards OS or addition of OS to Sam based environments. We see a lot of other things happening, and for sure we will talk about what is the future in Federation.
So again, have a look at the agenda. There are so many interesting sessions there. I think it's just highly interesting. And as I've said, one of the topics, there will be what we call the future it paradigm. And this is the way we think it should structure itself to optimally serve the business needs on one hand. So really deliver services. The business needs in a way the business needs them. And on the other hand to be capable, to make the best out of the cloud and out of on-premise.
So how to deal with on-premise and all the types of clouds with this continuum between pure on-prem and fully public cloud. So whether the services are produced and how to manage your service, then how to manage your information, how to enforce security on left hand, and hold on. I have on the right hand, how to implement information governance and service governance, our perspective is that it, that I organizations have to change in a way that they really put service and information management into the middle. We will talk about this. We will give you more insights on that.
And also on that's something we also introduced last year on what does the mean consequence for the structure of an it organization? So how could this it organization look like? And if you do it different, the it organizations have to change. What else? Life management platform is personal data customer manage relations. So this is one of the, the hot topics. And it's very much about identity and access. It's about privacy. It's about the way a person can share his personal data. He can manage his personal data and all that information without leaking it.
So keeping it under control, we will talk about live management platforms and status trends and standards. We will talk about trusted identities and trust frameworks. We will talk about business process consumerization and how it meets life management platforms. So what does it means for business processes? So a lot of things around that, I think it'll be also, again, a very interesting, direct, some highly interesting sessions, and this is what really will change the way we are doing it. It will change the way we, how we, the way we are engaging with our customers.
So how can we really deal with our customers? How can we provide services to them? How can we learn about them? How can we, how can we get the information from them we need without being always in this sort of privacy trap and data protection trap. So that's where life management platforms come into blame. We will do some round tables. And one of these round tables is live manager. It's the finance industry firm. This finance industry firm is, is focused on the finance industry. It's really made for the people from the finance industry.
So it's the opportunity to share your experience with your peers. In other financial institutions, we'll have a pretty, pretty good number of experts, farmers, industry, and EIC. So it'll be really a, an opportunity to meet with a considerable number of peers there. And it'll be the opportunity really to discuss some things more in depth. So we will look at leveraging cloud computing for a financial sector since round table to role of identity Federation for financial institutions, etcetera, and this round table together with some other sessions, I think is this is a really great opportunity.
One of the other round tables we have will be the life management initiative round table, where really the people who are heavily involved in live management platforms, we'll meet. It's also a kickoff meeting to start implementation of life management, infrastructures and services for life management initiative. So it's really about bringing together a series of companies, and there will be some very, very interesting players in there who will engage in the live management platforms. So it's also about the market view. Who's doing what the scope and talking about standards initiatives.
So if you're interested in the topic of life management, especially from a professional organization perspective. So if you want to make use of life management platforms for your organization, then you should not miss this round table. There's one new thing at the, there are a lot of new things, probably a lot of new sessions, news speakers, new people there, etcetera, etcetera. But one of the new things in our agenda, that's what we call the bug garden talks. The conference takes place in Munich correctly in English time, which is very, very close to Munich.
And the B garden talks that will be an opportunity of very short sessions. So sort of one slide by the way, they're at maximum or two few minutes presentation, very short, correct for presentations and the opportunity to directly and intensively discuss right after that presentation, it'll be laced around the breaks of the main, main agenda.
So you will have the opportunity to go into, to your sessions and then also spend your breaks sort of in a relaxed atmosphere in the beer garden, talks with the opportunity for some coffee and drinks, given that these beer garden talks will take place during the day. It'll be not really a beer talk. So it'll be not like, like drinks, but I think it's a good opportunity to me to understand, engage with them, to have a direct and controversial discussion or very intensive discussion there. And as I've said, we have three workshops on Friday and you can book these workshops on this separately.
One workshop is real world. I am in practice where it's about defining the IM program that fits best to your organization while taking all these things like different compliance regulations, like IM patterns into your account, taking IM to the next level is I am pattern achieving success with CRM implementation. So it's one day of workshop where you can really engage with one of, of my colleagues, which will Peter Cummings spend one day working closely learning a lot of things on real world.
I, a second workshop will be on cloud provider, cloud service, provider selection and assurance. So it's about how to select your service provider and how to ensure that your service provider or your cloud service provider delivers what you expect by. So it'll be looking at different standards you can use. It'll be it'll include government advice, etcetera cetera. So if you think about how to manage your cloud providers, you have to go to this workshop. And the third workshop trust as side will be one I will do where I will talk about the access governance and how to do this by this.
There are many, many, many more sessions. I can't talk about all these sessions here, but you can try little bit China. Some of these sessions I have listed here. So sessions like best practice for the find spun CSO, the keynote from be curl and the best practice from be curl panel on standards, the keynote of SA Apollos around software and active defense.
So, so really how to solve this problem from scratch and some others. So it'll be, as I've said, it'll be a very interesting conference. All the information that available our website, as I've said before, the conference will take place in Munich, May 14th, 17th, and all the information is available to our conference website. If there's some need for more information, don't hesitate to can contact us. If there are any other questions you might directly them right now, the questions area of go to webinar.
Otherwise, as I said, feel free to get in touch with us, and don't forget to register for the European identity and thought conference 2013 provided by a call Analyst. So thank you for attending this ERC preview webinar. We have a lot of other webinars within the next few weeks and just have a look at our website, Click a call com slash event where you will find all the information about upcoming webinars. There are a lot of interesting webinars which are then focused on specific topics. So don't miss to attempt the other webinars.
Don't miss to attend ESC and have a look at our reports website. Thank you, and have a nice day.