FYI De : KuppingerCole [mailto:service at kuppingercole.com] Envoyé : jeudi 13 décembre 2012 11:17 À : BISSON Pascal Objet : European Identity & Cloud Conference 2013 News [cid:image001.jpg at 01CDD92B.EA89C150]<http://www.id-conf.com/> Blogs<http://blogs.kuppingercole.com> Twitter<http://twitter.com/kuppingercole> Facebook<http://facebook.com/kuppingercole> Google+<https://plus.google.com/112823685461245127520/> LinkedIn<http://www.linkedin.com/groups?gid=3480266> Xing<https://www.xing.com/net/digitalid/> If you have difficulty reading this mail, please follow this link<http://www.id-conf.com> European Identity & Cloud Conference 2013 Where Thought Leaders, C-Level and IT Practioners Meet to Shape the Future of IT [cid:image002.jpg at 01CDD92B.EA89C150]<http://www.kuppingercole.com/events/n40178> [cid:image003.jpg at 01CDD92B.EA89C150]<http://www.kuppingercole.com/watch/eic_welcome> Free EIC 2013 Preview Webinar on 22nd January, 2013 Watch this EIC 2012 Film to find out more about the European Identity & Cloud Conference ________________________________ EIC 2013 Track Topics Managing Identities and Access to Information for Cloud, Mobile and Social Computing Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers and to run our enterprises. It is all about the shift of control into the hands of users, far beyond of what we used to call consumerization. Identity and access is the key element in this paradigm shift and there is no better place to get the right input for your strategy than EIC 2013. It is about protecting corporate information while enabling business agility. Some of the sessions in this track: · Cloud and on-premise, internal and external, privileged and normal users with their mobile and classic devices - how to create an integrated infrastructure that manages access to information in any context · The New IT Organization: Service Focused IT in the Age of Cloud, Mobile and Social Computing · The Future of Cloud Identity · Providing IdMaaS (Identity Management as a Service) for Customer Managed Relationships and Partner Managed Relationships Privacy, Data Protection, IT-Law EU, US, OECD and worldwide regulatory frameworks for privacy, data protection and IT-law in general date back to the 90s and 80s or even earlier, long before social networks or even the internet itself appeared, bringing along a totally new quality of privacy risks. Together with the rising awareness for those risks, governments and regulators all over the world have started to create a new generation of governance, which is more and more influencing the way we use information. IT professionals today need to understand legal basics and should know, how the legal frameworks will evolve. Therefore, the legal aspects of privacy and data protection have become a key topic at EIC. Some of the sessions and workshops: · Privacy meets Business Needs: BYOD - lose-lose or just the right thing to do? · Big Data - Small Privacy? · EU´s General Data Protection Regulation: 10 uneasy Truths for any Business · Self Regulation in Data Protection: Effective Self-Defence or No Chance? Cloud Governance Virtually every organization today is using the Cloud in some way or another. But do organizations really know what they are using, not to speak about knowing what the Cloud Provider really does? Cloud services with their risk of data sprawl and the lack of control about corporate information is a hot topic for auditors today. Privacy issues, risk management for sensitive information, and other aspects gain more and more attention of auditors. But even besides the regulatory and internal compliance requirements, Cloud Governance and Stewardship are mandatory for any organization. How to enforce Cloud Assurance? How to know what the Cloud Service Provider is doing and whether this meets your requirements? And how to enforce Cloud Security in general? This track covers all these aspects. It is about managing the Cloud right to mitigate risks and gain maximum benefits from using the Cloud. Some of the sessions and workshops in this track: · Governance meets the Cloud: Why Traditional Governance Processes Fail and how to Extend them to the New Paradigm · Cloud Provider Assurance: Get what you Pay for · Beyond Checkboxes: How to Manage Cloud Risk. · Enforcing End-to-end Security in the Cloud Beyond BYOD, IT Consumerization & Mobile Enterprise With the shift of control to the user and the rapidly increasing diversity of devices, organisations have to be able to learn, how their employees want to work and how their customers want to interact, and provide an infrastructure that is flexible enough to support their current and future preferences. At EIC 2013, we will discuss with you the building lock of such an infrastructure. · Information Security and Mobility: Know the Risks, Fight the Threats · Mobile Device Management: Gaining Control and Transparency of Devices and Information · The Maturation Process of Enterprise Mobility Management · Business Process Consumerization Life Management Platforms, Personal Data, Customer Managed Relationships Life Management Platforms, sometimes (misleadingly) called "Personal Data (Storage)", or "Personal Clouds" or "VRM" if focused on customer/vendor relationships, will turn the way we use the Internet upside down and make privacy and reliably secure exchange of information a fundamental layer of any networked interaction. Business models based on the exploration of personal data and on user tracking will fail. Join us at EIC 2013 to discuss the business models of the privacy centered post-Facebook era. · Life Management Platforms: Status, Trends, Standards · Trusted Identities and Trust Frameworks · Business Process Consumerization meets Life Management Platforms · Use Cases and Business Models The Internet of Things (IoT) The heydey of the digital revolution is yet to come, with the API Economy and Internet of Things giving us a first impression of what might be hidden behind his term. Connected Vehicles, Smart Grid, Medical Sensoring and Tracking, Smart Buildings - the IoT has many faces and is now taking off for a huge impact on our life and work. · Connected Objects, Real World Internet, Web of Things: Visions and Business Models in the IoT World · Reference Models and Initiatives and Architectures for the Internet of Things · IoT Security and Privacy Concerns and how to address them · Connected Vehicles, Life Management Platforms & The API Economy (Big) Data Governance/Stewardship Auditors today put specific emphasis on the tools which handle large amounts of data and which allow combination of data, like SAP BW. Big Data moves the capability of dealing and combining large amounts of data to the next level. However, the more you do here the bigger the risk. Big Data Security, Big Data Governance, and Big Data Stewardship as the overall concept including also data leaks and loss will not only become the center of attention of auditors but also set the focus on Data Security, Governance, and Stewardship. Last not least, understanding the capabilities of the API Economy for Big Data is a must. · Big Data Security/Governance: What to do here now · Big Data Stewardship as part of Information Stewardship · Moving from Big Data to Smart Data: Leverage the potential of the API Economy · Big Data - Small Privacy and little Security? How to Build your IAM/IAG Infrastructure the Right Way - and Support Business Today Many organizations currently are in the situation that they, on one hand, still have to do some homework in building their underlying IAM/IAG (Identity and Access Management/Governance) infrastructure. Implementing directories for internals and externals, implementing Identity Provisioning and Access Governance, Single Sign-On, etc. are things which frequently still need to be done. On the other hand there is the need to support new business requirements for instance for on-boarding of externals or managing access to cloud services today. This leads to the art of supporting business needs and agility today without losing focus. · IAM/IAG in the future: IT Paradigm defined by KuppingerCole · The IAM/IAG vision: how should your infrastructure look like · The Future of Authentication and Authorization · SAML is Dead? visit the conference website...<http://www.id-conf.com> ________________________________ Call for Speakers EIC also stands for educate - innovate - connect. As a speaker, you play a vital role in the educational, innovational and communicational objectives for the conference. We appreciate your proposals and your commitment of time and expertise to make EIC 2013 a successful event again. Like in previous years, EIC will consist of 4 parallel session streams. Each session is 1 hour and consists of 1-3 slots covering the session topic. A slot can be an individual presentation, an interview or a panel discussion with 3-5 panelists. Panels are moderated by KuppingerCole analysts. There are furthermore some keynote sessions available through this call. Keynotes have 30 minutes. Share Your Experience. Share Your Thoughts European Identity Conference is renowned for its great choice of in-depth educational offerings. Within this call, you can propose: · a panel discussion · an interactive, workshop-type session · a single presentation · a keynote If your company is providing solutions and/or services in markets which are covered by the topics of this conference, then we will consider your proposals for panel discussions, not for single presentations. December 16th, 2012 1st wave of speaker notifications sent ________________________________ December 19th, 2012 Draft Agenda published ________________________________ April 1st, 2013 Call for speakers is closed ________________________________ April 10th, 2013 Final speaker notifications sent ________________________________ April 14th, 2013 Webmeeting with all speakers ________________________________ April 21st, 2013 Final Presentations begin to be transmitted ________________________________ May 6th, 2013 Final Presentations deadline ________________________________ May 14, 2013 EIC 2013 begins Speaker Entitlements In exchange for your contribution as a speaker, you will receive a complimentary registration for the whole conference including workshops. As a speaker, you do not need to register. If receiving a speaker notification, you will be automatically registered for the whole conference. Propose your session now....<http://www.id-conf.com/events/eic2013/callforspeakers> ________________________________ Partnering with EIC 2013 "EIC is not only growing in size, but also in importance. We have been able to build really strong relationships with our customers on this conference", Max Waldherr from Quest Software (now a part of Dell) said about EIC 2012. With our move to the Dolce Ballhaus Forum Unterschleissheim, the Expo and Conference space has significantly improved, offering a fantastic platform to talk business. If you are interested to become a partner of EIC and take advantage of its great exhibitor and sponsorship opportunities, you can · Download more information from here<http://www.id-conf.com/events/eic2013/sponsorinfo> · or directly get in touch with Katja Schaffrath<mailto:ks at kuppingercole.com> or Thomas Steinmayer<mailto:ts at kuppingercole.com>. EUROPEAN IDENTITY & CLOUD CONFERENCE May 14-17, 2013, Munich · EIC 2013 Website<http://www.id-conf.com/> · Call for Speakers<http://www.id-conf.com/events/eic2013/callforspeakers> · Information for Exhibitors and Sponsors<http://www.id-conf.com/events/eic2013/sponsorinfo> · Registration Dates and Fees<http://www.id-conf.com/events/eic2013/registration> Early Bird registration fees up to January 15th, 2013: Get your conference pass for just 1,200 Euros<http://www.id-conf.com/events/eic2013/registration> (1,480 Euros including Workshop day). Save another 10% or even more, if 2 or more persons from the same company register at the same time. ________________________________ NEW: If you register for EIC, you will get full access to our Research<http://www.kuppingercole.com/reports> until the end of May 2013. If you would like to change your subscription settings or if you want to unsubscribe, please visit this link<http://www.kuppingercole.com/unsubscribe/pascal.bisson@thalesgroup.com/mzhfal2kon2we22ho5cvkstljfxtgtlcgnrukmseobswg5dxoqvtev3imjuwovsci55ggpi>. [cid:image004.gif at 01CDD92B.EA89C150] phone +49 (0)211 237077-24 | fax +49 (0)211 237077-11 | mobile +49 (0)173 7236737 KuppingerCole | Am Schloßpark 129 | 65203 Wiesbaden | Germany www.kuppingercole.com<http://www.kuppingercole.com> www.id-conf.com<http://www.id-conf.com> [cid:image005.gif at 01CDD92B.EA89C150]KuppingerCole on Facebook<https://www.facebook.com/kuppingercole> [cid:image006.png at 01CDD92B.EA89C150] KuppingerCole on Twitter<https://www.twitter.com/kuppingercole> [cid:image007.gif at 01CDD92B.EA89C150] Visit us at Xing<https://www.xing.com/net/digitalid/> [cid:image008.png at 01CDD92B.EA89C150] KuppingerCole News<https://www.kuppingercole.com/rss> AG Duesseldorf HRB 57000 Managing Directors: Beate Minor, Joerg Resch -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment.html> -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.jpg Type: image/jpeg Size: 29190 bytes Desc: image001.jpg URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment.jpg> -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.jpg Type: image/jpeg Size: 33874 bytes Desc: image002.jpg URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment-0001.jpg> -------------- next part -------------- A non-text attachment was scrubbed... Name: image003.jpg Type: image/jpeg Size: 25167 bytes Desc: image003.jpg URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment-0002.jpg> -------------- next part -------------- A non-text attachment was scrubbed... Name: image004.gif Type: image/gif Size: 5183 bytes Desc: image004.gif URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment.gif> -------------- next part -------------- A non-text attachment was scrubbed... Name: image005.gif Type: image/gif Size: 121 bytes Desc: image005.gif URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment-0001.gif> -------------- next part -------------- A non-text attachment was scrubbed... Name: image006.png Type: image/png Size: 593 bytes Desc: image006.png URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment.png> -------------- next part -------------- A non-text attachment was scrubbed... Name: image007.gif Type: image/gif Size: 354 bytes Desc: image007.gif URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment-0002.gif> -------------- next part -------------- A non-text attachment was scrubbed... Name: image008.png Type: image/png Size: 764 bytes Desc: image008.png URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20121213/af9e13d8/attachment-0001.png>
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy