Identity & Access Management Best Practices
||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
||Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.
||Hilton Zurich Airport Hotel
8152 Opfikon-GlattbruggThere are a lot of free park places available.
Train: railway station Zurich Airport – take the Hotel Shuttle
|Date of Event
||9th of March 2016
||English, if non-German speaking people will attend, otherwise German
||see agenda below
||Fr. 55.— per participants
Organization, presentations, beverages and aperitif included
|2:30 – 3:00
||Registration & Coffee
|3:00 – 3:05
||Welcome & Introduction by the moderator
|3:05 – 3:35
||Maurice Bollag, Senior Manager at EY
Critical success factors for an Identity & Access Management program
The cornerstones for the success of an Identity & Access Management program is set prior the start of the project and continues beyond its implementation.
- How can IAM better be aligned with the needs of the business?
- Are we condemned to the ongoing increased complexity of Identity & Access Management? Is RBAC (Role Based Access Control) they and only solution?
- We will also discuss aspects of how Identity and Access Management programs are affected by today’s digital and cyber ecosystem.
We will explore what is required to ensure an effective and efficient Identity & Access Management from a project management as well as from an information security point of view.
|3:35 – 4:05
||Markus Steiner, Senior IAM Consultant at ITConcepts
Security through role-based rights management
The role based rights management is an essential component of a comprehensive identity and access management. An efficient and compliant rights management requests correct defined roles.However, the construction of a role model and the role modelling is a long and difficult process. An initial role definition is not enough: Permanent changes requires to adapt the roles simply and quickly to new job definitions, changed organizational structures or new IT Applications.
Based on our experience we try to give answers to the following questions:
- Which role model cover my requirements best?
- Which requirements/external treats exist for my role model?
- How do I keep flexibility in the role model?
- How do I build the roles initially?
- What specific type of process models are available?
- How do I later maintain the roles?
- How do I determine the quality of my roles?
|4:05 – 4:35
||Michael Lang, Manager Sales Engineering Europe at SailPoint
Identity Governance out the Cloud
The administration of access to information in hybrid IT environments is a challenge, which depends much more on identity and access management (IAM) solutions than ever before.In this presentation you get insights into how a unified governance model can be built with the involvement of existing resources. In order to reach a single view across the enterprise, applying uniform policies and controls over all IAM services for compliance and risk reduction.
|4:35 – 5:00
|5:00 – 5:30
||Hans-Peter Brügger, Business Development Manager Security Solutions at Swisscom (Schweiz) AG
Mobile ID: The way for a secure authentication for cloud solutions
Secure authentication and signature are key elements of digital processes. Users can access their applications and portals via Mobile ID and are uniquely identified thanks to strong two-factor authentication. With this strong authentication the access to cloud services are protected. For example security related applications as IAM.
There are various options to use this innovative solution. Customers, Service Providers and public authorities profit from a user friendly and secured solution as well from efficiency improvements and cost cutting.
|5:30 – 6:00
||Artisteidis Matsokis, IT Business Process Specialist at Franke Management AG
IAM Best Practices at Franke Management
The Franke Group introduced an IAM solution in 2014 to provide secure, reliable and efficient management and provisioning of accounts in IT systems, especially in SaaS and Cloud applications. The IAM solution is rolled out globally in 70 companies in 40 countries and is used by HR, IT and End Users. The biggest challenges were the standardization of HR and IT processes, the reliable and efficient connection of target systems for provisioning and the respective data cleansing.This presentation shows how these challenges were tackled at Franke and a successful and efficient operation of the IAM solution could be achieved.
|6:00 – 6:30
||Panel Discussion moderated
|6:30 – open end
||Apéro Riche & Networking
The speakers will be onsite for Q&A
The Sponsor of this event is:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.