Access Management


When: May 06 2010 3:00 am

Presenting: Peter Cummings, CEO, ValueAddIT

Peter Cummings, presents a case study on Identity Management 2.0

Online Identity Verification

When: May 06 2010 6:00 am

Presenting: Steven Furnell, Head of School of Computing, Plymouth University

As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.

Ponemon Institute

When: May 06 2010 5:00 pm

Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa

Trends in Access Governance


28 Jul 2009 3:00 pm Presenting Paul Engelbert, VP, Global Security Management Practice, CA Services.

Identity Lifecycle Management is a comprehensive approach to managing user identities throughout their lifecycles. An effective identity lifecycle management approach should greatly assist corporations in improving efficiency, achieving tighter security controls, and ensuring continuous compliance.


When: May 06 2010 11:00 am

Presenting: David Temoshok; Federal Identity Management GSA, Director

This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.


8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance

John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.


28 Jul 2009 1:00 pm Presenting Dr. Michael J. Mestrovich, President of FiXs

Many visions, definitions, strategies and concepts on how "federation" should or would work currently abound when discussing Identity Management scenarios. .


When: May 06 2010 2:00 pm

Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect

The Realities of Emerging Technologies for IAM


8 Sep 2009 12:00 pm Presenting Al Zollar, IBM; Gerry Gebel, Burton Group, Ken Blossom, Tivoli

Burton Group Vice President and Identity and Security expert, Gerry Gebel,IBM Tivoli General Manager Al Zollar and IBM Trusted Identity Vice President Kent Blossom discuss . .


28 Jul 2009 12:00 pm Presenting Chris Sullivan, Courion, Vice President of Customer Solutions

Ensuring that the right people have the right access and are doing the right things across a complex enterprise can be a dauniting challange. 


When: May 06 2010 4:00 pm

Presenting: Dickie George; (NSA) National Security Agency

Cyber Coldwar


28 Jul 2009 6:00 pm Presenting Peter Tapling, President & CEO, Authentify,Inc

In the context of smaller budgets and more sophisticated security exploits, many entities are turning to out-of-band authentification (OOBA)to strengthen their Identity and Access Management strategies . .


28 Jul 2009 10:00 am Presenting Matthew Gardiner; Director of Product Marketing at CA

What is it and why is it a key security foundation for SAAS and the future of the web?

Mathew Gardiner is a recognized industry leaded in the security management and IAM markets worldwide.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Go to top