When: May 19 2010 4:00 am
Presenting: Diane Stow, Service Transition Manager, Bank of England
One of the challenges of service management has always been project management and how it fits, or doesn't, with change. How and when should projects engage with Service Management?
When: May 19 2010 12:00 pm
Presenting: Tulio Quinones, Core Media Technologies & Chuck Darst, HP
The reality is-change is complex. In additional to challenges of change in a distributed CAB environment, CMT faced pressures of speed and risk - to be more responsive to business needs and more consistent on risk and impact analysis.
When: May 06 2010 11:00 am
Presenting: David Temoshok; Federal Identity Management GSA, Director
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.
When: Apr 29 2010 11:00 am
Presenting: Brandon Dunlap; Brightfly, Managing Director
Companies invest significant amounts of resources in developing, marketing and positioning their products or services within a given market, yet when it comes to promoting the protection of the business and the identities of their employees and customers, many companies fail to drive the same level of marketing internally.
When: May 19 2010 2:00 pm
Presenting: Thomas Dosedel, BlueCross BlueShield & Mike O'Grady, HP
The Infrastructure and interdependencies between resources just keep getting more complex.
When: May 06 2010 2:00 pm
Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect
The Realities of Emerging Technologies for IAM
When: Apr 29 2010 12:00 pm
Presenting: Michael Black, ISO - Americas, Travelex Holding Limited
With the proliferation of powerful mobile devices ranging from laptops to Smartphones, securing email in a mobile environment is never an easy task.
When: May 06 2010 3:00 am
Presenting: Peter Cummings, CEO, ValueAddIT
Peter Cummings, presents a case study on Identity Management 2.0
When: May 06 2010 4:00 pm
Presenting: Dickie George; (NSA) National Security Agency
Cyber Coldwar
When: Apr 29 2010 1:00 pm
Presenting: Ben Isaacson CIPP; Experian, Privacy & Compliance Leader
This session will give you a summary of global anti-spam laws and requirements for senders to maintain compliance. In addition, the session will provide education on industry self-regulatory efforts, including best communications practices developed by leading industry organizations.
When: May 06 2010 6:00 am
Presenting: Steven Furnell, Head of School of Computing, Plymouth University
As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.
When: May 06 2010 5:00 pm
Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa
Trends in Access Governance
When: Apr 29 2010 @ 2:00 pm
Presenting: Jan Sijp and Allen Schoonmaker; SonicWALL
Powering Regulatory and Corporate Compliance with an Email Security Strategy.