SlideShare une entreprise Scribd logo
1  sur  7
CONTENT UPDATE
Andi Hindle
CIS Content Chair
THE BIGGEST CIS YET
160+ PRESENTERS
20 KEYNOTE SPEAKERS
117 SESSIONS/22 TRACKS
38 MASTER CLASSES
KEYNOTES
• Big Names!
• General David H. Petraeus
• Frank Abagnale
• Industry Leaders
• Alex Simons
• Eric Sachs
• Bob Blakley
• Enterprise Speakers
• Morningstar
• Aetna
• FMC Technologies
• Great Panels
• CISO Conversation
• Identity Defined Security
• Ping Representation
• André Durand
• Baber Amin
• Pam Dingle
• Patrick Harding
• Robb Reck
ENTERPRISE SPEAKERS
INDUSTRY STANDARDS
NEW TOPICS
Blockchain, Distributed Ledger, Distributed Consensus
Attribute Exchange, Personal Attribute Economy
Privacy and Security
OLD FAVORITES
Authentication, Authorization
Federation, SSO, Provisioning
Mobility and IoT
AND OF COURSE
SESSIONS
BUT WAIT, THERE’S MORE…
• Master Classes including
• Identity Developer Master Class
• UMA & SCIM in depth
• Sponsored Master Classes
• ...and Ping Identity’s very own Master Class
• 5 Industry Body Summits
• ... and the IDESG Plenary
• SCIM 2 interop
• Plus....
FIRST CISO SUMMIT
• Half-day track with presenters from
• Google
• AT&T
• Forrester
• Optiv
• vArmour
• Morningstar…
• …and more!
#CISNOLA
cloudidentitysummit.com

Contenu connexe

Tendances

Windows Azure Active Directory - from Atidan
Windows Azure Active Directory - from AtidanWindows Azure Active Directory - from Atidan
Windows Azure Active Directory - from Atidan
David J Rosenthal
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 

Tendances (20)

SPSNL17 - Azure AD B2B - Safe collaboration has never been that easy!
SPSNL17 -  Azure AD B2B - Safe collaboration has never been that easy!SPSNL17 -  Azure AD B2B - Safe collaboration has never been that easy!
SPSNL17 - Azure AD B2B - Safe collaboration has never been that easy!
 
Engage in effective collaboration with Azure AD B2B
Engage in effective collaboration with Azure AD B2BEngage in effective collaboration with Azure AD B2B
Engage in effective collaboration with Azure AD B2B
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 
Security in an age of collaboration 201903 - tvaug
Security in an age of collaboration   201903 - tvaugSecurity in an age of collaboration   201903 - tvaug
Security in an age of collaboration 201903 - tvaug
 
Wadoop vivek shrivastava
Wadoop vivek shrivastavaWadoop vivek shrivastava
Wadoop vivek shrivastava
 
Azure Active Directory
Azure Active DirectoryAzure Active Directory
Azure Active Directory
 
What is BizTalk360
What is BizTalk360What is BizTalk360
What is BizTalk360
 
Windows Azure Active Directory - from Atidan
Windows Azure Active Directory - from AtidanWindows Azure Active Directory - from Atidan
Windows Azure Active Directory - from Atidan
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
 
Windows Azure Mobile Services to Exposing Operational Data for Mobile Devices
Windows Azure Mobile Services to Exposing Operational Data for Mobile DevicesWindows Azure Mobile Services to Exposing Operational Data for Mobile Devices
Windows Azure Mobile Services to Exposing Operational Data for Mobile Devices
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Sweden BizTalk User Group presentation - Monitoring and Management using BizT...
Sweden BizTalk User Group presentation - Monitoring and Management using BizT...Sweden BizTalk User Group presentation - Monitoring and Management using BizT...
Sweden BizTalk User Group presentation - Monitoring and Management using BizT...
 
Vikas Jain Past Work
Vikas Jain Past WorkVikas Jain Past Work
Vikas Jain Past Work
 
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
 
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
 

En vedette

Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...
VSR *
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
VSR *
 

En vedette (17)

CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
CIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and Security
 
VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop
 
Mobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work EnvironmentMobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work Environment
 
I AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls
I AM NOT MY PHONE - Avoiding Identity Relationship PitfallsI AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls
I AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls
 
TELUS 2014 Annual Report
TELUS 2014 Annual ReportTELUS 2014 Annual Report
TELUS 2014 Annual Report
 
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
 
Customer Presentation - Telus
Customer Presentation - TelusCustomer Presentation - Telus
Customer Presentation - Telus
 
Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Responsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineResponsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and Timeline
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
 
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
 
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationAGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable Success
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributes
 

Similaire à CIS 2016 Content Highlights

Ray speerchipsensorsei letterkenny
Ray speerchipsensorsei letterkennyRay speerchipsensorsei letterkenny
Ray speerchipsensorsei letterkenny
threesixty
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
DATAVERSITY
 
Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industry
DataWorks Summit
 

Similaire à CIS 2016 Content Highlights (20)

Keyless Technologies - NOAH19 London
Keyless Technologies - NOAH19 LondonKeyless Technologies - NOAH19 London
Keyless Technologies - NOAH19 London
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
Drilling into new potentials for open badges
Drilling into new potentials for open badgesDrilling into new potentials for open badges
Drilling into new potentials for open badges
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoT
 
Ray speerchipsensorsei letterkenny
Ray speerchipsensorsei letterkennyRay speerchipsensorsei letterkenny
Ray speerchipsensorsei letterkenny
 
How to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris SistrunkHow to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris Sistrunk
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?
 
IBM Bluemix Nice Meetup #4-20170302 6 Meetup @INRIA - BlockChain
IBM Bluemix Nice Meetup #4-20170302 6 Meetup @INRIA - BlockChainIBM Bluemix Nice Meetup #4-20170302 6 Meetup @INRIA - BlockChain
IBM Bluemix Nice Meetup #4-20170302 6 Meetup @INRIA - BlockChain
 
Portfolio3.43
Portfolio3.43Portfolio3.43
Portfolio3.43
 
The Four Pillars of PCB Design for Creating a Successful IoT Product
The Four Pillars of PCB Design for Creating a Successful IoT ProductThe Four Pillars of PCB Design for Creating a Successful IoT Product
The Four Pillars of PCB Design for Creating a Successful IoT Product
 
Blockchain Fundamentals for Technology Engineers
Blockchain Fundamentals for Technology EngineersBlockchain Fundamentals for Technology Engineers
Blockchain Fundamentals for Technology Engineers
 
Blockchain Fundamentals Quickstart
Blockchain Fundamentals Quickstart Blockchain Fundamentals Quickstart
Blockchain Fundamentals Quickstart
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BI
 
The Who, How, and Why of IT certifications
The Who, How, and Why of IT certificationsThe Who, How, and Why of IT certifications
The Who, How, and Why of IT certifications
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
 
Bringing an open source project to the Linux Foundation
Bringing an open source project to the Linux FoundationBringing an open source project to the Linux Foundation
Bringing an open source project to the Linux Foundation
 
Watson IoT at Think 2018
Watson IoT at Think 2018Watson IoT at Think 2018
Watson IoT at Think 2018
 
Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industry
 

Plus de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Plus de CloudIDSummit (20)

Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn FayCIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

CIS 2016 Content Highlights

  • 2. THE BIGGEST CIS YET 160+ PRESENTERS 20 KEYNOTE SPEAKERS 117 SESSIONS/22 TRACKS 38 MASTER CLASSES
  • 3. KEYNOTES • Big Names! • General David H. Petraeus • Frank Abagnale • Industry Leaders • Alex Simons • Eric Sachs • Bob Blakley • Enterprise Speakers • Morningstar • Aetna • FMC Technologies • Great Panels • CISO Conversation • Identity Defined Security • Ping Representation • André Durand • Baber Amin • Pam Dingle • Patrick Harding • Robb Reck
  • 4. ENTERPRISE SPEAKERS INDUSTRY STANDARDS NEW TOPICS Blockchain, Distributed Ledger, Distributed Consensus Attribute Exchange, Personal Attribute Economy Privacy and Security OLD FAVORITES Authentication, Authorization Federation, SSO, Provisioning Mobility and IoT AND OF COURSE SESSIONS
  • 5. BUT WAIT, THERE’S MORE… • Master Classes including • Identity Developer Master Class • UMA & SCIM in depth • Sponsored Master Classes • ...and Ping Identity’s very own Master Class • 5 Industry Body Summits • ... and the IDESG Plenary • SCIM 2 interop • Plus....
  • 6. FIRST CISO SUMMIT • Half-day track with presenters from • Google • AT&T • Forrester • Optiv • vArmour • Morningstar… • …and more!