Ping Identity®, The Cloud Identity Security Leader™, today announced details of its Cloud Identity Governance & Compliance track. Specialists from KPMG LLP, the audit, tax and advisory firm, will moderate the track, starting at 10 a.m. MT on Wednesday, July 18, at the 2012 Cloud Identity Summit. Taking place at Vail, Colorado’s Cascade Resort, the summit explores the role of identity as the new perimeter and examines ways cloud operating environments, mobile device access and social networking are transforming business and IT.
The Cloud Identity Governance & Compliance track includes:
People are People, Identity is Identity
Jim Wilhelm and Vijay Jajoo, KPMG LLP
Adoption of cloud services and the expanding value chains of large organizations require the management of identities well outside the traditional centralized identity models. Enterprise organizations need to effectively meet the needs of business constituents both internal (employees) and external (business partners and customers), using models that support collaboration and ensure the security of critical information assets. This track will explore why the distinction between enterprise vs. consumer identity is important for understanding legacy identity models and how understanding that distinction will remain critical as the industry moves forward.
Transforming Access Governance for the Cloud
Donald Clewley and Brian Geffert, KPMG LLP
Traditional approaches to Access Governance, such as role-based access control, laborious certification processes and defense-in-depth, are struggling to be scaled effectively for a new boundary-less era fueled by cloud operations and collaboration. This track will focus on how businesses can leverage existing practices with emerging end-to-end trust models.
There is Nothing Standard about Cloud Identity Compliance Standards
Tim Mather and Justin Weissert, KPMG LLP
The cloud offers organizations the ability to exponentially scale federated identity models – presenting great opportunity, but also increasing risk. Gaining assurance over other parties “trusted” identities is a primary risk – one that can be managed through the adoption of standards. This session will examine existing standards and what is being done to harmonize the methods by which companies could accept risks around cloud-enabled, federated identity models.
Sponsors of the Cloud Identity Summit include KPMG LLP (Platinum Show Sponsor), Google (Gold Workshop Sponsor), SailPoint (Silver Sponsor), Radiant Logic, Inc. (Emerald Sponsor), Covisint (Diamond Sponsor), Axiomatics & Advancive (Solution Sponsor), Courion (Solution Sponsor), CSC (Solution Sponsor), IBM (Solution Sponsor), Identropy (Solution Sponsor), Innotribe (Solution Sponsor), Layer 7 (Solution Sponsor), Oracle (Solution Sponsor), Password Bank (Solution Sponsor), Symplified (Solution Sponsor), Ultimate Software (Solution Sponsor), Vordel (OIDF and OIX Summit Sponsor), Gluu (Lunch Sponsor) and Ping Identity. Visit www.cloudidentitysummit.com for more information and to register for the event.
About Cloud Identity Summit
Ping Identity’s Cloud Identity Summit is the premiere conference dedicated to the role of identity in cloud security. With 15 expert led, hands-on educational workshops and over 30 industry speakers, the Cloud Identity Summit brings together hundreds of the world’s top experts, implementers and vendors into a single week of knowledge sharing.
About Ping Identity | The Cloud Identity Security Leader
Ping Identity provides cloud identity security solutions to more than 800 of the world's largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 45 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using secure, open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralized access control. Visit pingidentity.com for more information.