Day 1 (November 10) 09:00-10:15 10:15-11:30

Download (0)

Full text

(1)

Day 1 (November 10)

09:00

-10:15

Registration

Opening Morning Coffee 10:15 -

11:30

Welcome and Moderation

Norbert Pohlmann, Chairman/Director, TeleTrusT/if(is), Germany

Opening Keynotes

Requirements on new regulations and current changing needs from the view of the EDPS B Giovanni Buttarelli, The European Data Protection Supervisor, Belgium

Engaging Small Companies in Cyber Security Emma Philpott, CEO, The IASME Consortium Ltd, UK

Bordeaux Room

11:30

-12:00 Coffee Break 12:00

-12:30

Opening Sponsor Keynote, Moderation: Jon Shamah, Chair, EEMA, UK Compliance is More Than Just a "Documentation Effort"

Jim Hong, Group Technical Program Manager, Applications and Services Security, Adobe, USA

Bordeaux Room

Open Identity Summit (parallel conference)

Provence Room Keynote (12:00 - 13:00)

From UN/CEFACT’s work on legally significant trusted transboundary electronic interaction towards global trust services

Alexander Sazonov, National Certification Authority, Russia

12:30 -13:30

Opening Panel, Moderation: Malte Kahrs, CEO, MTRIX, Germany

Future Ecosystems for Secure Authentification and Identification: FIDO, TPM and more B Tord Fransson, VP Sales EMEA, Yubico, Sweden

Kim Nguyen, Managing Director, D-Trust, Germany Sandro Gianella, Google Germany, Germany

Bernd Kowalski, Federal Office for Information Security (BSI), Germany

Michael Kranawetter, National Security Officer Germany, Head of Information Security, Microsoft, Germany

Bordeaux Room

Mobile eID

Provence Room

SSEDIC.2020 on Mobile eID (13:00 - 13:30) Michael Kubach, Heiko Roßnagel, Fraunhofer Institute for Industrial Engineering, Germany, Herbert Leithold, A-SIT, Austria, , Christian H. Schunck and Maurizio Talamo University of Rome, Italy

13:30 - 14:20 Lunch

(2)

14.20 –

14.50 Sponsor Keynote, Moderation: Rick chandler, Treasurer, EEMA, UK

Embracing and protecting consumers and citizens through B2C as a Service

Kim Cameron, Architect of Identity, Microsoft Corporation

Bordeaux Room

Lunch

Open Identity Summit (parallel conference)

Authentication

Provence Room Cloud Security

Erik R. Van Zuuren, TrustCore.EU, Board Member / Vice-Chairman, EEMA, Belgium

Bordeaux Room

Industrial Security

Wolfgang Schneider, Senior Adviser, Fraunhofer Institute for Secure Information Technology - SIT, Germany

Burgand I Room

Encrypted Communication

Ammar Alkassar, Board Member/Chairman, TeleTrusT/Sirrix AG, Germany

Burgand II Room

Proxied Authentication in Single Sign-On setups with Common Open Source Systems (14:30 – 15:00)

Florian Holzschuher and Rene Peinl, University of Applied Science Hof, Germany

14:50 - 16:20

On location-determined cloud management for legally compliant outsourcing B

Bernhard Doll, Research Assistant, University of Passau, Germany

Industry 4.0 - Challenges in anti-counterfeiting B

Christoph Thiel, Professor, FH Bielefeld - University of Applied Sciences, Germany; Christian Thiel, Professor, Institute for Information and Process Management at the University of Applied Sciences in St. Gallen, Switzerland

The Public Key Muddle - how to manage transparent end-to-end encryption in organizations B

Gunnar Jacobson, CEO, Secardeo GmbH, Germany

Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite (15:00 – 15:30)

Vladislav Mladenov, Christian Mainka and Joerg Schwenk, Ruhr University Bochum, Germany

Cloud Deployments: Is this the end of n-tier architectures? B

David Frith, Principal Security Consultant, Info-Assure Ltd, UK

Industrial Control System (ICS) security risk management E

Franky Thrasher, Information Systems Security Officer, GDF-Suez, Belgium"

Encryption for Everyone! Overcoming Obstacles of Public Key Encryption B Mechthild Stöwer, Head of Department Security Management, Fraunhofer Institute for Secure Information Technology - SIT, Germany

Innovative Building Blocks for Versatile Authentication (15:30 – 16:00)

Deltef Hühnlein, Max Tuengerthal, Tobias Wich, Tina Hühnlein and Benedikt Biallowons, ecsec GmbH, Germany

Secure Partitioning of application Logic In a Trustworthy Cloud (SPLITCloud) B

Michael Gröne, Senior Project Manager and Consultant, Sirrix AG security technologies, Germany

Monitoring Critical Infrastructure Traffic on Fresh Networks

Nathan Bates, Lead Security Engineer, Adobe Systems, Inc., USA

Securing enterprise communication on both sides of the firewall with state-of-the-art end-to-end encryption B

Burkhard Wiegel, CEO, Zertificon Solutions GmbH, Germany

(3)

16:20 - 16:45

Coffee Break Open Identity Summit

(parallel conference)

Cloud and Data Management

Provence Room

eID and Trust Services

Marc Sel, Director, PricewaterhouseCoopers, Belgium

Bordeaux Room

Cybersecurity and Cybercrime

Michael Hartmann, Security Expert, SAP, Germany

Burgand I Room

Internet of Things

Franky Thrasher, Information Systems Security Officer, GDF SUEZ Energy Europe, Begium

Burgand II Room Towards a Secure cloud usage for Financial IT (16:30 – 17:00)

Marcus Hilbrich, Ronald Petrilic,

University of Paderborn, Germany and Steffen Becker, TU Chemnitz, Germany

16:45 - 18:15

Summary and conclusions of the IAS² study to support the implementation of a pan-European framework on electronic identification & trust services for electronic transactions in the EU internal market B

Olivier Delos, Managing Partner, SEALED, Belgium

Qualified certificates for electronic seals and for website authentication: Just two sides of the same (gold) medal?

Enrico Entschew, Senior Business Developer, Bundesdruckerei GmbH, Germany

Arno Fiedler, CEO, Nimbus Technology Consulting, Germany

Identity use cases and conundrums in an IoT world

Philip Hoyer, Director Strategic Innovation, HID Global, UK

Using Proxy Re-Encryption for Secure Data Management in an Ambient Assisted Living Application (17:00 – 17:30)

Hannes Zach, Philip Peinsold, Jakob Hatzl, exthex GmbH, Austria, Johannes Winter and Peter Danner, TU Graz, IAIK, Austria Signature Validation - A Dark Art? B

Peter Lipp, Ass. Prof., Graz University of Technology, Austria

How the God Particle will Help You Securing Your Assets B

Thomas Punz, Manager, Itecor, Switzerland; Roger Bollhalder, Lecturer, Fernfachhochschule Schweiz (FFHS), Switzerland

Scalable security for IOT

Geert-Jan Schrijen, CTO, Intrinsic-ID, The Netherlands

Topology of Dynamic Metadata Exchange via a Trusted Third Party (17:30 – 18:00)

Daniela Pöhn, Leibniz Computing Center, Germany

PixInk: A novel way to deliver Strong

WYSIWYS functionality using advanced image processing techniques.

Guillaume Forget, Senior Vice President, Cryptomathic, Germany

The Evolution of Cybersecurity: Continuous Active Threat Protection S

Craig Bird, Senior Solutions Engineer, eSentire, UK

Trust Evidence for IoT: Trust Establishment from Servers to Sensors B

David Ott, Research Director, Intel, USA

18:15 - 20:00

18:45

19:05

Drinks/Networking Reception with

Dinner Speech: Building Security, Protection and Trust within Society and the Economy

Klaus Vitt, Federal Government Commissioner for Information Technology and State Secretary at the Federal Ministry of the Interior, Germany SkIDentity Award Ceremony – Landmark in the Land of Ideas

(4)

Day 2 (November 11)

10:00 -

11:00

Opening Panel, Moderation: Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor (EDPS), Belgium B Approaches to engineering privacy into the Internet: The Internet Privacy Engineering Network (IPEN) and other initiatives Jaap-Henk Hoepman, Scientific Director Privacy & Identity Lab, Radboud University Nijmegen, The Netherlands

Henri Kujala, Head of HERE Privacy Office, HERE, Finnland

Florian Stahl, Lead Consultant Information Security, msg systems ag, Germany Stefan Schiffner, Expert in Network & Infomation Security, ENISA, Germany

Bordeaux Room

11:00 - 11:30

1001 Vulnerabilities: removing the breeding ground for cyber threats S

Alexander Koderman, Verinice, TEAM Lead, SerNet, Germany

Bordeaux Room

Challenges to Stay Secure in the Era of Digital Business S

Kasper Lindgaard, Director of Research and Security, Secunia, Finland

Burgand I Room

Cybersecurity and Cybercrime

Michael Hartmann, Security Expert, SAP, Germany

Burgand II Room

Open Identity Summit (parallel conference)

Open Source

Provence Room

Proximity-Based Access Control (PBAC) using Model-Driven Security B

Rudolf Schreiner, CTO, ObjectSecurity, Germany

Quality Management in Open Source Projects - Experiences form the Open eCard Project Daniel Nemmert, Hans-Martin Haase, Detlef Hühnlein and Tobias Wich, ecsec GmbH, Germany

11:30 -

12:00 Coffee Break

Trust Services

Enrico Entschew, Senior Business Developer, Bundesdruckerei GmbH, Germany

Bordeaux Room

Regulation and Policies

Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor (EDPS), Belgium B

Burgand I Room

BYOD and Mobile Security

Patrick Michaelis, Principal, AC – The Auditing Company, Germany

Burgand II Room

Open Identity Summit (parallel conference)

Identity Management

Provence Room

12:00 - 13:30

Comparative study of Trust Models B Marc Sel, Director, PricewaterhouseCoopers, Belgium

Information Security Standards in Critical Infrastructure Protection B

Alessandro Guarino, CEO, StudioAG, Italy

Microsegmentation: Balancing speed of delivery, reduced complexity and security Philipp von Wallenberg, EMEA SDDC Network Virtualization & Security Architect, VMware EMEA

Economic issues of federated identity management – An estimation of the costs of identity lifecycle management in inter-organizational information exchange using transaction cost theory

Sebastian Kurowski, Fraunhofer Institute for Industrial Engineering, Germany

A reference model for a trusted service guaranteeing web-content B

Mihai Togan, Security software architect, certSIGN, Romania

Beyond cloud and big data: data protection tensions in recent software development trends B

Maarten Truyens, Legal researcher, University of Antwerp, Belgium

The Privacy Cockpit for Smartphones - Configuration of Data Secrecy made easy Jörn-Marc Schmidt, Senior Consultant, secunet Security Networks AG, Germany

Evaluating complex Identity Management systems- The FutureID approach Rachelle Sellung and Heiko Roßnagel, Fraunhofer Institute for Industrial Engineering, Germany

(5)

13:30 -

14:30 Lunch 14:30 -

15:00

TeleTrusT Award Presentation

Bordeaux Room

Open Identity Summit (parallel conference)

Provence Room Keynote: Through the signature validation: from the policy to the end user report (14:30 – 15:30)

Robert Bielecki, Arhs Spikeseed, Luxembourg, Luxembourg

Authentication

Arno Fiedler, CEO, Nimbus Technology Consulting, Germany

Bordeaux Room

CISO inside, Management of Privacy and Data Protection?

Burgand I Room

Biometrics and Identity Management

Walter Fumy, Chief Scientist, Bundesdruckerei, Germany

Burgand II Room

15:00- 16:00

Architectural Elements of a Multidimensional Authentication B

Libor Neumann, ADUCID Senior Consultant, ANECT a.s., Czech Republic

Security Awareness Do It Your Self workshop - How to create an in house campaign with no budget Part 1

Klaus Schimmer and Julia Langlouis, Directors Global Security Awareness, Training & Communication, SAP SE, Germany

Addressing threats to real-world identity management systems B

Chris Mitchell, Professor of Computer Science, Royal Holloway, University of London, UK

Bring Your Own Device For Authentication (BYOD4A) B

Markus Hertlein, Software-Engineer, Institute for Internet-Security, Germany; Pascal Manaras, Software-Engineer, Institute for Internet-Security, Germany

Security Awareness Do It Your Self workshop - How to create an in house campaign with no budget Part 2

Klaus Schimmer and Julia Langlouis, Directors Global Security Awareness, Training & Communication, SAP SE, Germany

Biometric recognition in Smart Borders Marc Sel, Director, PricewaterhouseCoopers, Belgium

OID 2015 Closing Plenary (15:30 – 16:15) 16:00 - 16:30 Coffee Break 16:30 - 17:00 Closing Plenary

Bart Preneel, Professor, KU Leuven, Belgium

Bordeaux Room

E = End User Session S = Vendor Session

Additional articles (without presentation on conference) available in conference Book (B):

 Changing the security mode of operation in a global organization with 20.000+ technical staff B Eberhard von Faber, T-Systems, Germany

 Doubtless identification and privacy preserving of user in cloud systems B

Figure

Updating...

References

Related subjects :