Day 1 (November 10)
09:00-10:15
Registration
Opening Morning Coffee 10:15 -
11:30
Welcome and Moderation
Norbert Pohlmann, Chairman/Director, TeleTrusT/if(is), Germany
Opening Keynotes
Requirements on new regulations and current changing needs from the view of the EDPS B Giovanni Buttarelli, The European Data Protection Supervisor, Belgium
Engaging Small Companies in Cyber Security Emma Philpott, CEO, The IASME Consortium Ltd, UK
Bordeaux Room
11:30
-12:00 Coffee Break 12:00
-12:30
Opening Sponsor Keynote, Moderation: Jon Shamah, Chair, EEMA, UK Compliance is More Than Just a "Documentation Effort"
Jim Hong, Group Technical Program Manager, Applications and Services Security, Adobe, USA
Bordeaux Room
Open Identity Summit (parallel conference)
Provence Room Keynote (12:00 - 13:00)
From UN/CEFACT’s work on legally significant trusted transboundary electronic interaction towards global trust services
Alexander Sazonov, National Certification Authority, Russia
12:30 -13:30
Opening Panel, Moderation: Malte Kahrs, CEO, MTRIX, Germany
Future Ecosystems for Secure Authentification and Identification: FIDO, TPM and more B Tord Fransson, VP Sales EMEA, Yubico, Sweden
Kim Nguyen, Managing Director, D-Trust, Germany Sandro Gianella, Google Germany, Germany
Bernd Kowalski, Federal Office for Information Security (BSI), Germany
Michael Kranawetter, National Security Officer Germany, Head of Information Security, Microsoft, Germany
Bordeaux Room
Mobile eID
Provence Room
SSEDIC.2020 on Mobile eID (13:00 - 13:30) Michael Kubach, Heiko Roßnagel, Fraunhofer Institute for Industrial Engineering, Germany, Herbert Leithold, A-SIT, Austria, , Christian H. Schunck and Maurizio Talamo University of Rome, Italy
13:30 - 14:20 Lunch
14.20 –
14.50 Sponsor Keynote, Moderation: Rick chandler, Treasurer, EEMA, UK
Embracing and protecting consumers and citizens through B2C as a Service
Kim Cameron, Architect of Identity, Microsoft Corporation
Bordeaux Room
Lunch
Open Identity Summit (parallel conference)
Authentication
Provence Room Cloud Security
Erik R. Van Zuuren, TrustCore.EU, Board Member / Vice-Chairman, EEMA, Belgium
Bordeaux Room
Industrial Security
Wolfgang Schneider, Senior Adviser, Fraunhofer Institute for Secure Information Technology - SIT, Germany
Burgand I Room
Encrypted Communication
Ammar Alkassar, Board Member/Chairman, TeleTrusT/Sirrix AG, Germany
Burgand II Room
Proxied Authentication in Single Sign-On setups with Common Open Source Systems (14:30 – 15:00)
Florian Holzschuher and Rene Peinl, University of Applied Science Hof, Germany
14:50 - 16:20
On location-determined cloud management for legally compliant outsourcing B
Bernhard Doll, Research Assistant, University of Passau, Germany
Industry 4.0 - Challenges in anti-counterfeiting B
Christoph Thiel, Professor, FH Bielefeld - University of Applied Sciences, Germany; Christian Thiel, Professor, Institute for Information and Process Management at the University of Applied Sciences in St. Gallen, Switzerland
The Public Key Muddle - how to manage transparent end-to-end encryption in organizations B
Gunnar Jacobson, CEO, Secardeo GmbH, Germany
Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite (15:00 – 15:30)
Vladislav Mladenov, Christian Mainka and Joerg Schwenk, Ruhr University Bochum, Germany
Cloud Deployments: Is this the end of n-tier architectures? B
David Frith, Principal Security Consultant, Info-Assure Ltd, UK
Industrial Control System (ICS) security risk management E
Franky Thrasher, Information Systems Security Officer, GDF-Suez, Belgium"
Encryption for Everyone! Overcoming Obstacles of Public Key Encryption B Mechthild Stöwer, Head of Department Security Management, Fraunhofer Institute for Secure Information Technology - SIT, Germany
Innovative Building Blocks for Versatile Authentication (15:30 – 16:00)
Deltef Hühnlein, Max Tuengerthal, Tobias Wich, Tina Hühnlein and Benedikt Biallowons, ecsec GmbH, Germany
Secure Partitioning of application Logic In a Trustworthy Cloud (SPLITCloud) B
Michael Gröne, Senior Project Manager and Consultant, Sirrix AG security technologies, Germany
Monitoring Critical Infrastructure Traffic on Fresh Networks
Nathan Bates, Lead Security Engineer, Adobe Systems, Inc., USA
Securing enterprise communication on both sides of the firewall with state-of-the-art end-to-end encryption B
Burkhard Wiegel, CEO, Zertificon Solutions GmbH, Germany
16:20 - 16:45
Coffee Break Open Identity Summit
(parallel conference)
Cloud and Data Management
Provence Room
eID and Trust Services
Marc Sel, Director, PricewaterhouseCoopers, Belgium
Bordeaux Room
Cybersecurity and Cybercrime
Michael Hartmann, Security Expert, SAP, Germany
Burgand I Room
Internet of Things
Franky Thrasher, Information Systems Security Officer, GDF SUEZ Energy Europe, Begium
Burgand II Room Towards a Secure cloud usage for Financial IT (16:30 – 17:00)
Marcus Hilbrich, Ronald Petrilic,
University of Paderborn, Germany and Steffen Becker, TU Chemnitz, Germany
16:45 - 18:15
Summary and conclusions of the IAS² study to support the implementation of a pan-European framework on electronic identification & trust services for electronic transactions in the EU internal market B
Olivier Delos, Managing Partner, SEALED, Belgium
Qualified certificates for electronic seals and for website authentication: Just two sides of the same (gold) medal?
Enrico Entschew, Senior Business Developer, Bundesdruckerei GmbH, Germany
Arno Fiedler, CEO, Nimbus Technology Consulting, Germany
Identity use cases and conundrums in an IoT world
Philip Hoyer, Director Strategic Innovation, HID Global, UK
Using Proxy Re-Encryption for Secure Data Management in an Ambient Assisted Living Application (17:00 – 17:30)
Hannes Zach, Philip Peinsold, Jakob Hatzl, exthex GmbH, Austria, Johannes Winter and Peter Danner, TU Graz, IAIK, Austria Signature Validation - A Dark Art? B
Peter Lipp, Ass. Prof., Graz University of Technology, Austria
How the God Particle will Help You Securing Your Assets B
Thomas Punz, Manager, Itecor, Switzerland; Roger Bollhalder, Lecturer, Fernfachhochschule Schweiz (FFHS), Switzerland
Scalable security for IOT
Geert-Jan Schrijen, CTO, Intrinsic-ID, The Netherlands
Topology of Dynamic Metadata Exchange via a Trusted Third Party (17:30 – 18:00)
Daniela Pöhn, Leibniz Computing Center, Germany
PixInk: A novel way to deliver Strong
WYSIWYS functionality using advanced image processing techniques.
Guillaume Forget, Senior Vice President, Cryptomathic, Germany
The Evolution of Cybersecurity: Continuous Active Threat Protection S
Craig Bird, Senior Solutions Engineer, eSentire, UK
Trust Evidence for IoT: Trust Establishment from Servers to Sensors B
David Ott, Research Director, Intel, USA
18:15 - 20:00
18:45
19:05
Drinks/Networking Reception with
Dinner Speech: Building Security, Protection and Trust within Society and the Economy
Klaus Vitt, Federal Government Commissioner for Information Technology and State Secretary at the Federal Ministry of the Interior, Germany SkIDentity Award Ceremony – Landmark in the Land of Ideas
Day 2 (November 11)
10:00 -11:00
Opening Panel, Moderation: Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor (EDPS), Belgium B Approaches to engineering privacy into the Internet: The Internet Privacy Engineering Network (IPEN) and other initiatives Jaap-Henk Hoepman, Scientific Director Privacy & Identity Lab, Radboud University Nijmegen, The Netherlands
Henri Kujala, Head of HERE Privacy Office, HERE, Finnland
Florian Stahl, Lead Consultant Information Security, msg systems ag, Germany Stefan Schiffner, Expert in Network & Infomation Security, ENISA, Germany
Bordeaux Room
11:00 - 11:30
1001 Vulnerabilities: removing the breeding ground for cyber threats S
Alexander Koderman, Verinice, TEAM Lead, SerNet, Germany
Bordeaux Room
Challenges to Stay Secure in the Era of Digital Business S
Kasper Lindgaard, Director of Research and Security, Secunia, Finland
Burgand I Room
Cybersecurity and Cybercrime
Michael Hartmann, Security Expert, SAP, Germany
Burgand II Room
Open Identity Summit (parallel conference)
Open Source
Provence Room
Proximity-Based Access Control (PBAC) using Model-Driven Security B
Rudolf Schreiner, CTO, ObjectSecurity, Germany
Quality Management in Open Source Projects - Experiences form the Open eCard Project Daniel Nemmert, Hans-Martin Haase, Detlef Hühnlein and Tobias Wich, ecsec GmbH, Germany
11:30 -
12:00 Coffee Break
Trust Services
Enrico Entschew, Senior Business Developer, Bundesdruckerei GmbH, Germany
Bordeaux Room
Regulation and Policies
Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor (EDPS), Belgium B
Burgand I Room
BYOD and Mobile Security
Patrick Michaelis, Principal, AC – The Auditing Company, Germany
Burgand II Room
Open Identity Summit (parallel conference)
Identity Management
Provence Room
12:00 - 13:30
Comparative study of Trust Models B Marc Sel, Director, PricewaterhouseCoopers, Belgium
Information Security Standards in Critical Infrastructure Protection B
Alessandro Guarino, CEO, StudioAG, Italy
Microsegmentation: Balancing speed of delivery, reduced complexity and security Philipp von Wallenberg, EMEA SDDC Network Virtualization & Security Architect, VMware EMEA
Economic issues of federated identity management – An estimation of the costs of identity lifecycle management in inter-organizational information exchange using transaction cost theory
Sebastian Kurowski, Fraunhofer Institute for Industrial Engineering, Germany
A reference model for a trusted service guaranteeing web-content B
Mihai Togan, Security software architect, certSIGN, Romania
Beyond cloud and big data: data protection tensions in recent software development trends B
Maarten Truyens, Legal researcher, University of Antwerp, Belgium
The Privacy Cockpit for Smartphones - Configuration of Data Secrecy made easy Jörn-Marc Schmidt, Senior Consultant, secunet Security Networks AG, Germany
Evaluating complex Identity Management systems- The FutureID approach Rachelle Sellung and Heiko Roßnagel, Fraunhofer Institute for Industrial Engineering, Germany
13:30 -
14:30 Lunch 14:30 -
15:00
TeleTrusT Award Presentation
Bordeaux Room
Open Identity Summit (parallel conference)
Provence Room Keynote: Through the signature validation: from the policy to the end user report (14:30 – 15:30)
Robert Bielecki, Arhs Spikeseed, Luxembourg, Luxembourg
Authentication
Arno Fiedler, CEO, Nimbus Technology Consulting, Germany
Bordeaux Room
CISO inside, Management of Privacy and Data Protection?
Burgand I Room
Biometrics and Identity Management
Walter Fumy, Chief Scientist, Bundesdruckerei, Germany
Burgand II Room
15:00- 16:00
Architectural Elements of a Multidimensional Authentication B
Libor Neumann, ADUCID Senior Consultant, ANECT a.s., Czech Republic
Security Awareness Do It Your Self workshop - How to create an in house campaign with no budget Part 1
Klaus Schimmer and Julia Langlouis, Directors Global Security Awareness, Training & Communication, SAP SE, Germany
Addressing threats to real-world identity management systems B
Chris Mitchell, Professor of Computer Science, Royal Holloway, University of London, UK
Bring Your Own Device For Authentication (BYOD4A) B
Markus Hertlein, Software-Engineer, Institute for Internet-Security, Germany; Pascal Manaras, Software-Engineer, Institute for Internet-Security, Germany
Security Awareness Do It Your Self workshop - How to create an in house campaign with no budget Part 2
Klaus Schimmer and Julia Langlouis, Directors Global Security Awareness, Training & Communication, SAP SE, Germany
Biometric recognition in Smart Borders Marc Sel, Director, PricewaterhouseCoopers, Belgium
OID 2015 Closing Plenary (15:30 – 16:15) 16:00 - 16:30 Coffee Break 16:30 - 17:00 Closing Plenary
Bart Preneel, Professor, KU Leuven, Belgium
Bordeaux Room
E = End User Session S = Vendor Session
Additional articles (without presentation on conference) available in conference Book (B):
Changing the security mode of operation in a global organization with 20.000+ technical staff B Eberhard von Faber, T-Systems, Germany
Doubtless identification and privacy preserving of user in cloud systems B