Cloud Identity Summit Preview – Monterey

Screen Shot 2014-07-16 at 10.54.33 AMLooks like an exciting agenda for the Cloud Identity Summit in Monterey (same week as the California Rodeo so great week to be in Monterey).  The culture at this event, which Andre Durand, has done a lot of work to foster has really broken down traditional barriers and allowed identity wonks and business owners to share and learn from each other.  This is one of the reasons that this event is one of the best in the industry to attend. And, it is in Monterey.

Here are the top 5 sessions I have on my list to attend (by time not priority).  On Friday, I will be posting a beer drinker’s guide to the Cloud Identity Summit.  There are some great micro-breweries in Monterey that you may just want to check-out.

Monday, July 21

12:30-12:55 (DeAnza ||)

Spinning New Threads with Existing Identity Systems, Mike Neuenschwander, 

A comparison of use cases for identity in cloud and enterprise deployments, with ideas on how to intertwine enterprise and cloud identity systems in the emerging cloud fabric.

1:30-2:00 (DeAnza II)

Network-Aware IAM, David Frampton, Cisco Systems 

How to position the network as a real-time source of critical security data; get more out of existing IT platforms by serving a wider set of use-cases, especially for mobility and BYOD environments; and translate heterogeneous IT platform capabilities into actionable network access policy

4:20 pm – 4:45 pm

Zen and the Art of Cloud Adoption— a Practitioner’s Viewpoint on Finding Balance, Laura E. Hunter, Microsoft

Real-life tales from the trenches about how Microsoft IT is working to strike the right balance between enterprise requirements for security, privacy, control, and compliance, and creating a great experience for their users and customers who want to stay connected and productive no matter where they are or what device they’re using

Tuesday, July 22

11:00 am – 11:30 am

User-Managed Access, Allan Foster, Forgerock, Eve Maler, Forgerock

Examination of UMA (User Managed Access) as an emerging standard, presenting both individual and enterprise use cases and showing how UMA could address many of them in an open, lightweight approachable way, while still allowing and interoperating with other technologies

1:40 pm – 2:05 pm

Identity Management for the Cloud, Jim Scharf, Amazon

What’s different in providing identity and access management for one of the largest cloud providers, some of the key technology and design decisions made along the way, and how AWS is working to make it even easier to federate with existing social and enterprise identity providers

2:40 pm – 3:10 pm

Identity in OpenStack Icehouse, David Waite, Ping Identity

Overview of the OpenStack project, in particular the Keystone subproject responsible for identity, how to leverage the features in the newest OpenStack release for your own usage for tying into external identity systems, and some of the potential directions that OpenStack could take in the future

 

 

 

 

 

 

Advertisements
This entry was posted in Uncategorized and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s