What: Cloud Identity Summit
When: July 18-21, 2011
Where: Keystone Convention Center, Keystone, Colorado
More Info: http://www.cloudidentitysummit.com/
Cloud and mobile adoption is accelerating. What is your strategy to own, control and secure your users and your company beyond the enterprise and in the cloud? The 2nd Annual Cloud Identity Summit is the premier cloud identity security event where members of the identity, security and cloud community gather to learn from experts around the industry.
This year’s event, sponsored by Ping Identity, Microsoft and Google will be hosted at the Keystone Convention Center in Keystone Colorado.
Topics for Cloud Identity Summit 2011
Mobile Cloud Identity
Mobile is emerging as a full-fledged IT citizen.
- How can we ensure we have it connected to the enterprise at the right level of security, control and audit?
- How can we leverage mobile identity to become the basis for user experience and interaction with cloud-based services? Especially payments and e-commerce
- How do we deal with identity problems on installed apps like iPhone, Droids, Windows 7 devices?
Jurisdiction in the Cloud
Who controls what you do in the cloud? Could this issue become painful enough to push XACML directly into the spotlight?
Managing Cloud Applications at Scale
What will we do when there is an app for everything that every person in every job role does on a day-to-day basis?
Connecting Islands of Applications
Are various developer platforms (e.g. Apple app store, PayPal payment platform, eBay shopping platform, Salesforce, Google apps etc.) creating islands of disconnected systems? How can we connect them utilizing common notions of identity? We can handle it if there are two or three, but what if we have 30, 50, 100?
Preparing for Federated Consumer ID’s
How do we account-link Consumer IDs with Claims Brokers? Do they relate, support or conflict?
Enabling Cloud & SaaS Provisioning
We need a standard mechanism or API’s in order to scale provisioning between enterprise directories and cloud services. What are we doing about this?
Social Identity within the Enterprise
What happens when people want to use their social identities to interact with the enterprise?
Authorizing the Cloud
XACML as a standard policy syntax really only earns its pay if there is separation between the entity that writes the policy and the entity that interprets/enforces it. Are we heading in that direction?
Integrating the Supply Chain
What if an enterprise gets all its supply chain partners to deploy a cloud identity system? How will we allow the employees of those partners to login to a web-app run by the enterprise including information about the group membership of those employees?
If an enterprise has a customer facing website, how can it allow those customers to login with their existing identity from a consumer cloud provider like GMail, YahooMail, Hotmail, Facebook, etc.
Chaining together Identities
If an enterprise has connected its on-premise identity system with a cloud service, how can that cloud service in turn act as the IDP to other web-services that the enterprises employees need to log into?
Integrating with Cloud Directories
Once an enterprise has SSO working in the cloud, how do they make an LDAP type service available in the cloud?
Cloud API Services
How can an enterprise deploy IT systems on a mix of cloud IaaS/PaaS vendors and enable them to securely make API calls between those systems?
Social Media and the Enterprise
What does it mean for the enterprise to plug into Facebook, Twitter etc?
RESTful Identity & OAuth
What can I use OAuth for? What are the use-case studies and examples of how people are using this technology and what’s missing?