OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cloudauthz message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cloudauthz] CloudAuthZ Speaker Request for the European Identity Conference in Munich


Jane can do a coin flip. :)

On 02/15/2013 06:36 PM, John Bradley wrote:
I will also be at EIC.

On 2013-02-15, at 5:24 PM, "Barbir, Abbie" <abbie.barbir@bankofamerica.com> wrote:

Hi
Most probably I will be at the conference and can participate if No one else want to
 
regards
 
From: cloudauthz@lists.oasis-open.org [mailto:cloudauthz@lists.oasis-open.org] On Behalf Of Jane Harnad
Sent: Friday, February 15, 2013 1:30 PM
To: cloudauthz@lists.oasis-open.org
Subject: [cloudauthz] CloudAuthZ Speaker Request for the European Identity Conference in Munich
 
 
Dear CloudAuthZ TC Members,
 
Kuppinger Cole, the organizers of the European Identity & Cloud Conference in Munich (http://www.id-conf.com/eic2013), accepted two OASIS panel sessions for this year’s program.  We would like to include a speaker from the CloudAuthZ TC on one of our panels.   The panel will take place on May 16th from 3:00-4:00 PM.  A brief overview of that panel session is outlined below.  Please let us know by 25 February, if anyone from the TC is interested.  Thank you so much, Jane
    

OASIS Panel: Leveraging Standards to Combat Threats in Mobile Environments
May 16th from 3:00-4:00 PM

Industry experts will come to the table to discuss the significant security, privacy and operations issues within mobile environments, approaches to addressing these issues, and the ways in which standards efforts can contribute to the solutions. Each speaker, an expert in a critical aspect of mobile, will weigh-in with opinions on topics including: 

  • threats and other security operational issues for mobile;
  • privacy concerns and solutions, and their implications specific to the mobile world;
  • cryptographic, key-management issues and solutions, and their implications specific to the mobile world;  
  • enterprise and personal security concerns and solutions (including things like BYOD, green/red zones on mobile device, virtual desktop for mobile, etc).

 This panel will spark an interactive dialogue with the audience.  Questions that will be addressed during the session include:  1) Is there really a reason for mobile users to care about privacy and security? 2) Shouldn’t enterprises just prevent user-owned devices from connecting into their network?  3) Aren’t the security problems in mobile devices really the fault of the manufacturers / OS designers?  4) Crypto is pretty much missing on mobile devices; why should anyone want it? 5) How can security and privacy be provided while preserving the user experience that’s at the heart of mobile? 6) Isn’t identity for mobile really something for the cloud to provide (e.g., Facebook login), not an issue for the mobile device?  This session promises to be lively, so you don’t want to miss it.

 
 
Jane Harnad
OASIS
Manager of Events
 
 
 


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]