I will be at the conference and can participate if no one else wants to
From: id-cloud@lists.oasis-open.org [mailto:id-cloud@lists.oasis-open.org]
On Behalf Of Jane Harnad
Sent: Friday, February 15, 2013 10:37 AM
To: id-cloud@lists.oasis-open.org
Subject: [id-cloud] IDCloud Speaker Request for the European Identity & Cloud Conference
Dear IDCloud TC Members,
Kuppinger Cole, the organizers of the European Identity & Cloud Conference in Munich (http://www.id-conf.com/eic2013), accepted two OASIS panel sessions for this year’s program. We would like
to include a speaker from the IDCloud TC on one of our panels. The panel will take place on May 16th from 3:00-4:00 PM. A brief overview of that panel session is outlined below. Please let us know by 25 February, if anyone
from the TC is interested. Thank you so much, Jane
OASIS Panel: Leveraging Standards to Combat Threats in Mobile Environments
May 16th from 3:00-4:00 PM
Industry experts will come to the table to discuss the significant security, privacy and operations issues within mobile environments, approaches to addressing these issues, and the ways in which standards
efforts can contribute to the solutions. Each speaker, an expert in a critical aspect of mobile, will weigh-in with opinions on topics including:
-
threats and other security operational issues for mobile;
-
privacy concerns and solutions, and their implications specific to the mobile world;
-
cryptographic, key-management issues and solutions, and their implications specific to the mobile world;
-
enterprise and personal security concerns and solutions (including things like BYOD, green/red zones on mobile device, virtual desktop for mobile, etc).
This panel will spark an interactive dialogue with the audience. Questions that will be addressed during the session include: 1) Is there really a reason for mobile users to care about privacy and security?
2) Shouldn’t enterprises just prevent user-owned devices from connecting into their network? 3) Aren’t the security problems in mobile devices really the fault of the manufacturers / OS designers? 4) Crypto is pretty much missing on mobile devices; why should
anyone want it? 5) How can security and privacy be provided while preserving the user experience that’s at the heart of mobile? 6) Isn’t identity for mobile really something for the cloud to provide (e.g., Facebook login), not an issue for the mobile device?
This session promises to be lively, so you don’t want to miss it.
Jane Harnad
OASIS
Manager of Events
jane.harnad@oasis-open.org
Follow us on:
LinkedIn: http://linkd.in/OASISopen
Twitter: http://twitter.com/OASISopen
Facebook: http://facebook.com/oasis.open