[The
following announcement is being sent on behalf of the organizers of the Cloud
Identity Summit.]
WHERE
CLOUD AND CREDIBILITY INTERSECT
=======================================
Like it or not, perimeter security is moving into the industry’s rearview
mirror; change is upon us with protocols proliferating and services living in
the cloud. As security evolves to meet the demands of the cloud, discover
at the Cloud Identity Summit 2010 just how identity is being used to unlock the
potential of a borderless world.
CLOUD
IDENTITY SUMMIT 2010
==========================================
The list of participants says it all: Google, Microsoft, Verisign, SafeNet,
PayPal, Cisco,
Salesforce, SuccessFactors, Intuit, Bechtel, Accenture, Cloud Security
Alliance, OASIS,
Red Hat and others. They are all working to make the cloud more secure, more
accessible
and more trusted through identity.
At CIS
2010 you can:
*
Accelerate your Cloud Strategy
* Strengthen awareness of what’s available
* Create roadmaps to a secure, identity-aware Cloud
* Improve understanding of the issues
* Connect with peers, identity visionaries and industry builders
Complete agenda: http://www.cloudidentitysummit.com
Special
OASIS Discount!
Register
for only $595.00 ($200 Off). Use “OASIS” during
registration.
PROGRAM
AGENDA
=================
Special Presentation on OASIS IDCloud from Anil Saldhana, Red
Hat
* Business Case for Extending Internal Identity Management to the Cloud
* Understanding the Emerging Cloud Identity Ecosystem
* Leveraging Identity to Secure the Cloud
* Standardizing Public & Private Cloud Integration
* Dissecting Cloud Identity Standards
* Privileged Access in the Cloud Best Practice
* Planning for Cloud-Based Identity Services
* Preparing for 3rd-Party Cloud Identity Providers
* Making Cloud Identity Provisioning a Reality
* Securing & Personalizing Mashups
* Enterprise Identity meets Consumer Identity
* Cloud Security Event Monitoring
UNCONFERENCES AND WORKSHOPS
===========================================
While the Summit’s speaker lineup is loaded with heavy hitters., there
are additional ways to get even further behind the curtain and deepen your
knowledge.
Kaliya Hamlin, a widely recognized expert in the field of user-centric identity
and unconferences, will facilitate attendee-devised breakout sessions on the
second day of the conference. The format has been a proven winner at 10
consecutive Internet Identity
Workshop's, an unconference Hamlin founded with Doc Searls and Phil Windley.
A major opportunity for attendees to dive into specific topic areas during the
first day of the Summit is weaved within four half-day workshops featuring
hands-on training by experts from Google, Cisco, Arctec, Axiomatics and
PingIdentity
Workshop 1:
Security
In The Cloud
Gunnar
Peterson, Arctec Group & Christofer Hoff, Cisco
Workshop 2:
Implementing
OpenID, OAuth & OAuth/WRAP for Consumer Identity
Chris
Messina & Joseph Smarr, Google
Workshop 3:
Implementing
SAML for Secure Single Sign-On
Ian
Barnett, PingIdentity Security Architect
Workshop 4:
The
Essential XACML Primer
Gerry
Gebel, Axiomatics
JOIN US
IN KEYSTONE COLORADO
=============================
The
Keystone Conference Center and Resort is one of the most popular destinations
in the Rocky Mountains for exclusive conferences. Experience all in one place
what the Summit and the Rocky Mountains have to offer.
MARK YOUR CALENDARS: JULY 20-22, 2010
=============================================================
For details, please visit http://www.cloudidentitysummit.com