61 | Collision Course: Ethics vs Human-Centered Design in the New Perimeter | Session | Identiverse | Las Vegas | 31-May-2023 | |
60 | The Design of Trustworthy Things | Keynote | Identiverse | Denver | 23-Jun-2022 | |
59 | Best Practices For Driving Amazing Customer Journeys in a Secure World | Session | Temenos SCALE 2021 | Virtual | 17-Nov-2021 | |
58 | Trust Is Not A Bad Word | Session | Identiverse | Denver | 23-Jun-2021 | |
57 | MindFul Authentication: Mo’ Factors, No Mo’ Problems? | Panel | Identiverse | Denver | 22-Jun-2021 | |
56 | Mission Impossible: Identity Mythos | Session | Identiverse | Virtual | 26-Jun-2020 | |
55 | So You Think You Can Two Factor | Session | Identity Week Asia | Singapore | 9-Oct-2019 | |
54 | So You Think You Can Two Factor | Session | Identiverse | Washington, DC | 27-Jun-2019 | |
53 | So You Think You Can Two Factor | Session | European Identity & Cloud Conference | Munich | 16-May-2019 | |
52 | Master Class: IAM at the Center of the Security Equation | Master Class | Know Conference | Las Vegas | 26-Mar-2019 | |
51 | Hu: The Missing Element | Session | Identiverse | Boston | 25-Jun-2018 | |
50 | The Missing Element | Session | European Identity & Cloud Conference | Munich | 16-May-2018 | |
49 | Achieve Balance between Security, Usability and Privacy with Invisible Identity | Session | Japan Identity & Cloud Summit 2017 | Tokyo | 15-Sep-2017 | |
48 | Stranger in a Strange Land | Session | Cloud Identity Summit | Chicago | 20-Jun-2017 | |
47 | At the Intersection of Security, Innovation and Privacy: Invisible Identity | Session | European Identity & Cloud Conference | Munich | 11-May-2017 | |
46 | Invisible Identity, or How to Delight People & Secure Users | Session | Cloud Identity Summit | New Orleans | 6-Jun-2016 | |
45 | IDaaS Needs Another ‘S’ for ‘Security’ | Session | European Identity & Cloud Conference | Munich | 12-May-2016 | |
44 | Security Challenges in a SaaS-First Era & Why Identity Matters | Webinar | ISC2 Webinar Series | Virtual | 10-Dec-2015 | |
43 | Putting Security in Identity-as-a-Service | Session | CA World | Las Vegas | 18-Nov-2015 | |
42 | #FAIL No More: The Rise of the Self Defending Enterprise | Session | Cloud Identity Summit | San Diego | 8-Jun-2015 | |
41 | What If the Future of Security Means Not Knowing It’s There? | Session | European Identity & Cloud Conference | Munich | 7-May-2015 | |
40 | #FAIL No More: From Chief Security Officer to Chief Security Bot | Session | Defrag Conference | Broomfield | 18-Nov-2014 | |
39 | Identity Management Is A People Problem (But It Shouldn’t Be!) | Session | Cloud Identity Summit | Monterey | 21-Jul-2014 | |
38 | Beyond Attributes: How Identity Provides Contextual Intelligence To Our Digital World | Session | Defrag Conference | Broomfield | 5-Nov-2013 | |
37 | IDaaS. The Now Big Thing | Session | Cloud Identity Summit | Napa | 11-Jul-2013 | |
36 | The Hitchhikers Guide to Identity: Is Identity the Answer to the Great Question of Life, the Universe, and Everything | Master Class | Cloud Identity Summit | Napa | 8-Jul-2013 | |
35 | The IDaaS Powered World, or: How I Learned to Stop Worrying and Love IAM (Again) | Session | Defrag Conference | Broomfield | 15-Nov-2012 | |
34 | Ask not what Identity can do for the Cloud, Ask what the Cloud can do for Identity | Session | Cloud Identity Summit | Vail | 18-Jul-2012 | |
33 | 2012 Top Security Threats | Webinar | Ping Identity Virtual Forum | Virtual | 15-Mar-2012 | |
32 | Reducing your IDM Operating Costs Using IDaaS | Webinar | IDC Webinar | Virtual | 14-Feb-2012 | |
31 | And Now For Something Completely Different: Identity Provisioning & The Cloud | Session | Cloud Identity Summit – Local Edition | New York City | 24-Oct-2011 | |
30 | And Now For Something Completely Different: Identity Provisioning & The Cloud | Session | Cloud Identity Summit | Keystone | 20-May-2011 | |
29 | Identity and Access in the Cloud | Panel | European Identity Conference | Munich | 12-May-2011 | |
28 | When Trust is not Enough | Keynote | European Identity Conference | Munich | 11-May-2011 | |
27 | Federation: Lessons Learned | Panel | European Identity Conference | Munich | 11-May-2011 | |
26 | An Entitlement-Centric Approach to Security | Session | CSO Summit | New York City | 30-Mar-2011 | |
25 | Identity Intelligence to Drive Business Objectives | Session | Gartner Identity and Access Management Summit | London | 10-Mar-2011 | |
24 | Identity and Access Management – Evolution or Revolution? | Panel | Gartner Identity and Access Management Summit | London | 9-Mar-2011 | |
23 | 2011: Information Security Trends for the Next Decade | Panel | Oracle Security Online Forum | Virtual | 24-Feb-2011 | |
22 | Oracle and FICAM – Leveraging Smart Cards for Access Control and Information Protection | Session | 4th Annual Federal Forum 2010 | Washington, DC | 20-Oct-2010 | |
21 | Oracle Identity Management 11g: A Giant Leap in Identity Management | Session | Oracle Security Inside Out Summit | New York City | 13-Oct-2010 | |
20 | Building a Strong Foundation for Your Cloud with Identity Management | Session | Oracle OpenWorld | San Francisco | 22-Sep-2010 | |
19 | Beyond SPML: Access Provisioning in a Services World | Session | Burton Catalyst | San Diego | 28-Jul-2010 | |
18 | Federated Provisioning and the Cloud | Session | Glue Conference | Denver | 27-May-2010 | |
17 | The Next Step of User Provisioning: Identity GRC as a Natural Evolution | Panel | European Identity Conference | Munich | 5-May-2010 | |
16 | Why Web Security Standards Must Form the Basis for Cloud Security and What the Identity Industry Should do to Make this Happen | Panel | European Identity Conference | Munich | 5-May-2010 | |
15 | Securing the Cloud with Identity Management and Service Oriented Security | Session | Network World’s Security Inside Out Summit | Houston | 3-Feb-2010 | |
14 | Securing the Cloud with Identity Management and Service Oriented Security | Session | Network World’s Security Inside Out Summit | Jersey City | 19-Jan-2010 | |
13 | Identity Management and the Cloud: Stormy Days Ahead? | Session | Oracle OpenWorld | San Francisco | 12-Oct-2009 | |
12 | Identity Services and the Cloud: What Every Enterprise Should Know | Webinar | Kuppinger Cole Webinar | Virtual | 21-Sep-2009 | |
11 | Cost-Effective Security and Compliance | Session | Network World’s Security Inside Out Summit | New York City | 19-Aug-2009 | |
10 | Identity Services Roundtable: Aligning Vendor Strategies with Customer Needs | Panel | Burton Catalyst | Prague | 23-Oct-2008 | |
9 | Building an Identity Services Layer with Oracle Identity Management | Session | Oracle OpenWorld | San Francisco | 24-Sep-2008 | |
8 | Lessons learned from Successful Compliance Deployments | Panel | Digital ID World | Los Angeles | 10-Sep-2008 | |
7 | Identity: The Ultimate Solution to SOA Security | Panel | InfoWorld SOA Executive Forum | New York City | 8-Nov-2007 | |
6 | Rationalize, Centralize, Externalize: Detailing Identity Management in Oracle Fusion Architecture | Session | Oracle OpenWorld | San Francisco | 12-Nov-2007 | |
5 | Externalizing Identity | Session | Digital ID World | San Francisco | 25-Sep-2007 | |
4 | Understanding Identity As A Service | Session | Jericho Forum | New York City | 11-Sep-2007 | |
3 | Developing an Identity Layer for the Secure Enterprise | Session | Collaborate Conference | Las Vegas | 18-Apr-2007 | |
2 | The Oracle Identity Services Container: Identity-Enabled Applications Made Easy | Session | Oracle OpenWorld | San Francisco | 26-Oct-2006 | |
1 | Role Management and Provisioning: Creating Economies of Scale in Identity Management | Session | Oracle OpenWorld | San Francisco | 25-Oct-2006 | |