line shadow
×

SOCIAL


LATEST BLOGS


Zero Trust user verification using SIM-based authentication


Costs of Living Delays the UK Enterprise Strategy


LATEST TWEETS

OUR IDENTITY AND ACCESS MANAGEMENT CONFERENCES ARE DESIGNED TO ATTRACT THE LEADING IAM ENTERPRISE EXPERTS AND BUSINESSES TO CREATE AN ENVIRONMENT…

…In which our guest speakers, delegates, and industry partners share new ideas, take of previous successes, learn from past mistakes, and identify new and emerging trends across the IAM ecosystem.

Identity Management Conferences

Whitehall Media’s Identity and Access Management series of events is rightly regarded as Europe’s premier free to attend conference and exhibition, which consistently brings together the leading actors, thinkers, and organisations within the IAM community.

We do not limit ourselves to a particular industry or sector but instead focus on creating as big a tent as possible to ensure that we not only nurture the IAM community but help it to grow.

From everyday brands familiar to us all, businesses with a global footprint, to solution providers with a reputation for delivering for their customers, your identity and access management concerns and queries will be addressed no matter your level of expertise or area of interest.

At a Glance

  • Learn why Whitehall Media is Europe’s leading IAM conference provider
  • Learn how to become a better IAM leader
  • Discover the latest IAM tools and techniques
  • Understand how you can implement IAM solutions within your business
  • Advance your understanding of what organisations IAM needs are
  • Get to know your customers better and drive revenue by becoming a trustworthy IAM driven business

Forth coming Identity Management Conferences

IDM DACH uk

VIRTUALCONFEX
19 May 2021

IDM

VIRTUALCONFEX
15 June 2021

IDM europe

Van Der Walk Hotel, Utrecht
14 September 2021

IDM europe

Business Design Centre, London
9 November 2021

Why Attend the Identity Management Conferences

Network

It is only at our Identity and Access Management series of conferences that you will be able to immerse yourself within an expertly mapped out environment which has been designed with you in mind. Within a well though-out, intimate but spacious setting you will have the opportunity to connect with like-minded individuals, hear from industry-leading IAM experts, and engage 1-1 with the leading IAM solution providers.

Debate

From the conference hall, exclusive breakout sessions, or the dedicated exhibition space, the opportunities to network with your fellow peers, connect 1-1 with our guest speakers and have your questions answered directly during one of the breakout sessions, you can be sure to have the time, space, and freedom to decide your level of engagement.

Innovate

Our Identity and Access Management conferences are all about ensuring that we are as up to date as possible with the latest innovations in IAM tools, techniques, and technologies. Ultimately, the aim is to help businesses connect, practitioners to progress, and contributors to educate.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Zero Trust user verification using SIM-based authentication

Zero Trust is increasingly being adopted as the best strategy for access management and fraud prevention. To help achieve progress...

read article
Frequently asked questions about IGAmore application.

Blog By: Appmore   What is IGAmore? IGAmore is the ServiceNow IGA solution built to answer all needs for state-of-the-art...

read article
How To Use MFA To Achieve Regulatory Compliance

By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading...

read article
Modern IGA means Simple, Scalable, Agile

By Rod Simmons | Omada Next week, we’ll be at IDM DACH, speaking with attendees about what modern Identity Governance...

read article
Traditional Two-Factor Authentication vs. Beyond Identity’s Passwordless Authentication

Traditional Two-Factor or Multi-Factor Authentication (2FA/MFA) remains the “default” for dealing with fundamentally insecure, password-based authentication methods. We understand why...

read article
Authentication v Authorisation

Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms...

read article