Seminars @


Identity Management

6 July 2023

The Westin Grand Frankfurt

Seminars @ IDM DACH

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Securing your supply chain: How do you protect what you don’t control?


Frank Schmaering, Senior Solutions Engineer, Saviynt GmbH

Have you ever tried to map out your family tree and in doing so, discovered relatives that you never knew you had and know nothing about?

Supply chains are like that. The problem is that while you may have sight of your nearest relatives, if you look further out to the relatives of your relatives, things start to get a bit hazy. And that is where the risk lies.

In recent years Okta, Toyota and Morgan Stanley have all suffered data breaches that originated with an attack on the supply chain.

In this presentation, we explore the complex nature of supply chains/digital ecosystems and all the parties involved (psst… there may be many more variants than you think!).  We’ll look at the pattern of some recent third-party attacks, examine their root cause and what lessons we can learn.

Finally, we’ll explore the critical capabilities that are needed as the foundation for a solid third-party strategy; one that provides active, continuous monitoring while reducing the overhead for compliance, including the obligations of the upcoming EU NIS2 regulations.

  • Explore the nature of supply chains and what makes them susceptible to attack.
  • Review the forensics of some recent third-party data breaches.
  • Propose a strategy to get clean, stay clean and optimise your third-party risk exposure.
Frank Schmaering
Senior Solutions Engineer, Saviynt GmbH
view profile
Room / Location:
Main Conference Room

How the evolving attack surface weakens the effectiveness of your security posture


Reto Bachmann, Technical Regional Manager Austria, Switzerland and Middle East, One Identity

Enterprise attack surfaces continue to evolve through cloud-based infrastructure, the proliferation of connected devices, and reliance on third-party vendors. New vulnerabilities that cybercriminals are exploiting are widespread. Identity is the critical security perimeter, and maintaining best practices for a robust IAM strategy using multiple security tools has never been more challenging.

In this session you will learn how to reduce human error, avoid gaps and overlaps of your different IAM tools, and leverage your IAM tools to implement a next-generation, secure platform.

Reto Bachmann
Technical Regional Manager Austria, Switzerland and Middle East, One Identity
view profile
Room / Location:
Ballsaal 3

IAM Managed Services and Business Process Outsourcing as Part of a Security Strategy


Dr. Heiko Klarl, Chief Marketing and Sales Officer, iC Consult

Digital Identities are the core of every Zero Trust strategy. Managed Services and BPO for IAM are an efficient approach to implement this strategy with consistent levels of security within the enterprise. Central governance, a high grade of automation and the flexibility to support DevOps and agile teams are not a contradiction when implemented in a smart way.

Learn about:
– The role of Managed Services in Zero Trust
– How to benefit from Business Process Outsourcing for IAM
– How this supports a Zero Trust Strategy at a global scale

Dr. Heiko Klarl
Chief Marketing and Sales Officer, iC Consult
view profile
Room / Location:
Munchen Room

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...
Uniting large-scale, complex businesses with PowerSyncPro
Blog by: PowerSyncPro Mergers and acquisitions involving tens – or even hundreds – of thousands of users require complex tenant-to-tenant migrations. Traditionally, those migrations have been fraught with problems. Problems that impact your people, your productivity and your profit. Combining solid preparation with the right software solution can dramatically reduce the pain involved. Enter PowerSyncPro:...