Programme @

IDM DACH

Identity Management

7 March 2024

Steigenberger Airport Hotel, Frankfurt

Programme @ IDM DACH

Morning Session

Building back better with a robust, reliable and flexible IAM strategy

  • Segregation of Duties And Beyond – Analyzing the Data Cube
  • Securing the future of digital identity
  • Multi-Factor Authentication
  • Rise above the noise: A vault solution alone is not enough
  • The EU Digital Wallet is coming. Here’s what it means for you, the government and private sector across borders
  • From Zero Trust to Identity Threat Detection and Response: Compromised and Clueless?
  • B2B Identity: How the companies of the HTI Group took digitalization to the next level with the help of Thales
  • Challenges to Migrate Identity Cloud Solutions to an Internal Cloud Platform
  • RWE moves to SaaS-based, AI-driven identity security in less than 6 months

08:00

Registration and Exhibition Opens

Delegates will collect their badge on arrival and refreshments will be served.

09:00

Session One

See individual speakers below for video links and slide decks

09:15

Conference Chair's Opening Address

Linda Strick
Director EMEA, Cloud Security Alliance
view profile

Linda Strick, Director EMEA, Cloud Security Alliance

09:25

Segregation of Duties And Beyond - Analyzing the Data Cube

Stefan Bosnjakovic
External IAM & GRC Architect, Glencore International AG
view profile

Stefan Bosnjakovic, External IAM & GRC Architect, Glencore International AG

So you finally got your SoD-framework working and now you are swamped with hundreds of thousands or even millions of SoD-violations. Where do you go from here and where should you start? In this discussion, Stefan will analyse the violations data cube, drill into the results, try to make sense of them, find the biggest drivers, and sketch out a sensible plan for remediation. He will also look at application roles, SoD rules, business taxonomies, entitlement mappings, and front, middle and back office separation and setting up remediation teams.

 

09:45

Rise above the noise: A vault solution alone is not enough

Mareike Mett
Channel Sales Engineer, Delinea
view profile
Mareike Mett, Channel Sales Engineer, Delinea

This session will explore:

– The current status of Identities/Privileges in today’s market.

– Assessing key attack vectors.

– How compliance and regulations affect the adoption of Privileged Access Management: How Delinea’s PAM solution can help meet the requirements of the EU NIS2 directive.

– A vault alone is not enough: How does modern PAM enforce security best practices and what role do Least Privilege and Just-in-Time Access Policies play?

10:00

Identities in Automotive: Challenges and Trends

Dr. Christian Prehofer
Director, Corporate R&D, DENSO AUTOMOTIVE Deutschland GmbH
view profile

Dr. Christian Prehofer, Director, Corporate R&D, DENSO AUTOMOTIVE Deutschland GmbH

This talk explores identities in vehicles: from supply chain to mobility services

  • Requirements for identity management in mobility
  • Example use cases: Charging & tracebility
  • Current approaches and trends

10:15

RWE moves to SaaS-based, AI-driven identity security in less than 6 months

Klaus Hild
Principal Identity Strategist, SailPoint
view profile

Klaus Hild, Principal Identity Strategist, SailPoint

After a decade of success with SailPoint, RWE migrated to the SailPoint SaaS solution for enterprise-wide identity governance at scale. The number of users increased tenfold, and standardised processes replaced manual onboarding. Using automation, AI and a sophisticated internal communication campaign, RWE reduced onboarding time from up to 25 days to less than three hours.

In this session you can have a look at RWE’s approach:
– Getting started with identity and access governance
– Scaling up with SaaS
– Saving time with automation
– Gaining visibility with AI

10:30

IGA Migration at GIZ – Transitioning from On-Premises to Cloud on a Service Layers Infrastructure

David Johnson
Lead Consultant, iC Consult
view profile
Axel Bujak
Product Owner IAM, GIZ
view profile
Veronika Dörffler
Associate Director Germany Central, iC Consult
view profile

David Johnson, Lead Consultant, iC Consult
Axel Bujak, Product Owner IAM, GIZ
Veronika Dörffler, Associate Director Germany Central, iC Consult

– Dealing with IAM migration from on-premises legacy IGA system to cloud in the public sector
– Migration best practice vs. reality
– Key considerations for migrations will be discussed and how the Service Layers infrastructure supports the cloud strategy
– The session will highlight potential challenges and pitfalls
– It provides insight into risk mitigation strategies
– It also provides guidance on prioritizing actions and advice on concrete first steps for successful implementation

10:45

Questions to the Panel of Speakers

11:00

Refreshment Break Served in the Exhibition Area

11:25

Welcome to Session Two

Linda Strick
Director EMEA, Cloud Security Alliance
view profile

Linda Strick, Director EMEA, Cloud Security Alliance

 

11:30

B2B Identity: How the companies of the HTI Group took digitalization to the next level with the help of Thales

Hannes Stockner
Head of Data Integration, HTI Services
view profile

Presented by Thales on behalf of Hannes Stockner, Head of Data Integration, HTI Services

The companies of the HTI Group combine innovative solutions and sustainable products in the fields of winter sports technology, urban mobility, material transport, snow and vegetation management, as well as renewable energies. As developers and manufacturers, the companies of HTI are drivers of innovation and are active worldwide. Their products and solutions need to perform reliably and safely in remote areas, often under extreme environments. Operational excellence is core to the value that they deliver to their business customers. Their customers operate in dynamic environments and experience surges in demand during peak seasons, making it crucial to have a resilient on-boarding/off-boarding process for business users to operate and manage their equipment safely and reliably. Join us in this session to learn how the HTI Group leveraged the Thales OneWelcome Identity Platform to build a more reliable experience for thousands of business customers and partners – helping their customers minimize downtime; protecting their revenue; and building more trust with their end consumers.

11:45

Spicing up Authorization - A Zanzibar Inspired Approach

Ilya Gubarev
Chief Digital Software Architect, Innomotics
view profile

Ilya Gubarev, Chief Digital Software Architect, Innomotics

As a global OEM of highly critical and complex industrial devices, managing access to hundreds of millions of IIoT device resources spread across customer sites all around the globe is already a challenging task.

Use cases for providing a digital service platform need to address end customers accessing devices owned by themselves as well as privileged access for in-house and third-party analytics applications and service personnel. A combination of requirements for excellent user experience, authorization management, and high performance for cross-tenant queries for endless scenarios can become a nightmare.

It turns out that creating a mere access model does not do the full trick – it has to be cleverly designed into data storage structures and queries to achieve the required performance goals!

This talk will explore:

Multi-stakeholder access requirements of an IIoT platform
“Zanzibar” inspired approach to manage access authorizations
Deep dive into data storage and query optimization magic

12:00

Risk-based Identity & Access Management

Mostafa Hassanin
Group Director of Security & Anti-Fraud (CISO) | Head of Group Security & Anti-Fraud Team, SMG Swiss Marketplace Group
view profile

Mostafa Hassanin, Group Director of Security & Anti-Fraud (CISO), Head of Group Security & Anti-Fraud Team, SMG Swiss Marketplace Group

Identity and Access Management (IAM) stands as the foundational pillar of any robust security strategy, particularly vital in today’s digital landscape where threats continuously evolve and the complexity increases. Navigating this landscape requires a solid and adaptive approach to access management — one that adapts to diverse devices, deployment models, apps, and roles, especially when dealing with sensitive data. Risk-based IAM rises to this challenge by dynamically adjusting access controls and authentication requirements in line with each assessed risk profile for access. This ensures that security measures are both effective and seamless.

  • Continuously evaluate risk to fine-tune access to resources and applications.
  • Evaluate the security posture of the used devices, taking its integrity into access decisions.
  • Classify the security level of resources, requiring the appropriate access requirements.
  • Continuously re-assess the risk of access to tailor the security posture for each scenario.

12:15

Questions to the Panel of Speakers and Delegates move to the Seminar Rooms

12:30

Seminar Sessions

13:15

Networking Lunch in the Exhibition Area

Afternoon Session

Moving forward with the right tools, technologies and people in place

  • Risk-based Identity & Access Management
  • Self-service DNS Management
  • Identities in Automotive: Challenges and Trends
  • Security through Control: The Role of Identity and Access Management under ISO 27001
  • Zero Trust Architecture Demystified
  • Spicing up Authorization – A Zanzibar Inspired Approach

14:00

Additional Footage from Speakers

SEE BELOW SPEAKERS WHO DID NOT APPEAR BUT PROVIDED FILMED FOOTAGE

14:05

Self-service DNS Management 

Philip Kupsch
Senior Operations Engineer, HomeToGo
view profile

Philip Kupsch, Senior Operations Engineer, HomeToGo

  • DNS as Data for giving permissions to teams in github repository
  • OctoDNS implementation in HomeToGO as a way to reduce need for IAM role, self-service DNS management
  • Improved security, reduce Single Point of Failure from one team and improved efficiency

14:20

Embracing modern identity - a bumpy road?

Fehmi M’Barek
PO CIAM (intern), ITERGO Informationstechnologie GmbH
view profile
Dr. Steffo Weber
Director Customer Engineering, Ping Identity
view profile

Andreas Böhling, Major Account Executive, Ping Identity
Fehmi M’Barek, PO CIAM (intern), ITERGO Informationstechnologie GmbH

14:35

PowerSyncPro Directory Synchronization

PowerSyncPro
PowerSyncPro Directory Synchronization
view profile

You can also view a session on PowerSyncPro Migration Agent here

 

14:50

Published Speakers

The following speakers were unable to attend due to the transport strikes – we hope to see them at a future event

14:55

Security through Control: The Role of Identity and Access Management under ISO 27001

Frederik Thorn
Global Information Security Officer, Pfeiffer Vacuum Technology AG
view profile

Frederik Thorn, Information Security Officer, Pfeiffer Vacuum

This talk will present the essentials of Identity and Access Management in the context of ISO/IEC 27001. Tailored for beginners, this presentation simplifies the ISO 27001 requirements related to IAM, offering practical insights into building a secure foundation and emphasizing its significance in achieving its compliance.

15:10

Zero Trust Architecture Demystified

Abhijit Naik
Security Architect, DB Schenker
view profile

Abhijit Naik, Security Architect, DB Schenker

While working in some major Financial Organizations and consulting companies around the world, several doubts have been voiced that CISOs, CTOs, and stakeholders have in regard to Zero Trust.

In this presentation we will discuss:

  • What Zero Trust is (and what is not)
  • User experience
  • Key elements of Zero Trust Architecture/design

 

15:25

Multi-Factor Authentication

Ishaq Walizada
IT Security Analyst, Allianz Global Investors
view profile

Ishaq Walizada, IT Security Analyst, Allianz Global Investors

This session will explore:

• Adaptive Authentication: Behavioral Analytics: Integration of behavioral analytics to assess user behavior patterns and adjust authentication requirements accordingly.
• Mobile-based MFA
• Passwordless Authentication: Elimination of Passwords: Addressing the Growing interest in passwordless authentication methods, including biometrics, mobile-based solutions, and authentication through possession of a device.
• Zero Trust Security Models: Incorporating continuous authentication measures within a Zero Trust security framework to verify and re-verify user identity throughout the entire session.

15:40

The EU Digital Wallet is coming. Here’s what it means for you, the government and private sector across borders

Annet Steenbergen
Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)
view profile

Annet Steenbergen, Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)

The eIDAS 2.0 regulation is -almost- a fact and this means that very soon European citizens and residents can use, if they wish, a harmonized European digital identity wallet (EUDI) that they can use to safely identify themselves online.

The implications of the EUDI wallet have the potential to be immense and will change the way we identify ourselves digitally and the data we share or do not share online. Imagine having a digital wallet that contains credentials such as a driver’s licence, health insurance, education credentials, hotel reservations, boarding passes, bank cards, company identity card and gives the option to prove you are over 18 or even just to prove you are a person.

The EU digital Identity Wallet Consortium is currently running a large scale pilot in Europe that will use the EUDIW for use cases combining travel, payment and digital identity.

The presentation will focus on:

The eIDAS 2.0 regulation and the EU digital identity wallet
How do verifiable credentials work?
The EWC Large scale pilot; the travel use case together payment and organizational digital identity

 

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Why Henrique Teixeira Joined Saviynt | The IGA Problem, The Technology, The People | Saviynt
Blog By: Saviynt | Author: Henrique Teixeira The reason I’ve decided to join Saviynt was because my wife agreed it was a good idea. I’ve prepared an essay, entirely in my head, and I presented her the 3 things that made me think this was a good idea, during the Easter holiday of 2024. Today is...
Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...