Session one – setting your IAM strategy, supporting your team and delivering for your customers
- Identity experiences: setting the bar high
- Supporting innovation in times of disruption: workforce IAM
- Delivering for your customers: securing your CIAM ecosystem
- Next-gen identity platform: unified and accessible
- Counting the cost: consumer identity breach
- Transcending the enterprise environment: modern SSO solutions
- Power to the user: autonomous identity
Conference Chair’s Opening Address
Identity experiences: setting the bar high
Customers want to be able to sign up to a digital system in a manner which supports seamless transactions, realises value quicker and puts them at the centre of everything you are doing. Equally, employees want a refined onboarding process, login credentials in minutes not days, and the right access to the right applications as and when required.
With an improved digital identity experience, you can increase customer and employee satisfaction by taking away the friction and frustration which typically comes with first interactions.
In our opening address, we focus on creating great digital experiences, and why this matters.
Supporting innovation in times of disruption: workforce IAM
In the age of Covid, it is more important than ever that businesses positively engage with disruption. The only alternative is to succumb to market forces as consumer demand lessens, investors save rather than spend and business costs exceed revenue generation.
We look at what your IAM priorities should be.
- Meet market expectations
- Develop your IAM talent strategy
- Be a reliable service
- Meet security demands
- Support IAM initiatives
Delivering for your customers: securing your CIAM ecosystem
Establishing a secure, streamlined, individualised, and privacy-centric consumer digital ecosystem helps build confidence in your customer relations, improves workforce productivity, and enables business growth.
We address, how to manage omnichannel experiences, secure both customer and IoT access, authenticate billions of access demands, successfully integrate, facilitate data collection points, and protect against malicious threats.
Next-gen identity platform: unified and accessible
As our physical and cyber identities continue to experience greater integration, from our personal to our professional lives, businesses are being asked to speed up digital transformation initiatives in order to support the user experience.
By implementing a truly manageable and accessible identity platform, you can enable your organisation to scale identity, governance, and access management functions without compromising on security, usability, workforce, and end-user experience.
- Streamlined digital experiences
- Context rich user differentiation
- Orchestrating your IAM lifecycle management
- Protecting data and devices
- Speeding up on-prem and cloud deployments
- AI-driven investigation and decision making
Counting the cost: consumer identity breach
Personal identifiable information remains the most targeted type of target, accounting for 98% of data. this only reinforces the centrality of having a robust IAM security system in place.
Whether it be remote access to work applications, accessing social media accounts or ordering your weekly shop, we are all leveraging our digital identities at an impressive rate.
We address, why protecting digital identities is crucial if you are to maintain trust with your customers and how you can best avoid costly breaches.
Questions to the Panel of Speakers
Refreshment Break Served in the Exhibition Area
Transcending the enterprise environment: modern SSO solutions
Web access management, with SSO as its go to IAM function, was designed to problem solve within the confines of the enterprise perimeter. Today, legacy single-sign-on products lack the flexibility to move away from such outdated scenarios and into a perimeter-free environment.
What is required is the right architecture in place to support the adoption of a modern SSO function which supports MFA.
We address, providing a unified and fluid SSO experience, supporting your omnichannel ecosystem, and securing legacy applications with the latest authentication technologies.
The impact of AI and ML on IAM
Saru Tumuluri, India Ambassador, Women In Identity
83% of organisations do not have a mature approach to IAM, resulting in two times more breaches on average.
We explore how AI and ML can improve this situation by:
- Combining analytics and AI to contextual insights so that both technical and non-technical employees can work more time-efficient
- Drastically speeding up the existing IAM compliance controls
- Reviewing historical user access reports to comply with auditor requests
- Autonomously detecting anomalies and potential threats
- Paving the way between reactive to preventive/corrective access management
Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
Networking Lunch Served in the Exhibition Area
Session two – understanding your business needs, utilising the available technology, and integrating successfully
- Bridging the gap: SSID and CIAM
- Integrating PAM with IAG
- IAM Blockchain: distributed workforce
- Expanding remote access demands
- Extend enterprise IAM security to IoT
- Enterprise DevSecOps
Conference Chair’s Afternoon Address
Bridging the gap: SSID and CIAM
More than ever, people are demanding that they are provided with greater degrees of personalisation.
In an effort to personalise services to meet this demand, the way in which businesses collect and process data can be the difference between gaining trust and falling foul of regulatory compliance.
We address, how incorporating SSID, ZKP and progressive disclosure enables an enterprise to personalise products and services without putting customers at risk.
Managing highly privileged accounts: integrating PAM with IAG
By extending identity governance to privileged accounts, businesses will be better able to gain increased visibility into special accounts, govern them from a centralised location, rapidly grant access to ensure productivity, all through the use of recognised industry standards which reduce implementation time and cost.
- Comprehensive view of all privileged and non-privileged accounts
- Empowering your IT admin, specialists, and executives
- Automatically remove unnecessary privileges
- Maintain strong and consistent security and compliance controls
- Streamline account entitlement provisioning, de-provisioning, access request approvals and workflows
The next step in blockchain: open and available anywhere
With blockchain for IAM you can create dedicated pipelines which can accommodate the communication, collaboration and productive needs of each customer, contractor, and partner without experiencing privacy and trust issues.
Ensuring that your suppliers are happy to put their data into the blockchain, regardless of how many competitors are utilising the platform, gives multi-cloud blockchain the edge in IAM technologies.
We address, how blockchain IAM maintains security and privacy whilst delivering on the needs of your client base.
Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Secure expanding remote access demands: the new normal
2020 witnessed the greatest workforce remote working migration in world history. For security teams, the move caused chaos. Sensitive resources which had previously been accessed by workers on site now had to be made available to a workforce which, in many cases, became entirely remote.
Whilst the talk of a perimeter-less security system has become the norm, the unexpected migration has brought about a need to better understand how to securely manage a distributed workforce.
- Zero trust as a business imperative
- Removing the perimeter and becoming more fluid
- Accessing data regardless of location or device
- Continually analyse and evaluate access requests
- Operate dynamically and granularly
- Mitigate data exposure against threats
Extend enterprise IAM security to IoT: access all areas
Many non-traditional endpoints and edge devices have minimal computing power. Which means that they may not be well suited to traditional endpoint security tools. Added to this is the fact that IoT and network devices tend to have embedded or easy to navigate credentials.
This is why it is critical to extend credential management, least privilege, and other controls to these devices in order to keep them segmented across the enterprise.
We address, the role that PAM can play in adding vital security controls to IoT and how you can extend across your business environment.
Enterprise DevSecOps: addressing the IAM security challenge
When done effectively, DevSecOps can create a secure by design culture which supports transparency of security vulnerabilities, encourages collaboration between teams, and drives agility.
Done badly, teams then have to fall back on manual controls which has an impact on cycle times, produces false positives and leads to inefficient, voluminous outputs. This then leads to the late identification of defects in the development cycle, disrupts production and creates vulnerabilities.
- Avoiding costly remediation efforts
- Successfully leverage integrated automated controls
- Enable rapid secure by design platform and app development
- Secure product development and deployment