Programme @

IDM dach

Identity Management

24 May 2022

Frankfurt

Programme @ IDM dach

Session One

Building back better with a robust, reliable and flexible IAM strategy

  • Building blocks for your Zero Trust journey
  • The Future of Access Management
  • The importance of identity in securing your business
  • Defend the perimeter!
  • How SASE supports the new way of working

09:00 (CEST)

Conference Chair's Opening Address

09:05 (CEST)

Building blocks for your Zero Trust journey

Whilst some traditional approaches to ways of working are slowly but surely returning to the enterprise ecosystem, some previously held opinions on how best to maintain security, productivity, connectivity and communication have been replaced by more holistic solutions, thanks to the enforced digitalisation of the pandemic.

One of the primary ways in which businesses are looking to prevent the build-up of organisational silos, and at the same time transform their security posture, is by implementing a Zero Trust security model.

This talk will show you how to take the first steps to achieving Zero Trust.

We’ll cover:

  • An introduction to Zero Trust’s core concepts
  • What a typical enterprise Zero Trust journey looks like
  • How people, devices, networks, and workloads play into the Zero Trust paradigm
  • Why a Software-Defined Perimeter (SDP) is the proven approach to Zero Trust

09:20 (CEST)

The Future of Access Management

Access management is a vital element of cybersecurity and a foundational pillar of an organisations enterprise technology portfolio.

Security leaders, from CIO’s, CISO’s, IAM leaders and practitioners, utilise access management solutions as part of their defence-in-depth security strategies to defend IT systems against cyberattacks, identity-driven breaches and data loss.

Of equal value is the ability to leverage AM technologies to enhance productivity, improve efficiency, and create the space for business initiatives that rely upon identity-based access control mechanisms.

After attending the talk, you will be able to:

  • Understand how changes in IT environments and business drivers are shaping Access Management space
  • Determine which security-focused capabilities are becoming increasingly important
  • Evaluate your existing AM model against legacy and modern IAM solutions
  • Gain insight into the next generation of  Access Management capabilities

09:35 (CEST)

The importance of identity in securing your business

Improving the means by which identity is managed within the enterprise environment produces an environment in which an organisations ability to provision access and protect sensitive data is unhindered by external forces.

One particularly challenging external force is the enhanced feature of remote working by internal and third-party employees.

Join us as we discuss:

  • The security challenges that organizations are facing – particularly as it relates to the current pandemic
  • Adjusting to the ‘new normal’ – working from home, remote communications
  • The importance of identity in securing your business & more

09:50 (CEST)

Defend the perimeter!

In the era of Covid, the migration of people, data and applications to the cloud has produced one undeniable reality; that traditional ways of implementing policy and security have become redundant.

In order to realise the potential of digital transformation, maintaining an effective security posture throughout your journey to the cloud is vital if you are to succeed in transitioning to the new normal in which the cloud is set to experience increasing degrees of utilisation.

Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.

10:05 (CEST)

How SASE supports the new way of working

SASE has become a noticeably more prominent feature of the enterprise network security space.

Whilst the trend in recent years towards off prem solutions such as SaaS, IaaS, and DaaS, has driven much of its popularisation, it is the pandemic which has brought its importance to the forefront.

This importance is being driven by the need to run applications outside of traditional data centres and support employees working remotely.

Still, as the world continues to slowly reopen, it’s important that security leaders factor in the need to not only support hybrid working, but also maintain a working model which is secure, agile and successful.

We address how this can be achieved:

  • How SASE will support the new way of working
  • What defines the perimeter as the world begins to open up again
  • The shift to and importance of a focus on protecting people, not places, wherever they work
  • How protection of data is paramount to the success of business as a whole
  • How SASE architecture enables a good user experience while keeping the business secure

10:20 (CEST)

Questions to the Panel of Speakers

10:35 (CEST)

Refreshment Break Served in the Exhibition Area

11:05 (CEST)

Integrating PAM and IAM into your Identity Security Strategy

Learn how with the right integrated PAM and IAM solution you can:

  • Manage the lifecycle of the workforce and privileged identities across the organization
  • Control access to business applications and infrastructure
  • Provide VPN-less and Passwordless remote access to cloud and on-premises resources
  • Enable users to elevate their workstation privileges with strong authentication
  • Protect high-risk web application sessions with continuous authentication and auditing

11:35 (CEST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

11:50 (CEST)

Seminar Sessions

12:30 (CEST)

Networking Lunch Served in the Exhibition Area

Session Two

Moving forward with the right tools, technologies and people in place

  • Mobile worker security or user experience – how about both?
  • How to better manage device-based access
  • The Four Pillars of Certificate Automation
  • Adapt to the new normal with adaptive access policies
  • AIOps as the new enterprise perimeter
  • Unite the tribes: MIM + DevSecOps = digital business enabler
  • Why machine identities matter: MI’s as your networks weakest link

13:30 (CEST)

Conference Chair’s Afternoon Address

13:35 (CEST)

Mobile worker security or user experience - how about both?

Whilst the physical and digital enterprise space is set to be remade in a more fluid form, one permanency is remote working.

This means it is time to get serious about managing the size and scale of the challenge of managing a vastly distributed workforce and doing so without compromising on security or end user experience.

We address:

  • How to future proof your remote and mobile worker strategy
  • The role of Zero Trust Network Access (ZTNA)
  • What is meant by digital experience management (DEM)
  • Cloud-delivered security for the distributed workforce

13:50 (CEST)

How to better manage device-based access

The outdated view of an employee tied to a fixed location, limited to a desk computer and confined to rigid working hours is just that, outdated, inflexible, unproductive, and redundant to the needs of both the employer and employee.

The path towards a more dynamic way of working has been brought about by the proliferation of BYOD practices and IoT connectivity between devices and networks.

We address, the positives and negatives this development represents, from enabling new opportunities to leverage device context for more secure authentication and better user experiences to how the growing number of devices has increased the attack surface for IT to manage.

14:05 (CEST)

The Four Pillars of Certificate Automation

The more you can introduce automation to your digital identity authentication and verification, the more efficient, productive and error-proof you will be.

One of the most common errors in manually led  certification approval processes is the expiration of certificates or unknowingly deployed certificates in your environment.

As the size, scale, and complexity of access demands increases, as well as the lifespan of certificates shorten, we simply cannot undervalue the impact of having automation in identity management.

Join us as we address how automation can meet the demands of today’s modern business IAM environment.

14:20 (CEST)

Questions to the Panel of Speakers

14:35 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:05 (CEST)

Adapt to the new normal with adaptive access policies

In response to the great migration to remote working many companies adopted short term solutions to what many saw at the time as a short-term necessity.

The question now is, to what extent have those companies prepared for the long term?

Join us as we address the biggest challenge facing decentralised workforces; empowering your employees with the tools they need to get their jobs done.

We address:

  • Mitigate remote access risks
  • Manoeuvre your perimeter to protect access to all resources
  • Ensure employees stay productive remotely by securing access through multi factor authentication
  • Support adaptive access policies and other collaboration tools that you can integrate with

15:35 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

16:05 (CEST)

AIOps as the new enterprise perimeter

The COVID-19 pandemic has obliterated the traditional firewall model of security. With each new technology, from cloud migration to DevOps processes, the concept of the network perimeter has truly disintegrated.

By deploying AIOps you can better manage the transition from legacy to integrated log monitoring systems which can capture, analyse, and report anomalous activity across your network, regardless of situational spread.

Join us as we explore how to:

  • Identify machine endpoint and configuration anomalies in real-time
  • Contribute to business continuity
  • Troubleshoot infrastructure problems with advanced monitoring and observability capabilities

16:20 (CEST)

Unite the tribes: MIM + DevSecOps = digital business enabler

By uniting your DevOps and IAM/MIM teams you can simplify the process of securing non-human identities across DevOps pipelines.

Join us as we map out how you can maintain security at the speed of innovation by protecting application code within the digital supply chain, support business agility and provide a friction-free experience for developers.

We address how to:

  • Keep application and automation tools secure
  • Give applications access to the credentials they need
  • Reduce the burden on developers whilst strengthening agility and security

16:35 (CEST)

Why machine identities matter: MI’s as your networks weakest link

Machine identity attacks grew 400% between 2018 and 2019, increasing by over 700% between 2014 and 2019.

The primary method of attack is through the production of malware which is specifically designed to compromise the already vulnerable MI attack surface.

With this type of malware having witnessed a 300% growth in the last year 5 years, it is clear there needs to be a priority shift in what the industry regards as an integral part of its suite of defence capabilities.

We address:

  • Why 81% of businesses have to deal with malicious bots
  • One in four have suffered significant financial loss as a result
  • The lack of visibility as to the number of bots and machines operating within the enterprise network
  • The role of threat actors in creating hundreds of malicious bots

16:50 (CEST)

Questions to the Panel of Speakers

17:00 (CEST)

Closing Remarks from the Conference Chair

17:05 (CEST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...