Seminars @

IDM dach

Identity Management

24 May 2022


Seminars @ IDM dach

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Hybrid Identity and Access Management with a Zero Trust approach


Vivin Sathyan, Senior Technology Evangelist, ManageEngine

Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program – the main reason why organizations often opt for a hybrid AD approach. However, the other side of the coin w.r.t hybrid AD approach is, your network perimeters disappear. To address this new challenge, organizations must build a unified security strategy with hybrid identity management at the center.

Vivin Sathyan
Senior Technology Evangelist, ManageEngine
view profile
Room / Location:
Session 3 @ 13:30

How IAM Managed Services Contribute to a Global Cyber Security Strategy – Challenges and Best Practices


Andre Priebe, CTO, iC Consult Group GmbH
Joachim Geiger, Senior Consultant / Service Owner Okta, IAM Worx GmbH

Digital Identities are the core of Zero Trust. Managed Services for IAM are an efficient approach to leverage consistent levels of security with factory patterns. DevOps models require flexibility, so it is crucial to ensure that central MSP approaches do not conflict or slow down agile development.

Topics Include:

  • The role of Managed Services in Zero Trust
  • How IAM processes enable DevOps teams
  • How MSP supports a Zero Trust Strategy at a global scale
Andre Priebe
CTO, iC Consult Group GmbH
view profile
Joachim Geiger
Consultant / Service Owner Okta, IAM Worx GmbH
view profile
Room / Location:
Session 3 @ 13:30

Importance of the developer-focused Identity and Access Management to build CIAM solution


Godwin Amila, WSO2, Senior Lead Solutions Engineer

Customer identity and access management (CIAM) have become a bit of a buzzword in recent years. CIAM is a whole emerging area in IAM, which is essentially a component of digital customer experience. Developer-focused IAM system plays an important role to build enterprise grade CIAM solutions.

Session Summary:
-CIAM vs Workforce
-Challenges of Building CIAM
-Why CIAM is an integration solution
-Key areas of the developer-focused IAM
-Importance of the developer-focused IAM

Godwin Amila
Senior Lead Solution Engineer, WSO2
view profile
Room / Location:
Session 3 @ 13:30

Identity & Access Management: how to make it secure and customer-oriented


Ruben Rodriguez Perez, Senior Solutions Engineer, Okta

A login box must have the right balance between user-friendliness, data protection and security. But what does modern access management look like? In this webinar, you will learn how to secure identity data with a security-oriented solution and thus gain the trust of your customers.

Do you want to keep an eye on cyber security risks and digital customer identities in equal measure? And rely on your identity access management (IAM) infrastructure as the front door for your customers’, employees’ and partners’ access to corporate resources and digital services? Perhaps you are already planning a CIAM (Customer Identity Access Management) strategy? If so, join Ruben Rodriguez of Okta/Auth0 to learn more about what a future-proof customer identity and access management must contain. This includes the interplay between security and customer experience, collaboration with product management, marketing and development departments, and the proper orchestration of common authentication options. Learn more about:

– Metrics for success in deploying customer-centric identity management

– Strategies for data storage and management in integrated CIAM systems

– How to turn weak points in your access management into strengths

Ruben Rodriguez
Senior Solutions Engineer, Okta
view profile
Room / Location:
Session 3 @ 13:30 CET

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

How To Use MFA To Achieve Regulatory Compliance
By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading industry regulations. Lately it has also become a necessity to qualify for cyber insurance. This is because MFA significantly reduces the risk of system penetration, up to a remarkable 99%. Let’s dive into MFA and how...
Modern IGA means Simple, Scalable, Agile
By Rod Simmons | Omada Next week, we’ll be at IDM DACH, speaking with attendees about what modern Identity Governance and Administration (IGA) means to us, and why organizations today need it more than ever. The IDM event has a great agenda, and we’re slotted to speak in the morning session on May 24th. This...
Traditional Two-Factor Authentication vs. Beyond Identity’s Passwordless Authentication
Traditional Two-Factor or Multi-Factor Authentication (2FA/MFA) remains the “default” for dealing with fundamentally insecure, password-based authentication methods. We understand why they were the “go-to,” but hope to interrupt the “passwords are bad, so we need 2FA/MFA” refrain. There is now a new option grabbing attention and gaining traction – Modern Passwordless Authentication. Let’s compare traditional...