Session One – Building An Effective and Resilient IAM Infrastructure
- EU Regulations and pan-European IAM initiatives and projects
- CIAM and Excellent User Experiences that drive innovation and change
- Implementing complex IAM projects across large enterprise organisations
- Technical challenges, methods of Access Control, and Identity Provider implementation
- Creating IAM infrastructure that is robust and resilient to attack
- Improving access security across your organisation
- Operationalising identity intelligence for risk mitigation
- Using IAM to achieve business goals and empower digital business
- Developing DISP strategies that support innovation
- Decentralising Identity Management using a Blockchain approach
The Conference Chair's Opening Remarks
Dr Gilad L. Rosner, Founder: IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher
Where Next for Identity and e-Government in Europe
As more business and government services become digitised, electronic identification and trust services are essential to ensure systems remain secure and consistent across member states. National schemes across Europe, such as the eID card project in Germany, have made tremendous progress and created impressive IT infrastructure capable of creating more accessible government administration that is available to a wider audience.
However, much more needs to be done to create a fully digital single market which can respond effectively to citizens’ and business needs in an increasingly online age. This presentation explores the next steps identity schemes and projects are taking across Europe, and how member states, enterprises and European bodies can continue to collaborate to provide robust frameworks that work in citizens’ interests.
User Experience as a Central Pillar of CIAM
Customer expectations have never been higher when it comes to online services. Meeting the basic requirements of online access is no longer adequate as users are increasingly deterred by obtuse interfaces, difficult to navigate systems and other barriers to ease of use.
In this environment, user experience needs to be the central pillar of any CIAM system, and IAM architects have to utilise the newest technologies and techniques to create systems that are user friendly and allow easy interaction across multiple login portals.
In this session, we explore:
- What can be done to create better interfaces that offer customers a great IAM experience
- Flexible access and SSO
- Removing impediments to the customer journey, without reducing security
- Scalability challenges – creating systems that are able to manage exponential increases in demand, without impacting performance
- Developing DISP strategies that support innovation
“works with” won’t help you – how to reliably crash any IAM project
Stefan Bosnjakovic, IAM and Corporate IT-Security Architect, Deutsche Kredit Bank
Embarking on and completing an Identity and Access Management project can be a tricky task that has to juggle differing business needs, technological constraints and a complexity arising from IAM systems which have to span the entirety of a global enterprise’s IT infrastructure.
In this presentation, we examine the ways you can approach IAM project management to ensure success through:
- How to read between the lines of product brochures
- How to set up a sensible Proof-of-Concept
- Instead of becoming a vendor’s Guinea Pig during the project implementation phase
Overcoming the Weaknesses of Role-Based Access Control in a Scaling Enterprise
Henk Birkholz, Standards Expert, Fraunhofer Institute for Secure Information Technology
Role-based access control (RBAC) has become a de facto standard across many large organisations due to its ability to manage fast-moving internal employee changes and increase operational efficiency. Like many IAM models though, it struggles as organisations scale rapidly and, as the number of real world roles with differing permissions proliferate, it can result in ‘role explosion.’
In this presentation we explore the ways security teams can manage RBAC as organisational complexity increases.
The vision of identity brokering for the International Federation of Red Cross and Red Crescent Societies
Amol Sawarkar, Enterprise Architecture, Global IT Planning and Project Management Unit, IFRC
This presentation is a case study specific to the IFRC which will highlight the challenges faced by a non-profit, international, membership organisation as regards both size and scale.
- IFRC & digitalisation state
- Need for an internal & external identity management
- Organisational, financial, technical challenges
- Roadmap in brief
Questions to The Panel Of Speakers
Morning Networking and Refreshments Served in the Exhibition Area
Improving IAM Resilience: Identity and Access Management Breach Response
Enterprise breaches are generally seen as inevitable, attacker dwell times are increasing, and new tools such as Mimikatz are giving attackers the ability to directly target IAM systems and manipulate, compromise and damage user credentials across the entire organisation.
In this environment, it is becoming more and more likely that your organisation will face the unenviable task of having to restore IAM systems from scratch and refreshing user credentials for thousands of users. IAM is traditionally thought of as a security gatekeeper and protector of assets. But as a vital piece of IT infrastructure, every second it is down for maintenance can cause millions in lost earnings and damage.
- How prepared are you for the eventual breach?
- How long does it take you to restore your systems across the entire organisation?
- And how confident are you that your restored systems are no longer compromised?
This presentation tackles how you can improve the resiliency of your IAM to better answer these questions, and be more prepared for the day the worst does happen.
Practical Steps to Build on Password Security
Despite numerous predictions over the years that passwords will be assigned to the authentication scrap heap of history, they continue to be as prevalent and popular as ever. When implementing MFA or other strong authentication technologies is not practical, you can at least work to strengthen and improve the passwords themselves. This presentation covers:
- Is enforced password manager usage practical or secure?
- Safely linking user credentials with breach databases to catch out the worst offenders (goodbye qwertyuiop!) and prevent password cross-pollination
- Is there a place for password rules in enterprise?
- Education, education, education – reaching out across your organisation to actually effect change
Questions to the Panel of Speakers Delegate movement to the Seminar Rooms
Networking Lunch Served in the Exhibition Area
Session Two – Security and Innovation
- Cutting-edge techniques and technologies to secure your systems
- Adapting to, and securing, new infrastructure environments
- Managing privileged accounts
- Complying with rigorous data protection legislation
- The future of digital identity
The Conference Chair Opens the Afternoon Session
Machine Learning to Manage Access Risks
This afternoon keynote focuses on how Machine Learning models can be used to provide intelligent, adaptive access rules and privilege management, focusing on:
- The newest techniques to analyse user behaviour, access rights, contextual information and geo-location
- Automating provisioning, authentication and access
- Managing the outliers and calibrating your ML model to suit complex organisational structures
- Implementing ML alongside existing IAM infrastructure
Cloud Security and Access Management: Meeting the Challenges
Cloud assets are increasingly becoming a favoured target for nefarious actors. In this presentation, we tackle some of the key challenges associated with cloud security and IAM, looking at:
- Meeting identity provisioning challenges
- Ensuring system resources are allocated in a sustainable way
- Manging privileged cloud users through strong authentication, conditional access and administrative overview
- Frameworks to support tracking user access
Strategies to Secure and Manage Privileged Accounts
Mohsin Choudhury, UK Head of Cyber Security, Information & Data Office of the Chief Operating Officer, Bank of Ireland UK
Privileged accounts are an attacker’s most sought after prize, and capable of inflicting tremendous damage across your organisation as they evade access controls.
We explore how businesses can secure access pathways to their network through the deployment of techniques and analytics solutions that mitigate risk, look at the ‘right’ data – not all the data, and meet high stakes compliance requirements.
Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Securing Big Data with Identity Management
Statistics and data are the life blood of any organisation looking to drive evidence based decision making. Integral to this is the ability to allow data and insights to be shared across different sectors so that the benefits of data collection can improve all areas of business.
But as data sets are merged, shared, snipped and in some cases released to the public, the complexity of who is responsible for data and who it can be shared with can become infinitely complex. Strict rules on data protection means this is not just a philosophical concern, the unplanned sharing of personal data can result in heavy fines and regulatory punishment.
We deep dive into the ways identity and access management can be utilised to secure production environments and data sets in large organisations.
IAM meets GDPR: Finding the Right Balance Between Better Security and User Privacy
GDPR has created strict requirements and responsibilities around the data organisations hold, especially for sensitive personally identifiable information.
Meanwhile, IAM solutions are using more and more user information and data to provide greater security in a complex user environment. Systems are able to track and store user device information, the applications they access, normal network behaviour and even their location to better inform user behaviour models.
Is this trend towards data driven security compatible with GDPR? Join this session as we look to marry competing visions around user privacy with the imperative to be as secure as possible.
A Comparison of Authentication Protocols
Authentication of users and applications with third party systems can be a challenging task for developers, and depending on use-cases and user needs, the variety of authentication protocols available can be confusing.
In this session we take a look at the major protocols available such as SAML, LDAP, OAuth and OpenID, examine their strengths and weaknesses and suggest ways which can help you find the perfect protocol for every situation.
Closing Keynote: The Future of Digital Identity
In communities, forums, work spaces and every conceivable online corner, people are already able to hold numerous, ephemeral digital identities that transform depending on their environment and usage.
As technologies like AI, virtual reality and biometrics seep deeper into the way we perceive the world and interact with others, digital and real identity will also adapt and change.
In this closing keynote, we explore the ways digital identity may change, and how we as practitioners can meet the challenges and demands this will bring.
Questions to the Panel of Speakers
Closing Remarks from the Conference Chair
Conference Closes, Delegates Depart
Whitehall Media reserve the right to change the programme without prior notice.