Thursday 14th March, 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Salons 9+10 (Main Plenary, Ground Floor)
Detecting Malicious Inside Actors
Unlike outsiders, who start with zero knowledge of the network and organisational processes, an employee understands your systems, can cover their tracks behind legitimate activities and knows where the most sensitive and important data lies.
To combat this, strategies to identity and contain insider threats have to be sophisticated and go beyond the regular indicators of compromise. In this session we look at the key tools and techniques you can deploy in your organisation to prevent malicious inside actors from causing irreparable damage to your reputation and data.
Salons 1+2 (Ground Floor)
Privileged Access Management (PAM): The critical missing piece in your security strategy
Roland Schäfer, Senior Solutions Engineer, BeyondTrust
• What does “privilege” mean to your business?
• How implementing a Privileged Access Management (PAM) solution drives significant improvements across your organization.
Salons 3+4 (Ground Floor)
Ensuring the Success of Your IAM Project
Cengiz Tuztas, Senior Solutions Architect for Identity and Access Management, One Identity
Identity and access management (IAM) projects are traditionally some of the most important (and most difficult) security activities that organisations undertake. Yet for all their importance, too many IAM projects haven’t lived up to expectations, took too long, cost too much to complete and even failed outright. But it doesn’t have to be that way. How can you do things differently and make sure that your IAM project is a success? Attend this practical and insightful session and discover the keys to a successful, affordable and sustainable IAM implementation.
In this session, Cengiz will cover:
• Why organisations do IAM
• Why IAM projects stall
• Case studies: real-world examples
• Recipe for success – top tips
Pluto+Venus (Ground Floor)
Identity in the Cloud
Moving your identity provider to the cloud offers a range of benefits, from greater security to scalability of resources, all while reducing your operational costs.
In this session, we cover the main advantages of moving to a cloud provider and tackle some of the ways you can ease migration.
Neptun+Mars (Ground Floor)
Meeting Global Privacy Regulations Through IAM
Join this deep-dive look into ways new data protection and privacy regulations will impact employee and customer credentials, and the personal information and sensitive data organisations hold. We also discuss the ways IAM can be a driver of greater security, privacy and access to achieve and go beyond regulatory compliance.
Identity as a Driving Force for Digital Transformation
The business IT landscape is becoming more complex. Technologies such as cloud, mobile, BYOD and shared working environments throw up new challenges for identity systems but also immense opportunities.
This seminar looks at the ways in which identity can be the foundation of your enterprise’s digital transformation strategy and empower employees and customers with tools and seamless experiences that untap new business potential
Single Sign-On Success Stories
Using the case study of a large organisation which effectively implemented SSO for employees, we cover:
- Secure Single Single-On
- Overcoming IT Infrastructure complexity
- Challenges and difficulties of implementation
- Introducing two factor authentication and other secure technologies