Thursday 12 March 2020
The Seminars will take place from 12:20– 13:05
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Salons 9-10 (Main Conference Room)
How Can Access Request and Access Review Help to Clean-Up your Entitlement Mess? A Workshop with Use Case Examples
Hanns Nolan, Senior Solution Architect, ForgeRock Deutschland GmbH
Large organisations often have the challenge to prove, clean up and delegate access rights aka entitlements. In this seminar session, we will show you a transparent, secure and auditable way to archive “clean” permissions on all target systems and applications with ForgeRock Identity Management including our new governance solution integrated in IDM.
Making Identity and Access Management Smart
Speakers from IBM
Identity and access management (IAM) is an essential component for protecting businesses from identity theft, privacy abuses and account takeovers while at the same time maintaining employee experience, productivity and operational efficiencies. But with the world around IAM changing and revealing new risks and opportunities, IAM is changing as well. IAM needs to become smarter, automated, more risk-aware and secure.
In this session, we explore trends like
- machine learning
- identity analytics and
- adaptive access
and how they are altering the face of IAM.
Salons 1- 2
Anatomy of a Credential Stuffing Attack
Mathias Conradt, Senior Solutions Engineer, Auth0
As computer services become less expensive, malicious actors are able to execute bot-based attacks to access user accounts cheaper and easier than ever before. This means that threats are not limited to banks or “high value” targets. Rather, every-day consumer services are being attacked at scale, creating security challenges for retail, travel, food and media companies. What do these attacks look like? How do you identify them? How do you protect your customers and your business from compromised accounts and loss of digital assets?
In this session, we will discuss the shape and prevalence of modern bot threats including brute force and credential stuffing attacks and what you can do about them.
6 Myths of PAM Busted
Mohamed Ibbich, Lead Solutions Engineer, BeyondTrust
Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). But successfully securing and managing privilege access is a tough problem and is only getting harder to solve.
This session will identify the top PAM challenges and breakthrough the myths to enable you to:
- Understand the risks uncontrolled privileged access presents
- Identify solutions to tackle key PAM challenges and myths
- Provide a foundation to begin a successful PAM program
Successful Identity Centric Projects
Dr. Stephan Hausmann, Sr. Solution Architect IAM EMEA, One Identity
This seminar will start with the concept of identity-based security. See how you can secure the identity of your line-of-business users, as well as your privileged users. Unfortunately, identity and access management projects are traditionally amongst the most difficult security activities that organizations can undertake. Stephan will run through some pitfalls and best practices.
A Superior Security Foundation for SAP On-premises, in the Cloud, and Beyond
Frank Schmaering, Senior Solutions Engineer, Saviynt
Organizations rely on SAP for critical business capabilities, but in our transforming world, providing secure access to these capabilities is growing ever more complicated. Is your SAP running in your data center, in the Cloud, or both? And for that matter, which SAP? What about when you need security that extends between SAP and other applications your organization uses?
This session will address these pressing questions and look at an identity foundation to enable:
- Real-time, automated provisioning of appropriate access, including firefighter and emergency access management
- Risk-aware access reviews focusing on protecting the most critical assets
- Compliance with cross-application
- Segregation of Duty (SoD) controls, within and beyond SAP
- Maintaining your posture with a continuous controls monitoring framework
- An intuitive, persona-based portal to understand access risk across your organization