Thursday 12 March 2020
The Seminars will take place from 12.25 – 13.10
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Salons 9-10 (Main Conference Room), Ground Floor
Who Has Privileged Access In your Enterprise?
What would happen to your enterprise’s network if an external hacker or an insider threat obtained the privileged credentials of one of your super users?
You must ask yourself the question, what couldn’t a hacker do after subverting your privileged access management protocols?
Stolen privileged access credentials can cause untold damage to your enterprise. Hackers could use them to steal digital assets and data without raising alarms, reconfigure your entire environment network, subvert your business processes or financial payments…and that list just scratches the surface.
- Who Has Privileged Access In your Enterprise?
- What Access Do Your Privileged Credentials Have?
- What Privileged Access Management Tools Do You Have?
Salons 3-4, Ground Floor
Adopting biometric authentication across your enterprise
Authentication continues to be a major priority for enterprises as traditional security architectures break down in the face of growing hostile threats. Organisations are constantly looking for ways to introduce disruptive technology into their existing IAM infrastructure.
We look at the value of biometric authentication as the means by which to supplant single-factor authentication and the increasingly frustrating password.
- Biometric authentication cannot be forgotten
- Always available
- Cannot be replicated or stolen
- Deter hackers and limit access to digital assets
Salons 1-2, Ground Floor
Centralising your IAM service
The business cost of traditional IAM products and the lack of in-house expertise are a major concern for organisations as they seek to take advantage of the flexibility and scalability of cloud computing.
More than ever, organisations need affordable, all-encompassing IAM solution in order to provision users and manage access to applications
- Adopting an innovative Identity-as-a-Service solution
- Managing user accounts
- Enforcing user access policies
- Providing comprehensive auditing and reporting via a centralised administration portal
- Automating the provisioning user accounts and access rights across applications
Salons 12-13 (Venus+Pluto), Ground Floor
Advancing your multi-cloud and container security
Today’s enterprise digital infrastructure requires an equally agile approach to governance, security and compliance.
By attending this seminar, you will learn how to prevent cloud resources and short-life containers from exposing your organisation to risk.
- Running automated compliance checks across your digital environment
- Remediating configurations quickly and accurately
- Accelerating value with SaaS delivery and out-of-the-box policies
Salons 15-16 (Neptun+Mars), Ground Floor
Supporting the evolution of customer expectations
Customer expectations for an enhanced experience when interacting with the enterprise front end continue to rise across all industry sectors. This has caused more and more organisations to integrate consumer IAM solutions into their IAM strategy.
The ideal CIAM platform allows for scalable consumer access, continuous business user innovation and the delivery of robust privacy, security personalisation and end-user experience.
We explore how you can deploy a CIAM platform which supports you and your customers at each and every point of contact.