Identity Management

12 March 2020

Steigenberger Airport Hotel Frankfurt




Thursday 12 March 2020

The Seminars will take place from 12:20– 13:05
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.



Salons 9-10 (Main Conference Room)
Sponsored by:
How Can Access Request and Access Review Help to Clean-Up your Entitlement Mess? A Workshop with Use Case Examples

Hanns Nolan, Senior Solution Architect, ForgeRock Deutschland GmbH

Large organisations often have the challenge to prove, clean up and delegate access rights aka entitlements. In this seminar session, we will show you a transparent, secure and auditable way to archive “clean” permissions on all target systems and applications with ForgeRock Identity Management including our new governance solution integrated in IDM.


Salons 3-4
Sponsored by:
Making Identity and Access Management Smart

Speakers from IBM

Identity and access management (IAM) is an essential component for protecting businesses from identity theft, privacy abuses and account takeovers while at the same time maintaining employee experience, productivity and operational efficiencies. But with the world around IAM changing and revealing new risks and opportunities, IAM is changing as well. IAM needs to become smarter, automated, more risk-aware and secure.

In this session, we explore trends like

  • machine learning
  • identity analytics and
  • adaptive access

and how they are altering the face of IAM.


Salons 1- 2
Sponsored by:
Anatomy of a Credential Stuffing Attack

Mathias Conradt, Senior Solutions Engineer, Auth0

As computer services become less expensive, malicious actors are able to execute bot-based attacks to access user accounts cheaper and easier than ever before. This means that threats are not limited to banks or “high value” targets. Rather, every-day consumer services are being attacked at scale, creating security challenges for retail, travel, food and media companies. What do these attacks look like? How do you identify them? How do you protect your customers and your business from compromised accounts and loss of digital assets?

In this session, we will discuss the shape and prevalence of modern bot threats including brute force and credential stuffing attacks and what you can do about them.


Salons 12-13
Sponsored by:
6 Myths of PAM Busted

Mohamed Ibbich, Lead Solutions Engineer, BeyondTrust

Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). But successfully securing and managing privilege access is a tough problem and is only getting harder to solve.

This session will identify the top PAM challenges and breakthrough the myths to enable you to:

  • Understand the risks uncontrolled privileged access presents
  • Identify solutions to tackle key PAM challenges and myths
  • Provide a foundation to begin a successful PAM program


Salons 15-16
Sponsored by:
Successful Identity Centric Projects

Dr. Stephan Hausmann, Sr. Solution Architect IAM EMEA, One Identity

This seminar will start with the concept of identity-based security. See how you can secure the identity of your line-of-business users, as well as your privileged users. Unfortunately, identity and access management projects are traditionally amongst the most difficult security activities that organizations can undertake. Stephan will run through some pitfalls and best practices.


Salon 17
Sponsored by:
A Superior Security Foundation for SAP On-premises, in the Cloud, and Beyond

Frank Schmaering, Senior Solutions Engineer, Saviynt

Organizations rely on SAP for critical business capabilities, but in our transforming world, providing secure access to these capabilities is growing ever more complicated. Is your SAP running in your data center, in the Cloud, or both? And for that matter, which SAP? What about when you need security that extends between SAP and other applications your organization uses?

This session will address these pressing questions and look at an identity foundation to enable:

  • Real-time, automated provisioning of appropriate access, including firefighter and emergency access management
  • Risk-aware access reviews focusing on protecting the most critical assets
  • Compliance with cross-application
  • Segregation of Duty (SoD) controls, within and beyond SAP
  • Maintaining your posture with a continuous controls monitoring framework
  • An intuitive, persona-based portal to understand access risk across your organization

COVID-19 Virus

We would like to confirm that IDM Europe March 2020 is going ahead as planned.

Click here for more details