Identity Management

12 March 2020

Steigenberger Airport Hotel Frankfurt




Thursday 12 March 2020

The Seminars will take place from 12.25 – 13.10
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.



Who Has Privileged Access In your Enterprise?

What would happen to your enterprise’s network if an external hacker or an insider threat obtained the privileged credentials of one of your super users?

You must ask yourself the question, what couldn’t a hacker do after subverting your privileged access management protocols?

Stolen privileged access credentials can cause untold damage to your enterprise. Hackers could use them to steal digital assets and data without raising alarms, reconfigure your entire environment network, subvert your business processes or financial payments…and that list just scratches the surface.

We address:

  • Who Has Privileged Access In your Enterprise?
  • What Access Do Your Privileged Credentials Have?
  • What Privileged Access Management Tools Do You Have?


Adopting biometric authentication across your enterprise

Authentication continues to be a major priority for enterprises as traditional security architectures break down in the face of growing hostile threats. Organisations are constantly looking for ways to introduce disruptive technology into their existing IAM infrastructure.

We look at the value of biometric authentication as the means by which to supplant single-factor authentication and the increasingly frustrating password.

  • Biometric authentication cannot be forgotten
  • Always available
  • Cannot be replicated or stolen
  • Deter hackers and limit access to digital assets


Centralising your IAM service

The business cost of traditional IAM products and the lack of in-house expertise are a major concern for organisations as they seek to take advantage of the flexibility and scalability of cloud computing.

More than ever, organisations need affordable, all-encompassing IAM solution in order to provision users and manage access to applications

We address:

  • Adopting an innovative Identity-as-a-Service solution
  • Managing user accounts
  • Enforcing user access policies
  • Providing comprehensive auditing and reporting via a centralised administration portal
  • Automating the provisioning user accounts and access rights across applications


Advancing your multi-cloud and container security

Today’s enterprise digital infrastructure requires an equally agile approach to governance, security and compliance.

By attending this seminar, you will learn how to prevent cloud resources and short-life containers from exposing your organisation to risk.

  • Running automated compliance checks across your digital environment
  • Remediating configurations quickly and accurately
  • Accelerating value with SaaS delivery and out-of-the-box policies


Supporting the evolution of customer expectations

Customer expectations for an enhanced experience when interacting with the enterprise front end continue to rise across all industry sectors. This has caused more and more organisations to integrate consumer IAM solutions into their IAM strategy.

The ideal CIAM platform allows for scalable consumer access, continuous business user innovation and the delivery of robust privacy, security personalisation and end-user experience.

We explore how you can deploy a CIAM platform which supports you and your customers at each and every point of contact.


Building and delivering a comprehensive incident response plan

In the event of a breach, there often exists a divergence in approach between privacy and security professionals.

Security teams look to the trajectory of threat vectors and privacy teams focus on the identification of data leaks.

Whilst such a divergence can cause a fragmented response if unaddressed, there exists the possibility to build and rely upon an incident response plan which harmonises the needs of both teams.

In this session, we will address:

  • How to build a holistic incident response plan
  • Relate the needs of teams, tools and processes to the IAG architecture
  • Ensure that you have the right structures in place to support consistency in approach