Thursday 12 March 2020
The Seminars will take place from 12:20– 13:05
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Salons 9-10 (Main Conference Room)
How Can Access Request and Access Review Help to Clean-Up your Entitlement Mess? A Workshop with Use Case Examples
Hanns Nolan, Senior Solution Architect, ForgeRock Deutschland GmbH
Large organisations often have the challenge to prove, clean up and delegate access rights aka entitlements. In this seminar session, we will show you a transparent, secure and auditable way to archive “clean” permissions on all target systems and applications with ForgeRock Identity Management including our new governance solution integrated in IDM.
Making Identity and Access Management Smart
Identity and access management (IAM) is an essential component for protecting businesses from identity theft, privacy abuses and account takeovers while at the same time maintaining employee experience, productivity and operational efficiencies. But with the world around IAM changing and revealing new risks and opportunities, IAM is changing as well. IAM needs to become smarter, automated, more risk-aware and secure.
In this session, we explore trends like
- machine learning
- identity analytics and
- adaptive access
and how they are altering the face of IAM.
Salons 1- 2
Anatomy of a Credential Stuffing Attack
Mathias Conradt, Senior Solutions Engineer, Auth0
As computer services become less expensive, malicious actors are able to execute bot-based attacks to access user accounts cheaper and easier than ever before. This means that threats are not limited to banks or “high value” targets. Rather, every-day consumer services are being attacked at scale, creating security challenges for retail, travel, food and media companies. What do these attacks look like? How do you identify them? How do you protect your customers and your business from compromised accounts and loss of digital assets?
In this session, we will discuss the shape and prevalence of modern bot threats including brute force and credential stuffing attacks and what you can do about them.
Salons 12-13 (Venus+Pluto)
6 Myths of PAM
Mohamed Ibbich, Lead Solutions Engineer, BeyondTrust
In this session, Mohamed will explain what the six myths of PAM are and why organizations should get away from them.
Salons 15-16 (Neptun+Mars)
Successful Identity Centric Projects
Dr. Stephan Hausmann, Sr. Solution Architect IAM EMEA, One Identity
This seminar will start with the concept of identity-based security. See how you can secure the identity of your line-of-business users, as well as your privileged users. Unfortunately, identity and access management projects are traditionally amongst the most difficult security activities that organizations can undertake. Stephan will run through some pitfalls and best practices.