Programme @

IDM europe

Identity Management

26 March 2024

Van der Valk Hotel, Utrecht

Programme @ IDM europe

Morning Session

Understanding your users, customers and third-party actors IAM needs

  • Managing External Identities Using a Customer Identity and Access Management Tool
  • Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
  • Defeating the Bots -How AI is enabling organisations to save their brand and their revenues
  • What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages
  • Securing the future of digital identity
  • Intro to meeting NIS2 compliance for Privileged Access
  • Prevention of Lateral Movement using MFA and service account protection in Active Directory
  • PAM: The critical foundation for a successful Identity Security strategy

08:00 (CEST)

Registration and Exhibition Opens

Refreshments will be available in the Exhibition area.

09:00 (CEST)

Conference Chair's Opening Address

09:10 (CEST)

Managing External Identities Using a Customer Identity and Access Management Tool

We will discuss recommended top practices around CIAM, how to take your CIAM strategy to the next level and how to plan for the best user experience to achieve your goals.

  • What is Customer IAM (CIAM)?
  • What are the key considerations for an effective CIAM strategy?
  • What should you focus on when implementing your CIAM solution?
  • How to break an IAM mindset when implementing CIAM
  • What should you focus on after your first steps into CIAM?

09:40 (CEST)

Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?

As you try to defend yourselves against current threats and have the desire to better control the access you hand out, you need to choose the right solution. With vendors in the Access Management and Privileged Access Management space branching out and offering IGA-like capabilities, it becomes more difficult to choose. Especially if you must rely on websites of different vendors, as you will quickly learn that they all use the same verbiage, making it difficult to understand the actual differences between these offerings. Differences you will need to understand to distinguish between the life jacket and the lifeboat before committing to a solution.

09:55 (CEST)

Defeating the Bots -How AI is enabling organisations to save their brand and their revenues

With the rapid increase in online commerce, it is imperative that organisations deliver great, friction-free online experiences to customers to drive brand loyalty and grow business. However, malicious actors are taking advantage of this by leveraging bots and other technology to buy out highly sought-after items and then resell them on secondary markets, thus driving down brand loyalty and getting between organisations and their customers. In this session, we will review a case study of how retail organisations are using Artificial Intelligence and flexible journey orchestration to keep their inventory out of the hands of fraudsters and available for their loyal customers.

10:10 (CEST)

What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages

FIDO2’s primary goal is to do away with the need for passwords when using the Internet. It was created to provide open, license-free standards for safe, password-free online authentication. By substituting the FIDO2 login standard for the traditional login username and password, the FIDO2 authentication procedure removes the associated risks. It defends against frequent online threats including phishing and man-in-the-middle assaults as a result.

  • FIDO2 vs. U2F – What is the Difference?
  • FIDO2 Advantages and Disadvantages
  • Getting started with FIDO2 authentication

10:25 (CEST)

Securing the future of digital identity 

Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials. Decentralized identity represents a massive paradigm shift to a safer, more secure future by making the user’s device the transport mechanism for that single user’s data. In other words, no more “trusted” third parties.

Decentralized identity eliminates the need to build connections into federation systems, and reduces the amount of personally identifiable information organizations must collect.

In short, we’ll discuss how shifting to a decentralized identity model reduces risk for organizations while simultaneously improving users privacy.

10:40 (CEST)

Questions to the Panel of Speakers

11:00 (CEST)

Refreshment Break Served in the Exhibition Area

11:25 (CEST)

Welcome to Session Two

11:30 (CEST)

Intro to meeting NIS2 compliance for Privileged Access

The revised NIS Directive, also known as the NIS2 Directive, has an impact on the cybersecurity practices of critical or important European entities. The primary objective of the NIS2 directive is to better protect organizations that are critical to economic and social development in the EU. Privileged Access Management (PAM) is key to achieving compliance with the NIS/NIS2 Directives. In this session , see how the Delinea platform can provide effective vaulting , Server & Workstation PAM and 3rd party Remote access to meet those compliance needs.

11:45 (CEST)

Prevention of Lateral Movement using MFA and service account protection in Active Directory

In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business-critical assets.

What are the security gaps to address this exponential phase of the attack?

This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.

12:00 (CEST)

PAM: The critical foundation for a successful Identity Security strategy

There is a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security. Attackers are successfully exploiting gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR)

In this session we will discuss:

  • Examples of tactics used in real world attacks and highlight mitigations available.
  • How Privilege Access Management (PAM) is evolving to meet the needs of ITDR.
  • How implementing least privilege and PAM as foundational controls can thwart attackers exploiting privileged accounts and overly permissive access to systems.

12:15 (CEST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

12:30 (CEST)

Seminar sessions

13:15 (CEST)

Networking Lunch Served in the Exhibition Area

Afternoon Session

Ensuring Europe is the lead global force in IAM

  • How to Confidently Deploy and Scale a Modern IGA Program
  • When one becomes two: Resource hierarchy strategies for a divested organization
  • Case Study – The Rise of Organisation Identity
  • MFA Migration Lessons Learned
  • Mergers & Acquisitions: How a modern IGA provides a smooth and efficient process
  • The Future of IAM

14:00 (CEST)

Conference Chair’s Afternoon Address

14:05 (CEST)

How to Confidently Deploy and Scale a Modern IGA Program

When implemented correctly, IGA simplifies security and provides you with useful information about the needs and activities of your staff. When done incorrectly, it is seen as a bothersome waste of time and puts your business at risk. Unfortunately, today’s version that isn’t done correctly is the standard. We’ll discuss what constitutes a robust and effective IGA programme.

 

14:20 (CEST)

When one becomes two: Resource hierarchy strategies for a divested organization

Companies constantly sell off portions of their assets and create new corporate entities, whether it’s to follow a different business plan or to gain more focus and autonomy. These separated organisations may choose to remain partially affiliated with the parent company or operate entirely independently of it. However, cloud resources can complicate the divestiture process, no matter what shape they take.

14:35 (CEST)

Case Study - The Rise of Organisation Identity

This case study will explore:

• What is organisation identity, and why do we need it? Case Study: The Good, the Bad and the Ugly.
• Which organisation identity should we use?
• The value is from the context.

14:50 (CEST)

Questions to the Panel of Speakers

15:05 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:30 (CEST)

Welcome to Session Five

15:35 (CEST)

MFA Migration Lessons Learned

Most enterprises today have one or even several MFA systems in place. At some point, there may be strong business or technical reasons to move to a single MFA platform or migrate to a new platform.

This talk discusses the challenges that you will run into during an MFA migration and how to best mitigate the risks and resolve the issues.

15:50 (CEST)

Mergers & Acquisitions: How a modern IGA provides a smooth and efficient process

When companies merge or do an acquisition a smooth creation of digital identities is fundamental for ensuring that everyone has the right access to the IT landscape. In this session, you will learn how to migrate and manage identities as well as onboard applications in acquisitions.

In this session we will discuss:

  • Best practices
  • Employee migration process
  • Application migration process
  • Lessons Learned & Takeaways

16:05 (CEST)

The Future of IAM

The Future of IAM is mostly likely to focus on:

  • The rise of cloud-based IAM solutions
  • Increasing use of Biometric Authentication
  • The adoption of zero-trust architecture
  • Use of AI/ML in IAM
  • Continuous Authentication

IAM is an essential tool for organizations that want to stay ahead of the curve in terms of security, compliance, and agility by:-

  • Improving Security
  • Reducing Compliance Risk
  • Increasing Agility and Efficiency
  • Improving User Experience

16:20 (CEST)

Questions to the Panel of Speakers

16:35 (CEST)

Closing Remarks from the Conference Chair

16:45 (CEST)

Conference Closes Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Phased Approach: The Importance of Building a Mature PAM Program
Blog By: Xalient  The ever-present cybersecurity threats and the high costs of cyber insurance are driving many organizations to consider building a mature Privileged Access Management (PAM) program to protect their systems and infrastructure. When approaching PAM, organizations often view the process as a one-time solution implementation to help them stay compliant. The reality is...
Optimized IGA: The Power of Clear Skye + ServiceNow
Blog by: Clear Skye  Our decision to build our software natively on ServiceNow is a big part of what enables us to approach identity differently—dare we say better?—than other players in the game. It’s not just our opinion that the platform way is the best way—so why settle for better when we could be the...
The Crucial Role of Identity in Zero Trust Security
Written by Jaye Tilson, Field CTO, HPE Aruba Networking and Brian Ramsey, VP America, Xalient In an increasingly digital world where cybersecurity threats are constantly evolving, organizations are embracing new strategies to protect their sensitive data and assets. One such approach that has gained prominence in recent years is Zero Trust. Zero Trust challenges the traditional...