Programme @

IDM europe

Identity Management

26 March 2024

Van der Valk Hotel, Utrecht

Programme @ IDM europe

Morning Session

Understanding your users, customers and third-party actors IAM needs

  • Identities or community management?
  • Unleashing CIAM’s Potential: A Case Study on Elevating Security, User Experience, and Operational Efficiency
  • Cloud-Based CIAM
  • Migrating from Legacy to Modern IGA
  • Navigating Identity Evolution: From Past to Future
  • The EU Digitial Wallet is coming. Here’s what it means for you, the government and private sector across borders
  • How to minimize the blast radius of an attack (with privileged access)
  • PAM: The critical foundation for a successful Identity Security strategy

08:00 (CET)

Registration and Exhibition Opens

Refreshments will be available in the Exhibition area.

09:00 (CET)

Conference Chair's Opening Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

09:10 (CET)

Identities or community management?

Filip Nowak
Global Head of Cyber Defence, Ferrero
view profile

Filip Nowak, Global Head of Cyber Defense, Ferrero

In the era of super modernity and artificial agents, global identity management is extremely difficult and leads to other, also great, problems. On the other hand, this explicit management is necessary where the organization has specific and isolated challenges to solve. The author will present the socio-technical perspectives on managing identities and organizing communities in modern cyber environments.

 

09:40 (CET)

Unleashing CIAM's Potential: A Case Study on Elevating Security, User Experience, and Operational Efficiency

Matthew Berzinksi
Senior Director of Product Management, Ping Identity
view profile

Matthew Berzinski, Senior Director of Product Management, Ping Identity

As more financial services became primarily a digital experience, legacy applications and security systems were not able to keep up. By putting security in the epicentre of their innovation they were able to develop new capabilities where security enhanced end-user experiences and increased business, as opposed to being a hindrance as previously viewed.

In this session, we will delve into a case study illustrating how a leading financial service provider revamped their CIAM infrastructure to deliver:

– Increased conversion rate of new investor self-service enrollments
– Fast, yet secure, authentication for financial traders
– Flexible Journey Time Orchestration to meet unique user needs
– Improved Business Agility by reducing develop time to release new applications and features

 

09:55 (CET)

Cloud-Based CIAM

Maran Madiajagane
CISO, Ornikar
view profile

Maran Madiajagane, CISO, Ornikar

This session will explore:

• Cloud Adoption: A move towards cloud-based CIAM solutions to leverage scalability, flexibility, and cost-effectiveness.
• Microservices Architecture: Adoption of microservices architecture for CIAM systems, enabling organizations to develop, deploy, and scale services independently.
• Accelerated adoption of cloud-based IAM solutions to accommodate remote workforces, support scalability, and provide centralized identity management.

10:10 (CET)

Migrating from Legacy to Modern IGA

Paul Walker
Field Strategist, Omada
view profile

Paul Walker, Field Strategist, Omada

Join this session together with Omada’s Field Strategist, Paul Walker, who will walk you through the migration from a legacy identity system to modern IGA. The following key topics that will be covered are:

  • The challenges of legacy identity systems.
  • The benefits of a modern IGA solution – and how improved functionality will allow you to scale and be more agile.
  • The steps towards deploying a modern IGA solution explained through real-life customer cases.

10:25 (CET)

Navigating Identity Evolution: From Past to Future

Edwin Grimminck
Principal Solution Consultant, SailPoint
view profile

Edwin Grimminck, Principal Solution Consultant, SailPoint

To envision the future, one must first grasp the past. The transition from rudimentary IDM to today’s Identity Security embodies a pivotal shift towards a comprehensive and proactive stance in safeguarding digital identities amidst escalating threats. Reflecting on this journey offers invaluable insights into our present circumstances, the path that led us here, and the trajectory we must pursue. Join us in this session as we explore this evolutionary journey, elucidate existing challenges, and anticipate the unfolding landscape of Identity in the days to come.

10:40 (CET)

Questions to the Panel of Speakers

11:00 (CET)

Refreshment Break Served in the Exhibition Area

11:25 (CET)

Welcome to Session Two

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

11:30 (CET)

Enhancing Digital Defenses: Progressing on the Path to Privileged Access Security Mastery for a Robust Security Framework

Patrick van der Veen
Director Sales Engineering – Northern Europe, Delinea
view profile

Patrick van der Veen, Director Sales Engineering – Northern Europe, Delinea

  • Strategies for minimizing your vulnerability footprint through advanced PAM functionalities
  • Techniques for achieving equilibrium between operational efficiency and security through PAM
  • A blueprint for perpetual enhancement and a methodical tactic for managing incidents and crises
  • Insights into the advantages of expanding your PAM initiatives beyond basic security measures

11:45 (CET)

How we minimized the blast radius of an attack with privileged access management

Michiel Stoop
Head of Identity and Access, Philips
view profile

Michiel Stoop, Head of Identity and Access, Philips

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

12:00 (CET)

PAM: The critical foundation for a successful Identity Security strategy

Matthew Sturman
Senior Solutions Engineer, BeyondTrust
view profile

Matthew Sturman, Senior Solutions Engineer, BeyondTrust 

Identity compromise and misuse are central to almost every cyberattack. This is causing a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security.

This session will cover:

  • How gaps in visibility between Identity Access Management (IAM) and security tools create vulnerabilities
  • How impersonated identities can be exploited to access resources, compromise systems, and achieve illicit objectives
  • The emerging field of Identity Threat Detection and Response (ITDR)

12:15 (CET)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

12:30 (CET)

Seminar sessions

13:15 (CET)

Networking Lunch Served in the Exhibition Area

Afternoon Session

Ensuring Europe is the lead global force in IAM

  • Pain points in achieving external collaboration
  • The EU Digitial Wallet is coming. Here’s what it means for you, the government and private sector across borders
  • Segregation of Duties And Beyond – Analyzing the Data Cube
  • Step-Up : IAM and IT vendors
  • Organizational Identity in the Private and Public Sector with the vLEI
  • On the Highway to Cloud Security Hell: Technical Accounts & Access Control

14:00 (CET)

Conference Chair’s Afternoon Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

14:05 (CET)

Pain points in achieving external collaboration

Mathieu Ahlstrom
IAM Team Manager, Inter IKEA
view profile

Mathieu Ahlstrom, IAM Team Manager, Inter IKEA

Every organisation today does business with its partners, and the increased digitisation of the value chain increases the complexity of managing access security while avoiding unnecessary friction. Self-sovereign identities are not quite here yet, while cloud identities create challenges of governance and synchronisation. Mathieu Ahlstrom will share some of the inflection points and focus areas that he sees as important for today and relevant for the future.

 

14:20 (CET)

The EU Digital Wallet is coming. Here’s what it means for you, the government and private sector across borders

Annet Steenbergen
Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)
view profile

Annet Steenbergen, Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)

The eIDAS 2.0 regulation is -almost- a fact and this means that very soon European citizens and residents can use, if they wish, a harmonized European digital identity wallet (EUDI) that they can use to safely identify themselves online.

The implications of the EUDI wallet have the potential to be immense and will change the way we identify ourselves digitally and the data we share or do not share online. Imagine having a digital wallet that contains credentials such as a driver’s licence, health insurance, education credentials, hotel reservations, boarding passes, bank cards, company identity card and gives the option to prove you are over 18 or even just to prove you are a person.

The EU Digital Identity Wallet Consortium is currently running a large-scale pilot in Europe that will use the EUDIW for use cases combining travel, payment, and digital identity.

This presentation will focus on:

  • The eIDAS 2.0 regulation and the EU digital identity wallet
  • How do verifiable credentials work?
  • The EWC large-scale pilot; the travel use case together with payment and organizational digital identity

14:35 (CET)

Segregation of Duties and Beyond - Analyzing the Data Cube

Stefan Bosnjakovic
External IAM & GRC Architect, Glencore International AG
view profile

Stefan Bosnjakovic, External IAM & GRC Architect, Glencore International AG

So you finally got your SoD-framework working and now you are swamped with hundreds of thousands or even millions of SoD-violations. Where do you go from here and where should you start? In this discussion, Stefan will analyse the violations data cube, drill into the results, try to make sense of them, find the biggest drivers, and sketch out a sensible plan for remediation. He will also look at application roles, SoD rules, business taxonomies, entitlement mappings, and front, middle and back office separation and setting up remediation teams.

14:55 (CET)

Questions to the Panel of Speakers

15:10 (CET)

Afternoon Networking and Refreshments served in the Exhibition Area

15:35 (CET)

Welcome to Session Five

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

15:40 (CET)

Step-Up : IAM and IT vendors

Nikhil Gulati
Enterprise Identity & Security Operations Team Lead, PVH Corp
view profile

Nikhil Gulati, Enterprise Identity & Security Operations Team Lead, PVH Corp

This session will explore:

• Need for Integration
• Common Pitfalls in ‘Modern Implementation’ scenarios
• What can we do – Enforce implementation of IAM protocols

15:55 (CET)

Organizational Identity in the Private and Public Sector with the vLEI

Christoph Schneider
Head of IT Development and Operations, Global Legal Entity Identifier Foundation (GLEIF)
view profile

Christoph Schneider, Head of IT Development and Operations, Global Legal Entity Identifier Foundation (GLEIF)

With heightened reliance on remotely delivered services and transactions, the need for safer and sounder digital identification and verification is required and will become the norm in the future. This especially is true looking forward to mandates for the adoption of zero trust frameworks in which digital credentials will be issued and then used for identification and operational purposes. GLEIF is committed to making concrete and lasting improvements to the process of identity verification by leveraging the Legal Entity Identifier (LEI) in digital tools. GLEIF has made the LEI verifiable by creating the vLEI (verifiable LEI) with digital credentials that deliver decentralized identification and verification for organizations as well as the persons who represent their organizations either in official or functional roles. GLEIF has developed the governance, credentials and infrastructure since introducing the vLEI in 2020, will share an update on progress and will provide a pilot example addressing the identification, authentication, authorization, security and management of users in charge of submitting mandated supervisory reporting.

16:10 (CET)

On the Highway to Cloud Security Hell: Technical Accounts & Access Control

Klaus Haller
Senior Security Architect, AXA Switzerland
view profile

Klaus Haller, Senior Security Architect, AXA Switzerland 

Still fixated on safeguarding privileged users in the cloud? Not bad for 2020. In 2024, however, infrastructure-as-code, CI/CD pipelines, and the ubiquitous cloud adoption turned seemingly harmless technical accounts into perfect gateways for hackers aiming to shut down and erase complete data centers in the cloud. All too often, sensitive technical accounts are exposed to the internet and insufficiently protected.

To help you fight these risks, this presentation:

  • Elaborates the use case scenarios for technical accounts in the cloud
  • Identifies the most relevant security risks
  • Explores technical mitigation options

So, let’s address the risks of 2024 together – and make sure we leave the highway early enough before ending up in ransomware hell!

16:25 (CET)

Questions to the Panel of Speakers

16:40 (CET)

Closing Remarks from the Conference Chair

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

16:45 (CET)

Conference Closes Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...
Uniting large-scale, complex businesses with PowerSyncPro
Blog by: PowerSyncPro Mergers and acquisitions involving tens – or even hundreds – of thousands of users require complex tenant-to-tenant migrations. Traditionally, those migrations have been fraught with problems. Problems that impact your people, your productivity and your profit. Combining solid preparation with the right software solution can dramatically reduce the pain involved. Enter PowerSyncPro:...