Seminars @

IDM europe

Identity Management

26 March 2024

Van der Valk Hotel, Utrecht

Seminars @ IDM europe

Seminars @ 12:30 – 13:15

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Empower Users with Identity – Navigating to Decentralised Identity


Matthew Berzinski, Senior Director of Product Management, Ping Identity
Jochen Raymaekers, Principal Solution Architect, Ping Identity

In an age of rampant data breaches and identity theft, empowering users, including your workforce and customers, to autonomously handle and share personal data is reshaping the identity landscape. Explore decentralised identity principles with us to:

1. Empower your users to securely manage and control personal data, make anonymous identity claims without unnecessary exposure and explicitly authorise data visibility on a need-to-know basis.

2. Reduce attack surfaces and minimise risk of breaches tied to vulnerable centralised authorities to enhance organisational privacy and security.

Jochen Raymaekers
Principal Solution Architect, Ping Identity
view profile
Matthew Berzinksi
Senior Director of Product Management, Ping Identity
view profile
Room / Location:
Main Conference Hall

Unlocking the Key to Identity Security Success: The Vital Role of PAM


Matthew Sturman, Senior Solutions Engineer, BeyondTrust

The world of cyber security is changing, with more dynamic highly connected systems than ever. Cloud proliferation has caused an explosion of apps, accounts, and access which makes it now impossible to distinguish between how a legitimate user is leveraging an identity, and how an unauthorised user may be misusing an identity. This has in turn forced the cyber battleground to shift from traditional perimeter and endpoint security into the world of identity security. Following on from his main agenda session, join Matthew as he discusses what is driving this paradigm shift and how attackers are successfully exploiting the gaps in visibility between Identity Access Management (IAM) and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR).

You will hear:

– Why Identity Security is so challenging.
– How ITDR can provide a centralized view of Identities and their entitlements across multi-Cloud and application environments
– How ITDR can detect Indicators of Identity Compromise.
– An example of a real-world Identity Breach and how it was controlled with ITDR.

Matthew Sturman
Senior Solutions Engineer, BeyondTrust
view profile
Room / Location:
Oudegracht 5 Room

A Converged Identity Approach – The Foundation for Identity Threat Protection


Martijn Morshuis, Senior Solutions Engineer, Okta

Gartner predicts that by 2025, 70% of new access management, governance, administration and privileged access deployments will be converged identity and access management platforms. But:

  • What does a ‘Converged Approach to Identity’ look like?
  • Where to start when already having some IAM point solutions in-house?
  • And how to combine PAM, IAM & IGA functionalities to avoid ending up with a traditional siloed identity landscape?

It’s time to approach Identity & Access Management in a converged way and to discuss how to center your security strategy around a modern Converged Identity Platform (CIP).

Martijn Morshuis
Senior Solutions Engineer, Okta
view profile
Room / Location:
Domtoren 4 Room

Signify’s Contractor Identity Transformation Journey. A live case study


Thijs Wollerich, Security Manager – Identity & Access Governance, Signify
Roger Veldpaus, Account Executive, Benelux, Saviynt

With around 32,000 employees, Signify is the world leader in lighting for professionals, consumers and lighting for the Internet of Things. Their energy efficient lighting products, systems and services enable their customers to enjoy a superior quality of light, and make people’s lives safer and more comfortable, businesses more productive and cities more liveable. 

Explore the pivotal role played by the governance of contractor identities in Signify’s IAM strategy. 

Join Thijs Wollerich, Security Manager – Identity & Access Governance at Signify, as he delves into the journey towards implementation. This is your chance to engage in a dialogue, gain insights, and draw from Thijs’ wealth of experience.

Thijs Wollerich
Security Manager - Identity & Access Governance, Signify
view profile
Roger Veldpaus
Account Executive, Benelux, Saviynt
view profile
Room / Location:
Domtoren 3 Room

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...
Uniting large-scale, complex businesses with PowerSyncPro
Blog by: PowerSyncPro Mergers and acquisitions involving tens – or even hundreds – of thousands of users require complex tenant-to-tenant migrations. Traditionally, those migrations have been fraught with problems. Problems that impact your people, your productivity and your profit. Combining solid preparation with the right software solution can dramatically reduce the pain involved. Enter PowerSyncPro:...