Programme @

IDM europe

Identity Management

4 October 2022

Amsterdam

Programme @ IDM europe

Session One

towards a more robust, reliable and flexible ID- driven enterprise

  • Transcend digital identity barriers: towards a truly global IAM profile
  • A trusted digital ID: the key to a better provider-consumer relationship
  • Preparing for post-quantum cryptography
  • The power of disinformation in an identity-driven world
  • Mapping the integration of digital and physical: are we compromising privacy over convenience?
  • Panel Discussion and Audience Q&A: SSI and attribute-based identit

09:00 (CEST)

Conference Chair's Opening Address

09:05 (CEST)

Transcend digital identity barriers: towards a truly global IAM profile

Past evolutions have failed to provide a truly interoperable standard capable of providing a global mechanism for managing identities to support digital transactions.

In our opening address, we explore the current security and privacy space, examine its shortcomings, and identify what we need to do in order to provide a robust identity solution for society which transcends geographies, economies, and industries.

09:20 (CEST)

A trusted digital ID: the key to a better provider-consumer relationship

As technology transforms our lives, secure proof of identity, and authentication for connected services become ever more important.

Trusted ID for everyone, everything and at all times isn’t a far-off utopian dream, it can be realised today with the right tools, technology, people and processes in place.

So, why are we not delivering secure digital identities, and the means to verify them, for everyone and everything?

We address, how to be safe, secure and productive in a hyper-connected, device-heavy digital ID ecosystem.

  • Ensure data confidentiality and integrity at the source as well as the user
  • Create a trusted IoT infrastructure for device manufacturers
  • Provide data professionals as well as customers with peace of mind

09:35 (CEST)

Preparing for post-quantum cryptography

Quantum safe cryptography, also known as post quantum cryptography, is a new generation of the public-key cryptographic system that is undergoing NIST evaluation.

These new quantum cryptographic algorithms are based on hard mathematical problems that based on current research; even large quantum computers cannot break.

In this talk, we discuss the challenges this emerging technological leap will present to digital identity, and how best to prepare enterprise systems for the deployment of PQC algorithms.

09:50 (CEST)

The power of disinformation in an identity-driven world

Well-executed disinformation initiatives, whether conducted by bad actors, business adversaries or hostile nation states, have the potential to lead to misinformed business-critical decision making, a misperception of security capabilities, and irreparable reputational harm.

In the age of hyper-disinformation, the need to combat false news is more apparent than ever.

Join us as we discuss the role that the application of IAM and defensive AI can play in the fight back against this assault on truth and trust.

10:05 (CEST)

Mapping the integration of digital and physical: are we compromising privacy over convenience?

With more and more digital adoption we are connecting our physical and digital worlds in ways previously unimagined. Whilst this presents us with the space to create increasing degrees of convenience, it also enhances the likelihood of privacy being compromised.

The fundamental question is, how do we balance these trade-offs? And will the companies that find this balance foster greater loyalty?

Alongside the need for enterprise to adapt, the distributed world is becoming more and more mainstream.

Can we challenge ourselves to find the middle road, where we create great customer experiences that are also private and secure by design?

10:20 (CEST)

Questions to the Panel of Speakers

10:35 (CEST)

Refreshment Break Served in the Exhibition Area

11:05 (CEST)

Panel Discussion and Audience Q&A

SSI and attribute-based identity

An increasingly popular shift in identity management thinking is “Self-Sovereign Identity” (SSI), or “Decentralised Identity”.

The concept is rather than organisations being the centre point for ID, it is the user, with the credentials being derived from distributed sources and reused, and defined by the user, to optimize SSI privacy.

This panel will address the current state of adoption, initiatives of regional, supranational and international organisations to push SSI, and discuss its challenges and latest developments.

11:35 (CEST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

11:50 (CEST)

Seminar Sessions

12:30 (CEST)

Networking Lunch Served in the Exhibition Area

Session Two

adapting to the new normal with the right tools, technology, and processes

  • CIAM post-covid: How to better secure the virtualised enterprise for all
  • Security and privacy challenges of authentication, verification and authorisation of customers
  • The importance of centrality in customer IAM
  • Panel Discussion and Audience Q&A: Mastering the Hybrid IT Identity Challenge
  • IAM retail in a post covid world
  • Mastering the security challenge for AI
  • Building a PAM positive mindset

13:30 (CEST)

Conference Chair’s Afternoon Address

13:35 (CEST)

CIAM post-covid: How to better secure the virtualised enterprise for all

In the post COVID-19 era, IAM has become more critical than ever.

As businesses try to cope with the aftershocks and permanent changes brought about by the pandemic by adopting new cloud technologies, they now face a huge increase in users to manage as well.

Meanwhile, according to a recent poll, an average of 67 percent of respondents expect the future of work to be a hybrid arrangement that mixes office, onsite and remote working — meaning that employees, where possible, will want the flexibility to choose to work wherever they want.

So, what does this ‘’new normal’’ mean for IAM practitioners?

13:50 (CEST)

Security and privacy challenges of authentication, verification and authorisation of customers

This session will explore security and privacy challenges for businesses and customers in doing business with each other in a digital world, where there’s little desire to standardise approaches and processes on Authentication, Verification and Authorisation.

14:05 (CEST)

The importance of centrality in customer IAM

The transformation of the IAM landscape into a Multi Service Provider is taking shape.

The federated solution has been fully realised and has delivered on its promised benefits. However, business requirements are driving the need for a convenient and fast way to provision rights to users that, despite the growing portfolio of IAM products and processes, does not yet seem to have been catered to. Therefore, we need to build a solution to provide self service capability to the user at a pace which works for both the business and customer.

14:20 (CEST)

Questions to the Panel of Speakers

14:35 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:05 (CEST)

Panel Discussion and Audience Q&A

Mastering the Hybrid IT Identity Challenge

Organizations are rapidly moving to the cloud for cost savings, but they have many business-critical applications that are running on-premises. Managing IT and identity and access management (IAM) infrastructure both on premises and in the cloud results in complexities, such as large amounts of identity data that lead to migration and integration issues. The result? Security, user experience, and innovation are compromised.

So, what can be done to address these concerns while maximizing your investments in cloud and on premises?

In this keynote panel, we will discuss the current status of hybrid IT identity management, the risk dimensions resulting from the complexity of multi-cloud multi-platform hybrid infrastructures, and the solutions and possible standards to mitigate those risks and reduce complexity.

15:35 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

16:05 (CEST)

IAM retail in a post covid world

The pandemic has disrupted the way we live, work, and socialise in a manner previously unimagined. It is the greatest worldwide disruption since the second world war.

The changes it has brought have impacted all societies, economies and industries.

No more is this true than the retail industry due to its inherently user-consumer dynamic.

In response, IAM retail industry professionals have had to facilitate the move from physical shops to online marketplaces and respond to the new ways in which customers need to be served.

We address:

  • The new range of tools have been developed to serve the customers and support the supply chain
  • How do we make sure that the new tools are properly secured?
  • What are the challenges with securing the maintenance and monitoring loops?
  • how do you protect the devices from supply chain attacks against the command-and-control layer?
  • How do you handle securing legacy systems such as point of sales terminals?
  • Can analytics and machine learning help with identifying attacks in the M2M space?

16:20 (CEST)

Mastering the security challenge for AI

Artificial Intelligence (AI) has been boosting innovation and creating a whole new wave of business models.

With its rapid expansion into most use cases in many industries, a new threat landscape is evolving and as such presenting tough challenges to cybersecurity teams.

With its huge impact on the way we interact with technology, the need for good practices and high standards in securing AI infrastructures is becoming a priority.

In this session, we will:

  • Identify and describe common AI security threats
  • Talk about data quality, integrity and reliability
  • Discuss AI risk mitigation strategies
  • And look into the human factor of AI security

16:35 (CEST)

Building a PAM positive mindset

For many organisations, privileged access management tends to be viewed as creating barriers and maintaining limitations which that have been imposed upon them by an outside authority due to regulatory requirements.

It is for these reasons that PAM is viewed not as a positive feature of an organisations IAM investment strategy which compliments its overall capabilities, but as a burdensome cost to the business. Equally, many employees view it as simply another layer of control limiting their productive capacity.

We address, why PAM should be viewed as an instrument that can help pave a path to a more resilient, reliable, and robust future for the business.

16:50 (CEST)

Questions to the Panel of Speakers

17:00 (CEST)

Closing Remarks from the Conference Chair

17:05 (CEST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...