Morning Session
Understanding your users, customers and third-party actors IAM needs
- Will we use IAM thinking to implement CIAM?
- Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
- Defeating the Bots -How AI is enabling organisations to save their brand and their revenues
- Case Study: Journey with FIDO2 Authentication
- Securing the future of digital identity
- Intro to meeting NIS2 compliance for Privileged Access
- Prevention of Lateral Movement using MFA and service account protection in Active Directory
- PAM: The critical foundation for a successful Identity Security strategy
08:00 (CEST)
Registration and Exhibition Opens
Refreshments will be available in the Exhibition area.
09:00 (CEST)
Conference Chair's Opening Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profileRobert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
09:10 (CEST)
Will we use IAM thinking to implement CIAM?
Bruno Falcão, CIAM Product Manager, Roche
An alternative thinking on how to build your CIAM solutions not being biased by your IAM experience and self-learning. Bruno will trigger new reflections about what is important to think in CIAM and leave your IAM thinking behind.
- What should you focus on when implementing your CIAM solution?
- How to break your biased thoughts because you are thinking IAM to implement CIAM
- What should you focus on next, after your first steps into CIAM?
09:40 (CEST)
Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
Hans-Robert Vermeulen, Identity Strategist, SailPoint
As you try to defend yourselves against current threats and have the desire to better control the access you hand out, you need to choose the right solution. With vendors in the Access Management and Privileged Access Management space branching out and offering IGA-like capabilities, it becomes more difficult to choose. Especially if you must rely on websites of different vendors, as you will quickly learn that they all use the same verbiage, making it difficult to understand the actual differences between these offerings. Differences you will need to understand to distinguish between the life jacket and the lifeboat before committing to a solution.
09:55 (CEST)
Defeating the Bots -How AI is enabling organisations to save their brand and their revenues
Matthew Berzinski, Senior Director of Product Management, ForgeRock
With the rapid increase in online commerce, it is imperative that organisations deliver great, friction free online experiences to customers to drive brand loyalty and grow business. However malicious actors are taking advantage of this by leveraging bots and other technology to buy out highly sought after items and then resell them on secondary markets, thus driving down brand loyalty and getting between organisations and their customers. In this session we will review a case study of how retail organisations are using Artificial Intelligence and flexible journey orchestration to keep their inventory out of the hands of the fraudsters and available for their loyal customers.
10:10 (CEST)
Case Study: Journey with FIDO2 Authentication
Shashi Prakash Singh, IAM Architect, ABN AMRO Bank N.V.
FIDO2 (Fast Identity Online 2) is a set of standards for secure and convenient authentication. It uses public key cryptography to enhance security and eliminate the need for traditional passwords. This case study demonstrates how FIDO2 can be applied in the context of employee authentication, providing a balance between security and user convenience.
Using Authentication Priorities on its mission to implement safe and easy authentication solution, ABN AMRO has identified two fundamental priorities:
1. User experience
2. Security
10:25 (CEST)
Securing the future of digital identity
Mehmet Yaliman, Principal Solutions Architect, Ping Identity
Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials. Decentralized identity represents a massive paradigm shift to a safer, more secure future by making the user’s device the transport mechanism for that single user’s data. In other words, no more “trusted” third parties.
Decentralized identity eliminates the need to build connections into federation systems, and reduces the amount of personally identifiable information organizations must collect.
In short, we’ll discuss how shifting to a decentralized identity model reduces risk for organizations while simultaneously improving users privacy.
10:40 (CEST)
Questions to the Panel of Speakers
11:00 (CEST)
Refreshment Break Served in the Exhibition Area
11:25 (CEST)
Welcome to Session Two
11:30 (CEST)
Intro to meeting NIS2 compliance for Privileged Access
Chris Dearden, Systems Engineer, Delinea
The revised NIS Directive, also known as the NIS2 Directive, has an impact on the cybersecurity practices of critical or important European entities. The primary objective of the NIS2 directive is to better protect organizations that are critical to economic and social development in the EU. Privileged Access Management (PAM) is key to achieving compliance with the NIS/NIS2 Directives. In this session , see how the Delinea platform can provide effective vaulting , Server & Workstation PAM and 3rd party Remote access to meet those compliance needs.
11:45 (CEST)
Prevention of Lateral Movement using MFA and service account protection in Active Directory
Frank Leavis, Solution Engineer EMEA, Silverfort
In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.
What are the security gaps to address this exponential phase of the attack?
This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.
12:00 (CEST)
PAM: The critical foundation for a successful Identity Security strategy
James Maude, Director, Research, BeyondTrust
There is a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security. Attackers are successfully exploiting gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR)
In this session we will discuss:
- Examples of tactics used in real world attacks and highlight mitigations available.
- How Privilege Access Management (PAM) is evolving to meet the needs of ITDR.
- How implementing least privilege and PAM as foundational controls can thwart attackers exploiting privileged accounts and overly permissive access to systems.
12:15 (CEST)
Questions to the Panel of Speakers & Delegates move to the Seminar Rooms
12:30 (CEST)
Seminar sessions
13:15 (CEST)
Networking Lunch Served in the Exhibition Area
Afternoon Session
Ensuring Europe is the lead global force in IAM
- PGGM – an IGA case story
- When one becomes two: Resource hierarchy strategies for a divested organization
- Case Study – The Rise of Organisation Identity
- MFA Migration Lessons Learned
- Mergers & Acquisitions: How a modern IGA provides a smooth and efficient process
- Future of IAM : How will IAM evolve in the Future? And How can IAM help organizations stay ahead of the curve?
14:00 (CEST)
Conference Chair’s Afternoon Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profileRobert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
14:05 (CEST)
PGGM – an IGA case story

Ronald Zierikzee
Senior Solution Architect, Omada
view profile
Nick Baring, IAM Solution Architect and Rudi de Bruijne, IAM Engineer
PGGM
view profileNick Baring, IAM Solution Architect, PGGM
Rudi de Bruijne, IAM Engineer, PGGM
Ronald Zierikzee, Senior Solution Architect, Omada
In this session you will learn about PGGM’s journey from a home-grown solution to Modern Identity Governance that has helped them improve security, efficiency and compliance. PGGM is a not-for-profit cooperative pension fund service provider in the Netherlands.
14:20 (CEST)
When one becomes two: Resource hierarchy strategies for a divested organization
Manjir Sen, Technical Product Owner, Nuuday A/S
This presentation will cover various scenarios encountered by Nuuday whilst going through a complex scenario. Various cybersecurity concerns occur during the splitting of an organisation due to the changing of staff, access rights, and asset transition. This is a 4-year process that requires an IAM programme supported by the right technology to maximise productivity, promote growth, and safeguard sensitive corporate assets, whilst ensuring the whole process is seamless for the end-user.
- IAM is an integral part of establishing Nuuday’s independent identity processes separated from TDC NET.
- IAM is responsible for splitting the ownership of Identity and Business Data between Nuuday and TDCNET.
- IAM is responsible for splitting the consumer and B2B user journeys for Nuuday and TDC NET.
14:35 (CEST)
Case Study - The Rise of Organisation Identity
Simon Wood, Group CEO, Ubisecure
This case study will explore:
• What is organisation identity, and why do we need it? Case Study: The Good, the Bad and the Ugly.
• Which organisation identity should we use?
• The value is from the context.
14:50 (CEST)
Questions to the Panel of Speakers
15:05 (CEST)
Afternoon Networking and Refreshments served in the Exhibition Area
15:30 (CEST)
Welcome to Session Five

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profileRobert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
15:35 (CEST)
MFA Migration Lessons Learned
Martin Sandren, IAM Product Lead, IKEA
Most enterprises today have one or even several MFA systems in place. At some point, there may be strong business or technical reasons to move to a single MFA platform or migrate to a new platform.
This talk discusses the challenges that you will run into during an MFA migration and how to best mitigate the risks and resolve the issues.
15:50 (CEST)
Mergers & Acquisitions: How a modern IGA provides a smooth and efficient process
Anette Lavu, IT Service Manager, Identity & Access Management, Valmet
When companies merge or do an acquisition a smooth creation of digital identities is fundamental for ensuring that everyone has the right access to the IT landscape. In this session you will learn how Valmet benefits from Saviynt IGA to migrate and manage identities as well as onboard applications in acquisitions.
In this session we will discuss:
- Best practices
- Employee migration process
- Application migration process
- Lessons Learned & Takeaways
16:05 (CEST)
Future of IAM : How will IAM evolve in the Future? And How can IAM help organizations stay ahead of the curve?
Aditya Kumar, IOT Lead Solution Designer, Vodafone Business
The Future of IAM is mostly likely to focus on:
- The rise of cloud-based IAM solutions
- Increasing use of Biometric Authentication
- The adoption of zero-trust architecture
- Use of AI/ML in IAM
- Continuous Authentication
IAM is an essential tool for organizations that want to stay ahead of the curve in terms of security, compliance, and agility by:-
- Improving Security
- Reducing Compliance Risk
- Increasing Agility and Efficiency
- Improving User Experience
16:20 (CEST)
Questions to the Panel of Speakers
16:35 (CEST)
Closing Remarks from the Conference Chair
16:45 (CEST)
Conference Closes Delegates Depart
Please note:
Whitehall Media reserve the right to change the programme without prior notice.
Follow us on social
Keep up to date with what's going on by following us on social media.