Seminars @

IDM europe

Identity Management

4 October 2023

Van der Valk Hotel, Utrecht

Seminars @ IDM europe

Seminars @ 12:30 – 13:15

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

How to leverage identity outcomes to foster organisational collaboration and drive business growth


Matthew Berzinski, Senior Director, Product Management, ForgeRock
Jochen Raymaekers, Principal Solution Architect, ForgeRock

What is IAM? How many versions of the same narrative does your organisation have? Explaining what Identity & Access Management is to non-technical people is hard enough, but to get alignment across a project team of different business personas is nearly impossible. Each team member has their own perception of IAM and what they need from the project that may seem incongruous with each other, however by digging deeper you can usually relate them all back to a few fundamental Identity Outcomes. Join this session to understand why Identity Outcomes speaks your language (and theirs), better than Use Cases and how you can leverage them to sell the value of IAM internally and drive efficient coherent deployments of the technology.

Matthew Berzinski – SEMINAR
Senior Director of Product Management, ForgeRock
view profile
Jochen Raymaekers
Principal Solution Architect, ForgeRock
view profile
Room / Location:
Main Conference Room

Cyber Threats: What You’re Up Against & How to Defend with PAM


James Maude, Director, Research, BeyondTrust

Cyber Threats shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Attack Chain, creating new planes of privileges for attackers to exploit. Breaking the chain is more vital than ever. Despite this, organizations continue to mishandle projects, leaving themselves at significant risk of attack.

Following his main stage session, join James Maude, Director, Research, as he takes a deep dive into exploring how to break the cyber-attack chain with Privilege Access Management (PAM).

James Maude – SEMINAR
Director, Research, BeyondTrust
view profile
Room / Location:
Oudegracht 5 Room

Build vs Buy: Is your Customer Identity Project Slowing Down Time-to-Market?


Jeremy Durand, Solutions Engineer, Okta

It’s a login box. How hard can it be? Every team building a web or mobile app faces the same dilemma when adding new functionality: Should we build it in-house or use out-of-the-box services? And, more often than not, authenticated user access sparks the debate. For those that opt to build Customer Identity solutions in house, the logic looks like this: Our developers can handle customer identity. It’s only a login box after all! But Customer Identity is so much more than just the login box. As businesses grow and add features, maintaining a homegrown solution can be a major drain on resources. Developer time spent on DIY identity, security, and privacy compliance is time taken away from core business innovation.

In this seminar, we will discuss how dev teams can:
– Lower the total cost of ownership (TCO) of application development ~
– Reduce the risk of a security and compliance breach
– Keep developers motivated and improve engineering efficiency

Jeremy Durand
Solutions Engineer, Okta
view profile
Room / Location:
Domtoren 3 Room

Privileged Access Governance


Alan Radford, Field Strategist, One Identity

Privileged Access Management (PAM) technologies are often used as standalone solutions, without proper integration to other security process controls that are in place, particularly when it comes to Identity Governance and Administration (IGA) technologies.

Organizations that operate PAM and IGA in silos, lack the ability to apply consistent access policies across end-to-end access mapping and provisioning processes for privileged accounts. Without these systems integrated, they lose 360-degree visibility of identities and user accounts, rights, and activities associated with them, left unable to answer who has access to request what access, how and why.

Join this session to learn how the One Identity unified approach to consolidating identity security silos can help you become more secure and efficient within your security program.

Alan Radford
Field Strategist, One Identity
view profile
Room / Location:
Domtoren 4 Room

Using Artificial Intelligence and Machine Learning in Identity Security


Suleyman Mun, Solutions Engineer, Saviynt

ChatGPT has certainly caused a stir over the past few months, magnifying the discussion around artificial intelligence (AI) and its use in all aspects of our world.  But there are still questions as to what AI and machine learning (ML) really are and how they work.

In this seminar we will discuss the impact of AI and ML in identity security and how it helps simplify program management, assisting administrators with their daily tasks, and helping end users focus on their core responsibilities.

Learn how AI and ML simplify overall program management and reduce an organisation’s threat landscape. This session will include:

  • Defining the difference between artificial intelligence and machine learning
  • The history of AI and ML in security
  • Benefits AI and ML within Identity Governance
  • How Saviynt uses machine learning to support strong identity security programs
Suleyman Mun
Solutions Engineer, Saviynt
view profile
Room / Location:
Domtoren 5 Room

Strengthening Anti-Fraud Strategies: Enhancing Risk Mitigation & Efficiency with Orchestration and Detection & Response


Maurice Luizink, Director of Solutions Engineering EMEA, Transmit Security

Join us in this insightful seminar as Transmit Security delves into the advanced strategies employed by leading digital platform providers in their fight against fraud. Maurice Luizink, Director of Solutions Engineering EMEA at Transmit Security, will detail how we partner with these industry leaders to tackle and resolve complex anti-fraud challenges, harnessing the power of our Orchestration and Detection and Response services.

Throughout the seminar, attendees will gain clarity on the complexities and challenges faced by digital platform providers concerning identity architecture and its alignment with holistic fraud strategies. Maurice will illustrate how Transmit Security’s Orchestration and Detection & Response Services can streamline these architectures, dramatically mitigating fraud, improving customer experience, and reducing management overheads.

This seminar is a touchstone for both business and security professionals, and anyone keen on discovering potent, real-world solutions for digital identity risk management and augmenting anti-fraud strategies. Harness this unique opportunity to assimilate invaluable insights from industry pioneers and fortify your understanding of the challenges in today’s dynamic digital landscape.

Maurice Luizink
Director of Solutions Engineering EMEA, Transmit Security
view profile
Room / Location:
Domtoren 6 Room

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

identity and access management
What Are The Biggest Cybersecurity Threats in 2024?
We may be into the summer of 2024, but there are still plenty of surprises left in store in the world of cybersecurity to present issues for the rest of the year. Identity and access management is always going to be a moving target, battling to stay ahead or catch up with the latest security...
IAM: What the World is Saying
If you are a business pulling through the post-pandemic years and harnessing the potential of digital workspaces and marketplaces, identity management and access management are no longer an option – they are a necessity. It is the fundamental protection measure for the company’s digital resources, including networks, applications, and organizational and user data. Without robust...
Why Identity is the Cornerstone of a Zero Trust Architecture
Written by Scott Silver, Xalient  As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity. As we continue to digitally transform organisations,...