Seminars @

IDM europe

Identity Management

4 October 2023

Van der Valk Hotel, Utrecht

Seminars @ IDM europe

Seminars @ 12:30 – 13:15

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

How to leverage identity outcomes to foster organisational collaboration and drive business growth


Matthew Berzinski, Senior Director, Product Management, ForgeRock
Jochen Raymaekers, Principal Solution Architect, ForgeRock

What is IAM? How many versions of the same narrative does your organisation have? Explaining what Identity & Access Management is to non-technical people is hard enough, but to get alignment across a project team of different business personas is nearly impossible. Each team member has their own perception of IAM and what they need from the project that may seem incongruous with each other, however by digging deeper you can usually relate them all back to a few fundamental Identity Outcomes. Join this session to understand why Identity Outcomes speaks your language (and theirs), better than Use Cases and how you can leverage them to sell the value of IAM internally and drive efficient coherent deployments of the technology.

Matthew Berzinski – SEMINAR
Senior Director of Product Management, ForgeRock
view profile
Jochen Raymaekers
Principal Solution Architect, ForgeRock
view profile
Room / Location:
Main Conference Room

Cyber Threats: What You’re Up Against & How to Defend with PAM


James Maude, Director, Research, BeyondTrust

Cyber Threats shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Attack Chain, creating new planes of privileges for attackers to exploit. Breaking the chain is more vital than ever. Despite this, organizations continue to mishandle projects, leaving themselves at significant risk of attack.

Following his main stage session, join James Maude, Director, Research, as he takes a deep dive into exploring how to break the cyber-attack chain with Privilege Access Management (PAM).

James Maude – SEMINAR
Director, Research, BeyondTrust
view profile
Room / Location:
Oudegracht 5 Room

Build vs Buy: Is your Customer Identity Project Slowing Down Time-to-Market?


Jeremy Durand, Solutions Engineer, Okta

It’s a login box. How hard can it be? Every team building a web or mobile app faces the same dilemma when adding new functionality: Should we build it in-house or use out-of-the-box services? And, more often than not, authenticated user access sparks the debate. For those that opt to build Customer Identity solutions in house, the logic looks like this: Our developers can handle customer identity. It’s only a login box after all! But Customer Identity is so much more than just the login box. As businesses grow and add features, maintaining a homegrown solution can be a major drain on resources. Developer time spent on DIY identity, security, and privacy compliance is time taken away from core business innovation.

In this seminar, we will discuss how dev teams can:
– Lower the total cost of ownership (TCO) of application development ~
– Reduce the risk of a security and compliance breach
– Keep developers motivated and improve engineering efficiency

Jeremy Durand
Solutions Engineer, Okta
view profile
Room / Location:
Domtoren 3 Room

Privileged Access Governance


Alan Radford, Field Strategist, One Identity

Privileged Access Management (PAM) technologies are often used as standalone solutions, without proper integration to other security process controls that are in place, particularly when it comes to Identity Governance and Administration (IGA) technologies.

Organizations that operate PAM and IGA in silos, lack the ability to apply consistent access policies across end-to-end access mapping and provisioning processes for privileged accounts. Without these systems integrated, they lose 360-degree visibility of identities and user accounts, rights, and activities associated with them, left unable to answer who has access to request what access, how and why.

Join this session to learn how the One Identity unified approach to consolidating identity security silos can help you become more secure and efficient within your security program.

Alan Radford
Field Strategist, One Identity
view profile
Room / Location:
Domtoren 4 Room

Using Artificial Intelligence and Machine Learning in Identity Security


Suleyman Mun, Solutions Engineer, Saviynt

ChatGPT has certainly caused a stir over the past few months, magnifying the discussion around artificial intelligence (AI) and its use in all aspects of our world.  But there are still questions as to what AI and machine learning (ML) really are and how they work.

In this seminar we will discuss the impact of AI and ML in identity security and how it helps simplify program management, assisting administrators with their daily tasks, and helping end users focus on their core responsibilities.

Learn how AI and ML simplify overall program management and reduce an organisation’s threat landscape. This session will include:

  • Defining the difference between artificial intelligence and machine learning
  • The history of AI and ML in security
  • Benefits AI and ML within Identity Governance
  • How Saviynt uses machine learning to support strong identity security programs
Suleyman Mun
Solutions Engineer, Saviynt
view profile
Room / Location:
Domtoren 5 Room

Strengthening Anti-Fraud Strategies: Enhancing Risk Mitigation & Efficiency with Orchestration and Detection & Response


Maurice Luizink, Director of Solutions Engineering EMEA, Transmit Security

Join us in this insightful seminar as Transmit Security delves into the advanced strategies employed by leading digital platform providers in their fight against fraud. Maurice Luizink, Director of Solutions Engineering EMEA at Transmit Security, will detail how we partner with these industry leaders to tackle and resolve complex anti-fraud challenges, harnessing the power of our Orchestration and Detection and Response services.

Throughout the seminar, attendees will gain clarity on the complexities and challenges faced by digital platform providers concerning identity architecture and its alignment with holistic fraud strategies. Maurice will illustrate how Transmit Security’s Orchestration and Detection & Response Services can streamline these architectures, dramatically mitigating fraud, improving customer experience, and reducing management overheads.

This seminar is a touchstone for both business and security professionals, and anyone keen on discovering potent, real-world solutions for digital identity risk management and augmenting anti-fraud strategies. Harness this unique opportunity to assimilate invaluable insights from industry pioneers and fortify your understanding of the challenges in today’s dynamic digital landscape.

Maurice Luizink
Director of Solutions Engineering EMEA, Transmit Security
view profile
Room / Location:
Domtoren 6 Room

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Phased Approach: The Importance of Building a Mature PAM Program
Blog By: Xalient  The ever-present cybersecurity threats and the high costs of cyber insurance are driving many organizations to consider building a mature Privileged Access Management (PAM) program to protect their systems and infrastructure. When approaching PAM, organizations often view the process as a one-time solution implementation to help them stay compliant. The reality is...
Optimized IGA: The Power of Clear Skye + ServiceNow
Blog by: Clear Skye  Our decision to build our software natively on ServiceNow is a big part of what enables us to approach identity differently—dare we say better?—than other players in the game. It’s not just our opinion that the platform way is the best way—so why settle for better when we could be the...
The Crucial Role of Identity in Zero Trust Security
Written by Jaye Tilson, Field CTO, HPE Aruba Networking and Brian Ramsey, VP America, Xalient In an increasingly digital world where cybersecurity threats are constantly evolving, organizations are embracing new strategies to protect their sensitive data and assets. One such approach that has gained prominence in recent years is Zero Trust. Zero Trust challenges the traditional...