Programme @

IDM europe

Identity Management

2 October 2024

Van der Valk Hotel, Utrecht

Programme @ IDM europe

Morning Session

Understanding your users, customers and third-party actors IAM needs

  • Implementing CIAM Solutions To Protect and Manage External Identities
  • Cloud Based CIAM
  • Defeating the Bots -How AI is enabling organisations to save their brand and their revenues
  • Securing the future of digital identity
  • Identity sourcing in a zero trust environment
  • Where IAM meets CX
  • Prevention of Lateral Movement using MFA and service account protection in Active Directory
  • PAM: The critical foundation for a successful Identity Security strategy

08:00 (CEST)

Registration and Exhibition Opens

Refreshments will be available in the Exhibition area.

09:00 (CEST)

Conference Chair's Opening Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

 

09:10 (CEST)

Implementing CIAM Solutions To Protect and Manage External Identities

  • Key areas to focus on when implementing your CIAM solution
  • Avoiding thinking IAM to implement CIAM
  • Unleashing the potential of CIAM

09:40 (CEST)

Cloud Based CIAM

  • Moving towards cloud-based CIAM solutions to leverage scalability, flexibility, and cost-effectiveness
  • Adopting microservices architecture for CIAM systems, enabling organizations to develop, deploy, and scale services independently
  • Accelerating adoption of cloud-based IAM solutions to accommodate remote workforces, support scalability, and provide centralized identity management

09:55 (CEST)

Defeating the Bots - How AI is enabling organisations to save their brand and their revenues

With the rapid increase in online commerce, it is imperative that organisations deliver great, friction free online experiences to customers to drive brand loyalty and grow business. However malicious actors are taking advantage of this by leveraging bots and other technology to buy out highly sought after items and then resell them on secondary markets, thus driving down brand loyalty and getting between organisations and their customers. In this session we will review a case study of how retail organisations are using Artificial Intelligence and flexible journey orchestration to keep their inventory out of the hands of the fraudsters and available for their loyal customers.

10:10 (CEST)

Case Study: Journey with FIDO2 Authentication

FIDO2 (Fast Identity Online 2) is a set of standards for secure and convenient authentication. It uses public key cryptography to enhance security and eliminate the need for traditional passwords. This case study demonstrates how FIDO2 can be applied in the context of employee authentication, providing a balance between security and user convenience.

Using Authentication Priorities on its mission to implement safe and easy authentication solution, ABN AMRO has identified two fundamental priorities:
1. User experience
2. Security

10:25 (CEST)

Identity Sourcing in a Zero Trust Environment

Bram van Pelt
Architect, KPN
view profile

Bram van Pelt, Architect, KPN

  • Digital wallet
  • eIDAS
  • Decentralised identity

 

10:40 (CEST)

Questions to the Panel of Speakers

11:00 (CEST)

Refreshment Break Served in the Exhibition Area

11:25 (CEST)

Welcome to Session Two

11:30 (CEST)

Where IAM Meets CX

Mark de Groot
Designer, Onboarding and Authentication, Nationale-Nederlanden
view profile

Mark de Groot, Designer Onboarding and Authentication, Nationale-Nederlanden

11:45 (CEST)

Prevention of Lateral Movement using MFA and service account protection in Active Directory

In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.

What are the security gaps to address this exponential phase of the attack?

This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.

12:00 (CEST)

PAM: The critical foundation for a Successful Identity Security Strategy

  • Examples of tactics used in real world attacks and highlight mitigations available.
  • How Privilege Access Management (PAM) is evolving to meet the needs of ITDR.
  • How implementing least privilege and PAM as foundational controls can thwart attackers exploiting privileged accounts and overly permissive access to systems.

12:15 (CEST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

12:30 (CEST)

Seminar sessions

13:15 (CEST)

Networking Lunch Served in the Exhibition Area

Afternoon Session

Ensuring Europe is the lead global force in IAM

  • MFA Migration Lessons Learned
  • When one becomes two: Resource hierarchy strategies for a divested organization
  • Case Study – The Rise of Organisation Identity
  • Using Privileged Access Management to Reduce the Blast Radius of an Attack
  • Mergers & Acquisitions: How a modern IGA provides a smooth and efficient process
  • The role of IAM solutions in Alliander’s Energy Transition Strategy

14:00 (CEST)

Conference Chair’s Afternoon Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

14:05 (CEST)

MFA Migration Lessons Learned

Adem Dal
Identity & Access Management Architect, B.Braun Group
view profile

Adem Dal, Identity & Access Management Architect, B.Braun Group

This session will explore:

  • Adaptive Authentication: Behavioral Analytics: Integration of behavioral analytics to assess user behavior patterns and adjust authentication requirements accordingly.
  • Mobile-based MFA
  • Passwordless Authentication: Elimination of Passwords: Addressing the Growing interest in passwordless authentication methods, including biometrics, mobile-based solutions, and authentication through possession of a device.
  • Zero Trust Security Models: Incorporating continuous authentication measures within a Zero Trust security framework to verify and re-verify user identity throughout the entire session.

14:20 (CEST)

When One becomes Two: Resource Hierarchy Strategies for a Divested Organization

This presentation will cover various scenarios encountered by Nuuday whilst going through a complex scenario. Various cybersecurity concerns occur during the splitting of an organisation due to the changing of staff, access rights, and asset transition. This is a 4-year process that requires an IAM programme supported by the right technology to maximise productivity, promote growth, and safeguard sensitive corporate assets, whilst ensuring the whole process is seamless for the end-user.

  • IAM is an integral part of establishing Nuuday’s independent identity processes separated from TDC NET.
  • IAM is responsible for splitting the ownership of Identity and Business Data between Nuuday and TDCNET.
  • IAM is responsible for splitting the consumer and B2B user journeys for Nuuday and TDC NET.

14:35 (CEST)

Case Study - The Rise of Organisation Identity

  • What is organisation identity, and why do we need it? Case Study: The Good, the Bad and the Ugly.
  • Which organisation identity should we use?
  • The value is from the context

14:50 (CEST)

Questions to the Panel of Speakers

15:05 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:30 (CEST)

Welcome to Session Five

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

15:35 (CEST)

Using Privileged Access Management to Reduce the Blast Radius of an Attack

Reducing the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

15:50 (CEST)

Mergers & Acquisitions: How a modern IGA Provides a Smooth and Efficient Process

  • Ensuring a smoot creation of digital identities
  • Ensuring that everyone has the right access to the IT landscape
  • Employee migration process
  • Application migration process
  • Lessons Learned & Takeaways

16:05 (CEST)

The role of IAM solutions in Alliander’s Energy Transition Strategy

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform and Programme Manager IAM, Alliander

 

16:20 (CEST)

Questions to the Panel of Speakers

16:35 (CEST)

Closing Remarks from the Conference Chair

16:45 (CEST)

Conference Closes Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Why Identity is the Cornerstone of a Zero Trust Architecture
Written by Scott Silver, Xalient  As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity. As we continue to digitally transform organisations,...
Challenges of Adopting Zero Trust
Why adopting a Zero Trust approach is not as straightforward as it might appear Written by Steven Daniëls and David Morimanno, thought leaders at Xalient Group. The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, every organization’s attack surface has...
identity and access management
The Importance Of Strong Passwords
Overusing similar passwords, or passwords with incredibly easy guesswork, is one of the biggest issues circling identity and access management. As many people have problems memorizing different passwords, it is not uncommon for similar passwords over personal accounts and work-based identity management solutions. For hackers, the natural first-guess options will be children’s names or similar...