17th September 2019
PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Securitising identity management in the cloud
A consistent criticism of the migration of enterprise activity to the cloud is the extent to which you are required to relinquish control over internal infrastructure and applications. Twinned with this is the concern that internal actors are prone to uploading sensitive information to the cloud when not required to.
So, how do we allay such fears and prevent mismanagement of data? The prevailing opinion is to incorporate IAM in cloud adoption.
- Achieving effective identity management in cloud computing without losing control over internally provisioned applications and resources
- Identify who is doing what, what is their role and what are they trying to access
- Threat-aware identity and access management capabilities
- The benefits of extending your enterprise
Managing the scale of your IAM platform
Seamless, comprehensive platforms which provide a cradle to the grave journey for both the customer and the employee is exactly what is required to ensure productivity, engagement and healthy returns on investment in systems.
By comprehensively and securely managing the identity lifecycle of users, devices, and things, from digital identity to device registration, provisioning, synchronization, reconciliation, your users and customers are safe as they move between devices and services.
- Better manage digital relationships
- Customer safety during engagement with online platforms
- Multiple platform management across users and devices
- Critical asset safety
A risk-aware IAM strategy with identity analytics
The value in combining big data and advanced analytics to increase identity-related risk awareness and enhance IAM processes such as access certification, access request and role management is evident in today’s enterprise environment. From the micro to the macro, to the major and the minor, identity analytics in identity management can deploy powerful tools without limitations and circumvent the endemic risks in human-centred processes.
Discover the three key components for success and the subsets which exist within them.
Machine Learning for enterprise IAM
As the complexities of enterprise IT increase both in size and scale, there is an increasing need to move away from rules based, overtly manual forms of supervision and detection. From the production of false positives, to poorly perceived human centred pattern detection in supposedly suspicious behaviour, picking up anomalies in online behaviour can simply no longer be achieved without the assistance of ML.
- Analytical Anomaly Detection
- Machine-Learning Networks
- Anomaly detection in single source data
- The context of anomalous behaviour
- Collective anomalies
Adaptive security architecture in IAM
An agile IT architecture which can react to emerging security threats by making the necessary adaptions to the existing infrastructure is a must in today’s enterprise environment. Staying ahead of cyber-criminals, implementing truly reactive security measures to protect your assets rather than relying on rigid, legacy riddled infrastructure is key.
We address the key components of an adaptive security architecture model.
The role of IoT in enterprise security
Enterprise IT departments face escalating security and operational challenges. Most of these challenges are posed by continual fluctuations in information, identities, and access points. This threat vector is created by distributed and mobile computing, increased consumerization of IT, and increased threats from internal and external sources. To combat these threats, organizations must co-align security with identity at an increasing scale.
We explore the top six IoT security concerns and how you can securitise the enterprise network:
- Domain Name System (DNS) attacks to enterprise infrastructure
- Employees bring IoT devices into the network
- Exposed APIs
- Device software gives itself too many permissions
- An influx in the volume of data
- Legality of storing IoT data
Defining and realising your security perimeter requirements
Secure, modern networks, no matter the architecture in place and the existing infrastructure, will have elements, which in relation to the nature of cyber space, are porous, difficult to secure and supervise. One emerging trend in IT security is the use of micro perimeters to limit the size and scale of the space in which key data is kept and interacted with.
- The shrinking security perimeter
- Application security
Deploying new tools in an ever-evolving threat landscape: the value of distributed ledger technologies
Sadly, in today’s increasingly dynamic threat landscape, many enterprises have come to accept penetration into vital data assets as an inevitability and have gone to the extent of storing significant quantities of bitcoin to pay ransom demands. A more progressive, and ultimately impressive approach being adopted by other enterprises is to begin building digital identities via blockchain.
- The value in removing from participants engaged in transactions
- The dependence on a third party for the record keeping of those transactions
- How this can provide privacy advantages compared to traditional web SSO through a different sort of disintermediation
- The extent to which different parties can benefit from a distributed trust model