The Seminars will take place from 12:25 – 13:10
PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend one seminar at the event. No pre- selection is required – delegates will be able to select which session they attend onsite.
OUDEGRACHT 1-4 (Main Conference Room)
Customer Case Study: How Proximus Modernized its IAM with ForgeRock
Pascal Browet, Enterprise Architect & Product Owner, Proximus
Bruno Deutz, Domain Manager, Proximus
Proximus is the largest of Belgium’s three mobile telecommunications companies and is a part of Proximus Group (previously Belgacom Group). By history, the company inherited multiple IAM platforms from various vendors, dealing with multiple audiences (customers, partners, suppliers, employees) and all with different IAM principles applied. This fragmented legacy appeared as a major roadblock to support the Proximus strategy which is about streamlining & simplification, digital transformation, partnerships & ecosystems.
We built an IAM architecture blueprint and a roadmap adopting the following principles:
- Technology choice for IAM, enabling off the shelf solutions
- Platforms: One for employees and one for customers+
- Authorization / delegation model for customers+
After an RFI & RFQ process, we selected ForgeRock as our specialized IAM solution. We are going to share with you our practical experience deploying the ForgeRock platform into a very challenging IT landscape whilst meeting business and IT expectations at the same time.
Expanding the Frontiers of Identity to New Levels
Peter Volckaert, Senior Sales Engineer, Authentication and Access, IBM Security
In today’s rapidly changing world, security is a great concern. Digital transformation in companies has allowed employees, customers and partners to access applications from different devices and geographic locations. People, devices and applications have become increasingly interconnected and identity plays a key role in every transaction and touches every digital experience. IBM has some of the most advanced technology available in this fast moving area of all pervasive identity.
During this session, we will discuss two use cases where IBM Security solutions helped to address today’s challenging business requirements that are mandating higher levels of assurance through a non-invasive user experience.
Join us for a mind-challenging session that will cover:
“Alexa, start my car!” This use case is about managing identity for an IoT service that is able to control a car using Amazon’s virtual assistant.
“Delivery is becoming social!” This use case is about managing user and non-user identities for a logistics service which leverages “social” to get parcels delivered.
Digital Identity in the Age of Artificial Intelligence, Machine Learning and Robotic Process Automation
Rudy DeSousa, Software Sales Engineering Director, EMEA, One Identity
What is the impact of Artificial Intelligence and Machine Learning on the world of Identity and How is Robotic Process Automation (RPA) relevant to us as Identity Professionals?
In this session, we delve into these often misunderstood terms. We consider the role Identity plays in these areas and how these technologies can help us fight the good fight, given that Identity is essentially at the heart of modern Information Security.
Identity Governance 2.0: Lessons Learnt from the Best-In-Class
Maarten Decat, CTO, Elimity
Because of the ever-growing compliance and security requirements, the focus of IAM keeps tilting towards governance in favour of provisioning. Whilst this evolution has been going on for years now, the fact that technologies such as data analytics and AI have become mainstream opens up vast new possibilities. As a high-end IAM solution provider, we have been involved in several innovative IAM projects involving these technologies and we are starting to see the growth of a fundamentally new approach to identity governance. In this session, we will discuss several of these projects and give insights in the strategic initiatives of some of the most forward-looking IAM departments in Europe.
FACT OR FICTION: THE 6 MYTHS OF PAM BUSTED!
Tom Scase, Senior Solutions Engineer, BeyondTrust
Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). But successfully securing and managing privilege access is a tough problem and is only getting harder to solve.
This session will identify the top PAM challenges and breakthrough the myths to enable you to:
- Understand the risks uncontrolled privileged access presents
- Identify solutions to tackle key PAM challenges and myths
- Provide a foundation to begin a successful PAM program
How Leading Brands Build Consumer Trust with CIAM
Mayur Upadhyaya, Senior Director, Identity Cloud (EMEA) Akamai
Customer expectations have changed. Consumers expect simple and frictionless registration experiences that are highly secure. This privacy-personalisation paradox, where consumers demand highly personalised experiences that don’t compromise data protection, is a challenge all global brands face amid many high-profile data breaches.
Join Mayur Upadhyaya, Akamai Senior Director of Identity Cloud (formerly Janrain), for a thought-provoking discussion about the true value of customer identity data, trends that threaten to dilute its value, and how to build a privacy-centric CIAM strategy for your digital business.