IDM EUROPE

Identity Management

15 September 2020

Van Der Valk Hotel, Utrecht

SOCIAL


LATEST TWEETS

EUROPE’S LEADING IDENTITY AND ACCESS MANAGEMENT CONFERENCE FOR SENIOR MANAGERS, SECURITY EXPERTS AND IAM THOUGHT LEADERS ACROSS GOVERNMENT AND THE LARGEST ENTERPRISE ORGANISATIONS.

At a glance

What are the typical challenges you face within your organisation when implementing an IAM system? Access governance is all about reducing to the greatest possible extent the risk that comes with end-users and, more specifically, excessive or unnecessary access privileges to critical systems and data. You must have the tools to monitor use, detect anomalies, keep track and act, as the access and governance system landscape continues to evolve driven by ever-growing business needs.

Join Whitehall Media’s prestigious 10th Identity and Access Management Europe conference as we address the increasing complexity of IAM, the value in centralisation of authentication methods, the rise in identity ownership initiatives, the role of disruptive technologies in supporting IAM processes and the latest trends and techniques being deployed to protect the enterprise eco-system from attack.

“We’ve had some great customer conversations ranging across a lot of variables including financial services and healthcare, a lot of different topics driving around customer identity, IOT, enterprise identity, so there has been some fantastic dialog” FORGEROCK, Senior Vice President PM.

FEATURED TOPICS

IAM Fundamentals: Best Practice on Strategy and Implementation

  • Building your business case
  • Ensuring the success of your IAM project – strategy and metrics
  • Managing entitlements, credentials, privileges, duties and roles
  • Provisioning/De-provisioning
  • Federated Access Management
  • CIAM vs Enterprise IAM
  • Intelligent API Security
  • CRM and IAM
  • Selecting the right solution provider
  • Effective data management and security
  • Taking account of GDPR
  • Essentials of identity administration and governance
  • Defining policy and action response
  • Server and network security
  • Password Management

Benchmarking for Success: Moving your IAM programme forward

  • Identifying and tracking new and emerging risks
  • Customer IAM – dealing with challenges
  • Third-Party Access Protection
  • Encryption techniques
  • Endpoint security
  • Privileged Account Management
  • Business GRC
  • Security classification and policy enforcement
  • IAM Security / Threat Monitoring and Intelligence
  • Anomaly detection (analytics)
  • Incident and breach response
  • Multifactor authentication
  • Self-service IAM
  • Single Sign-On (SSO) Capabilities
  • Cloud user and access security
  • Continuity planning and data loss prevention

Future-proofing your IAM investment

  • Exploring future IAM trends
  • IAM and Disruptive Technologies – opportunities and risks
  • Blockchain-enabled IAM
  • Machine Learning and IAM
  • Automating manual processes
  • Deploying analytics for an insight-driven IAM programme
  • Understanding the evolving nature of trust and digital identity
  • Evaluating IaaS and PaaS service providers
  • Overcoming challenges with legacy IAM
  • Keeping up with user expectations

Previous Speakers

SPONSORS

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking