Identity Management

15 September 2020

Van Der Valk Hotel, Utrecht




Session One: Business & Strategies – driving a successful IAM project

  • Achieving flexible and adaptable IAM approaches
  • Elevating IAM to the executive-suite level
  • Implementation of an IAM solution
  • Understanding best practices to create successful IAM projects
  • Tackling Third-Party IAM
  • Addressing IAM failures
Conference Chair’s Opening Address
Opening Keynote: How to adopt, implement and deliver IAM in the modern enterprise

Today’s approach to IAM is founded on the assumption that what works today may – and most certainly will – change tomorrow. Identity professionals must prepare and chose wisely the solutions and products for their enterprises with:

  • Favouritism towards flexible and adaptable options
  • Firm adherence to identity standards
  • Smooth integration with common enterprise technologies
  • Unified administrative capabilities
  • Ability to scale-up for future purposes
IAM at the Executive-Suite Level

Despite IAM sitting at the centre of the business’ ability to execute digital transformation initiatives, IAM is seen as an infrastructure capability and not a business enabler. We explore strategic approaches to gain approval and funding for your IAM programme. We discuss how to break free of the “infrastructure” label that burdens its success.

  • Understand the importance of engaging with the board, their needs and their priorities
  • Build a business case and communicate the business value of your proposal
  • Speak the business language that aligns your IAM vision and strategy with business goals
  • Map IAM outcomes to board-level KPIs
  • Estimate the ROI of IAM
  • Engage with key stakeholders who will act as champions across the enterprise
  • Align with and support the CIO’ strategies
Implementation of an Identity Management Solution

Tari Dogra, Head of Division-IT Service Management, St. James’s Place Wealth Management

St. James’s Place is no stranger to the regulatory pressure that the Financial Services industry faces. After manually managing identities for this growing public company, the IT organization saw the need for an automated identity program. “Regulatory compliance pressure fuelled our search for a better way to manage identities in the organisation, but we also knew the cost savings and employee experience upside possible from a governance-based identity approach,” Tari Dogra, Head of Division – IT Service Management, St James’s Place.

  • Overview of the company
  • Requirements and Goals, Scope and Build
  • Roadmap (Current and Future)
  • Challenges
  • Key Lessons
Leveraging Third-Party IAM: Granular Access and Federation

Granting full or even partial access to third-party subcontractors can pose a severe risk to the corporate cybersecurity, thus the increasing need to strictly control or monitor third-party vendor access, especially in the cloud.

We discuss how to achieve full visibility of subcontractor’s actions, granular access management for different groups of vendors, or vendor monitoring to avoid misuse of granted privileges.

We also discuss how to federate your third party IAM to coordinate your own authentication with the authentication efforts of your partners, allowing you to ensure your own security by utilising the protection tools of others.


Stefan Bosnjakovic, IAM and GRC Architect, Deutsche Kreditbank AG

While technology has driven IAM projects towards more secure and sophisticated systems, the ultimate degree of IAM success or failure is rarely determined by technology but instead influenced by other factors. We consider the factors that guide your IAM projects towards failure or success and how to successfully overcome these burdens:

  • Lack of aligned stakeholders or cross-functional department buy-in
  • Lack of executive sponsorship
  • Lack of effective daily project/program management
  • Lack of realistic time/money/impact/changes expectations
  • Lack of long-term IAM roadmap
Questions To The Panel Of Speakers
Refreshment Break Served in the Exhibition Area
How to Succeed in your next PAM project

74% of data breaches start with privileged credential abuse. Strategic PAM approaches to secure your enterprise, most valuable assets are critical. We explore the practices of enterprises prioritising privileged credential security, creating a formidable advantage over their peers:

  • Avoiding incorrect focus during the scoping phase
  • Reducing the trust in privileged users
  • Considering PAM as a multi-layered security strategy
  • Putting IGA at the axis of your PAM projects
The Most Overlooked Elements in Identity Management

Hint 1: we all use them
Hint 2: we use them multiple times a day
Hint 3: they are not passwords
Solution: Usernames

The username often doesn’t receive all the attention that its big brother – the password – does, but its importance is paramount. Join this session to explore the critical aspects of setting your username scheme and understand the pitfalls and negative impact of not paying attention to them.

Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
Seminar Sessions
Networking Lunch Served in the Exhibition Area

Session Two: Tools, Practices and Trends

  • Reconciling IAM in the Cloud
  • A guide to AI and ML for IAM
  • Understanding the trends {and hypes}
  • Immediate response to threats
  • Blockchain meets IAM
  • Succeeding in IAM for IoT devices
  • Future-proofing your strategies
Conference Chair’s Afternoon Address
Managing Identities Across the Cloud

Today, people access critical applications and services in a plethora of public cloud and private data centres. Enterprises’ need to manage critical applications and data in the cloud makes identification in the cloud imperative.

We explore best practices and trends to manage identities across the cloud:

  • The use of APIs to dramatically streamline integration times
  • Utilising tools that integrate easily with on-premises applications for the hybrid cloud
  • Extending existing access controls to cloud apps and apply consistent access policies
  • Emerging technologies contributing to threat protection: ML and security automation
  • The importance of user behaviour analytics to better detect anomalous user activity
Behavioural Analytics: Real-Time Detection & Immediate Incident Response

With millions of entitlements to manage across thousands of users and hundreds of applications, organisations are struggling to keep their access risks in check. Today’s complex environment makes the task of analysing and detecting suspicious behaviour impossible even for the best IAM professional.

Behavioural Analytics can become IAM experts’ best friend to identify in real-time suspicious behaviours and react immediately to these. We explore how behavioural analytics can help your enterprise manage compromised accounts and how you can implement this technology-changing advance.

The impact of AI and ML on IAM

83% of organisations do not have a mature approach to IAM, resulting in two times more breaches on average. We explore how AI and ML can improve this situation by:

  • Combining analytics and AI to contextual insights so that both technical and non-technical employees can work more time-efficient
  • Drastically speeding up the existing IAM compliance controls
  • Reviewing historical user access reports to comply with auditor requests
  • Autonomously detecting anomalies and potential threats
  • Paving the way between reactive to preventive/corrective access management
Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Understanding IoT – Securing Access & Identities

By 2020 there’s expected to be over 20 billion connected devices, but the Internet of things is already changing identity management practices. IoT is inherently related to identity, beyond the mere identification of the IoT device. Join this session to explore:

  • The paramount importance of IoT in your IAM strategy
  • How to implement robust Software Asset Management systems (SAM) to secure the IoT
  • Best practices to tackle connectivity security from any device
  • How to focus on user experience while not compromising on security
  • Addressing the most significant problem: achieving system flexibility
Blockchain and Digital Identity 101

The digital identity environment is ready for disruption and blockchain has arrived to disturb the way things work. Blockchain could stop digital units from being easy to replicate or make digital files and processes tamper-proof. The potential is overwhelming, but we need projects to hit the mainstream market to fully leverage its capabilities.

Join us in this session to understand the benefits of blockchain in digital identity, discover several blockchain projects and its promising results and start embracing what will change the next IAM strategies.

Future-proofing IAM: Trashing the Cluttered Gadget Drawer

“More of everything” seems to be the rule to mitigate the fear of being outdated. Identity governance is not impermeable to this rule. Enterprises add additional solutions when becoming anxious about not having all the new tools to protect the valuable assets of the enterprise.

We address:

  • How to tidy up your IGA/IAM systems: getting rid of the outdated software and learning how to let go
  • Exploring ad-hoc and holistic tools to declutter the system
  • Future-proofing your IAM investment and dealing with legacy
Questions to the Panel of Speakers
Closing Remarks from the Conference Chair
Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.