Identity Management Europe 2020

VIRTUALCONFEX

15 September 2020

VIRTUALCONFEX

SOCIAL


LATEST TWEETS

Live Agenda

IDM Europe 2020 – VIRTUALCONFEX – The Live Virtual Summit will feature a mix of keynotes, panel discussions and covering the most IAM deployment issues so join us live if you can!

Be sure to check back as we enhance the agenda to ensure you have the most up-to-date information.  We look forward to your participation in IDM Europe 2020 VIRTUALCONFEX.

Registered users can view the keynote, watch recorded sessions, and access other valuable content on-demand. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change.

09:00 DAY PRIOR
SITE OPEN FOR BROWSING - 24 HOURS PRE EVENT
  • Delegates can familiarise themselves with the Conference environment
  • Set up their networking profile
  • Arrange appointments
  • Select which sessions they wish to attend

Live Stream On Demand

ONLINE SESSION ONE: BUSINESS & STRATEGIES – DRIVING A SUCCESSFUL IAM PROJECT

  • Achieving flexible and adaptable IAM approaches
  • Elevating IAM to the executive-suite level
  • Implementation of an IAM solution
08:00
NETWORKING COMMENCES - OFFICIAL SITE OPENING
09:30
Conference Chair’s Opening Address
09:40
Opening Keynote: How to adopt, implement and deliver IAM in the modern enterprise

Today’s approach to IAM is founded on the assumption that what works today may – and most certainly will – change tomorrow. Identity professionals must prepare and chose wisely the solutions and products for their enterprises with:

  • Favouritism towards flexible and adaptable options
  • Firm adherence to identity standards
  • Smooth integration with common enterprise technologies
  • Unified administrative capabilities
  • Ability to scale-up for future purposes
09:55
Implementation of an Identity Management Solution

Tari Dogra, Head of Division-IT Service Management, St. James’s Place Wealth Management

St. James’s Place is no stranger to the regulatory pressure that the Financial Services industry faces. After manually managing identities for this growing public company, the IT organization saw the need for an automated identity program. “Regulatory compliance pressure fuelled our search for a better way to manage identities in the organisation, but we also knew the cost savings and employee experience upside possible from a governance-based identity approach,” Tari Dogra, Head of Division – IT Service Management, St James’s Place.

  • Overview of the company
  • Requirements and Goals, Scope and Build
  • Roadmap (Current and Future)
  • Challenges
  • Key Lessons
10:10
From Traditional IAM to Enterprise-Grade IGA Software as a Service

Mark Vermeulen, Director for Sales Benelux, Omada

The IAM market has matured and there is an increased client demand for cloud architected IGA solutions. Today’s CIOs demand a reduced time to value and many are convinced that a cloud first strategy will take them there. This transformation of the landscape is happening in a rapid pace and leading analysts predict that by 2022 SaaS delivered IGA solutions will augment or replace 75% of existing software-delivered IGA implementations globally. In this session you will learn how modern SaaS delivered IGA can:

• Accelerate implementation of IGA best practice processes

• Master governance and compliance with automated processes and reports

• Act quickly on violations with built-in automated workflows

10:25
Questions to the Panel
10:30
SESSIONS BREAK FOR NETWORKING
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area

ONLINE Session TWO: Understanding best practices to create successful IAM projects

  • How to Succeed in your next PAM project
  • Understanding Why IAM Projects Often Fail
  • Leveraging Third-Party IAM: Granular Access and Federation
11:00
Welcome Back from the Conference Chair
11:05
How to Succeed in your next PAM project

74% of data breaches start with privileged credential abuse. Strategic PAM approaches to secure your enterprise, most valuable assets are critical. We explore the practices of enterprises prioritising privileged credential security, creating a formidable advantage over their peers:

  • Avoiding incorrect focus during the scoping phase
  • Reducing the trust in privileged users
  • Considering PAM as a multi-layered security strategy
  • Putting IGA at the axis of your PAM projects
11:20
Understanding Why IAM Projects Often Fail

Stefan Bosnjakovic, IAM and GRC Architect, Deutsche Kreditbank AG

While technology has driven IAM projects towards more secure and sophisticated systems, the ultimate degree of IAM success or failure is rarely determined by technology but instead influenced by other factors. We consider the factors that guide your IAM projects towards failure or success and how to successfully overcome these burdens:

  • Lack of aligned stakeholders or cross-functional department buy-in
  • Lack of executive sponsorship
  • Lack of effective daily project/program management
  • Lack of realistic time/money/impact/changes expectations
  • Lack of long-term IAM roadmap
11:35
Leveraging Third-Party IAM: Granular Access and Federation

Granting full or even partial access to third-party subcontractors can pose a severe risk to the corporate cybersecurity, thus the increasing need to strictly control or monitor third-party vendor access, especially in the cloud.

We discuss how to achieve full visibility of subcontractor’s actions, granular access management for different groups of vendors, or vendor monitoring to avoid misuse of granted privileges.

We also discuss how to federate your third party IAM to coordinate your own authentication with the authentication efforts of your partners, allowing you to ensure your own security by utilising the protection tools of others.

11:50
Questions to the panel
12:00
SESSIONS BREAK FOR NETWORKING
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area

ONLINE Session THREE: Tools, Practices and Trends

  • Managing Identities Across the Cloud
  • Behavioural Analytics
  • The impact of AI and ML on IAM
12:30
Welcome Back from the Conference Chair
12:35
Managing Identities Across the Cloud

Today, people access critical applications and services in a plethora of public cloud and private data centres. Enterprises’ need to manage critical applications and data in the cloud makes identification in the cloud imperative.

We explore best practices and trends to manage identities across the cloud:

  • The use of APIs to dramatically streamline integration times
  • Utilising tools that integrate easily with on-premises applications for the hybrid cloud
  • Extending existing access controls to cloud apps and apply consistent access policies
  • Emerging technologies contributing to threat protection: ML and security automation
  • The importance of user behaviour analytics to better detect anomalous user activity
12:50
Behavioural Analytics: Real-Time Detection & Immediate Incident Response

With millions of entitlements to manage across thousands of users and hundreds of applications, organisations are struggling to keep their access risks in check. Today’s complex environment makes the task of analysing and detecting suspicious behaviour impossible even for the best IAM professional.

Behavioural Analytics can become IAM experts’ best friend to identify in real-time suspicious behaviours and react immediately to these. We explore how behavioural analytics can help your enterprise manage compromised accounts and how you can implement this technology-changing advance.

13:05
The impact of AI and ML on IAM

83% of organisations do not have a mature approach to IAM, resulting in two times more breaches on average. We explore how AI and ML can improve this situation by:

  • Combining analytics and AI to contextual insights so that both technical and non-technical employees can work more time-efficient
  • Drastically speeding up the existing IAM compliance controls
  • Reviewing historical user access reports to comply with auditor requests
  • Autonomously detecting anomalies and potential threats
  • Paving the way between reactive to preventive/corrective access management
13:20
Questions to the panel
13:30
SESSIONS BREAK FOR NETWORKING 
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area

ONLINE SESSION FOUR – SEMINARS

Delegates can choose to attend 1 of the 3 seminars in this session ‘live’

ALL SEMINARS will be available on demand within 2 hours of the session close

14:00
SEMINAR SESSIONS A,B,C

ONLINE SESSION FIVE – SEMINARS

Delegates can choose to attend 1 of the 3 seminars in this session ‘live’

ALL SEMINARS will be available on demand within 2 hours of the session close

15:15
SEMINAR SESSIONS D,E,F
16:00
SESSIONS BREAK FOR NETWORKING 
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
17:00
EVENT CLOSES BUT STAYS OPEN FOR VIEWING FOR 1 MONTH POST EVENT

Please note:
Whitehall Media reserve the right to change the programme without prior notice.