Seminars @

IDM europe


28 September 2021

Brought to you by Whitehall Media

Seminars @ IDM europe


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Delegates will be able to attend one seminar live at the event. No pre-selection is required – delegates will be able to select which session they attend live and watch the remainder on demand.

Seminar A – BeyondTrust – Building Cybersecurity Immunity to Ransomware with PAM


James Maude, Lead Cyber Security Researcher, BeyondTrust

Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them.

Attend this session to learn:

• 6 things to know about ransomware

• Realistic security practices you can implement to protect against ransomware

• The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.

James Maude
Lead Cyber Security Researcher, BeyondTrust
view profile
Room / Location:
Session Four @ 13:45

Seminar B – ForgeRock – Achieve Regulatory Compliance, Mitigate Risks, and Reduce Costs with AI-Driven IGA


Tim Bedard, Senior Product Marketing Director, ForgeRock
Dennis Haake, Sr Solution Architect, ForgeRock

Megatrends like digital transformation, rapid cloud adoption, and a historic rise in remote work are redefining the parameters of good identity governance and administration (IGA). With legacy role-based access control (RBAC) solutions relying on manual role mining and modeling, this approach fails to keep up with identities at scale in today’s fluid business environments, where employees frequently change jobs, roles and or organisations. The results are overprovisioned access, orphaned accounts, and entitlement creep.

Traditional RBAC solutions must modernise by augmenting manual role management with automation and intelligence. But how can you achieve this? ForgeRock’s Autonomous Identity provides what you need to modernise RBAC by leveraging artificial intelligence (AI) and machine learning (ML). There’s no need to replace your IGA infrastructure. ForgeRock Autonomous Identity augments your existing IGA solution to improve your organisation’s agility and productivity. Modernising RBAC with ForgeRock helps you reduce operational costs, mitigate risks, seamlessly integrate Zero Trust, and ensure continuous compliance.

Find out how your organisation can achieve least privilege by modernising your Role-based Access Control (RBAC) capabilities at scale to:

– Discover and analyse role access patterns across your entire enterprise

– Customise risk criteria according to your organisation specific needs

– Gain visibility into existing user access and the associated risk levels

– Automate the definition and creation of roles in days, not years

Tim Bedard
Senior Product Marketing Director, ForgeRock
view profile
Room / Location:
Session 4 @ 13:45

Seminar C – Okta – Identity Enables Digital Trust


Craig Perrett, Global Head of Identity Architecture, WPP

Max Faun, Head of EMEA Consulting & Ian Lowe, Director of Industry Solutions, Okta

The way we work has changed forever. With hybrid offices fast becoming the new normal, employees today expect the freedom to work wherever works for them, and organisations must find a way to deliver that freedom without jeopardising security. In this context, digital trust becomes a top priority, and identity is its key enabler.

Join us to discuss:

  • How hybrid work is transforming the enterprise landscape
  • Why trust is crucial for balancing the scale between freedom and security
  • What role identity plays in enabling trust in the digital era
Craig Perrett
Global Head of Identity Architecture, WPP
view profile
Max Faun
Head of EMEA Consulting, Okta
view profile
Ian Lowe
Director of Industry Solutions, Okta
view profile
Room / Location:
Session 4 @ 13:45

Seminar D – Auth0 – The Login Experience Customers Want


Domanic Smith-Jones, Solutions Engineer II, Auth0

Consumers around the world are becoming more educated on best practices, and are increasingly considering how application and service providers implement and manage identity when deciding whether to interact with and share their personal information. Auth0 and YouGov’s recently published global research, ‘The Login Experience Customers Want’, reveals that most businesses fail to meet consumer expectations around login technology, and risk frustrating their users and losing sales, as more than 8 in 10 consumers abandon carts or apps due to arduous login experiences.

In this session, Yvo van Doorn, Senior Solutions Engineer at Auth0, will discuss:

  • The widening gap in consumer expectations.
  • What this means for the identity management landscape.
  • How the desire for convenience and security is driving consumers to seek out modern identity solutions.
  • How you can deliver both convenience and security without compromise
Room / Location:
Session 4 @ 13:45

Seminar E – Saviynt – Protecting and monitoring privileged access in the cloud: the convergence of IGA + PAM


Chris Owen, Director of Product Management, Saviynt

Today, many organisations have digital transformation and cloud-first initiatives as their top priorities. For Privileged Access Management (PAM) solutions, the transient nature of the cloud is one of the biggest challenges. Critical assets have changed. Workloads can be spun up and down within days or hours. Admins connect to the cloud in multiple ways to perform privileged activities. Each of these new access points creates a new risk that organisations need to manage and monitor.

Traditionally, PAM was viewed as an IT problem, not a business problem, resulting in separate access policy silos and a lack of visibility into the most critical access within an organisation. But how can we truly understand what a person does with their privileged access and the risk associated with the totality of a user’s access across the enterprise?

Join this session and learn how combining Cloud PAM with Enterprise IGA can help you: –

Build a new, automated approach to securing critical assets within the cloud
Enhance your Zero Trust strategy with risk analytics
Inject preventative critical access risk analysis into the request process
Create risk-based approval workflows during the access request process
Include risk analytics in the privileged user access review process

Chris Owen
Director of Product Management, Saviynt
view profile
Room / Location:
Session Five @ 14:45

Seminar F – ManageEngine – The Role of Delegation and Automation in Identity and Access Management


Vivin Sathyan , IT Security Specialist, ManageEngine

As organizations grow, networks, additional resources, and administrative tasks also grow at a faster pace. It becomes difficult for the IT department to manage the entire Active Directory in a timely, error-free and efficient manner. The fact that the IT admins have to follow a long list of best practices to delegate Active Directory administration only makes things worse, especially in the present scenario where majority of the workforce has shifted to a Work-from-home mode. Thus, the need to the hour is to delegate actions to other users in a non-intrusive manner which will help us keep the number of administrative accounts to a bare minimum. In this session we will be discussing the challenges with the native delegation methods and the action items to overcome those and the need of automating routine tasks in a hybrid Active Directory environment.

Vivin Sathyan
IT Security Specialist, ManageEngine
view profile
Room / Location:
Session 5 @ 14:45

Seminar G – Thycotic – From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack


Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

Following in the footsteps of a cybercriminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker’s techniques used and how they went from zero to full domain admin compromise that resulted in a nasty ransomware incident.

Joseph Carson
Chief Security Scientist & Advisory CISO, Thycotic
view profile
Room / Location:
Session 5 @ 14:45

Seminar H – Elimity – The importance of a user access inventory in identity-first security


Maarten Decat, CTO, Elimity

Securing identities has become the cornerstone of a modern cybersecurity strategy for every company. A thorough understanding of the users and their accesses across your IT landscape is crucial to identity-first security. Because IAM projects typically incur multi-year roll-outs, companies that focus on cybersecurity increasingly opt for a user access inventory instead. This inventory provides the required visibility and guides further IAM improvements, while incurring far less costs.

In this session, we go deeper into the evolution towards identity-first security and the role of a user access inventory. You will learn how such inventory has helped companies:
1. fundamentally improve security, 2. achieve provable control of user accesses without the need for multi-year IAM projects, and 3. lay the foundations for both full identity management as well as complete cybersecurity asset management. In addition, you will learn best practices on how to bootstrap a user access inventory yourself.

Maarten Decat
CTO, Elimity
view profile
Room / Location:
Session Five @ 14:45

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

How To Use MFA To Achieve Regulatory Compliance
By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading industry regulations. Lately it has also become a necessity to qualify for cyber insurance. This is because MFA significantly reduces the risk of system penetration, up to a remarkable 99%. Let’s dive into MFA and how...
Modern IGA means Simple, Scalable, Agile
By Rod Simmons | Omada Next week, we’ll be at IDM DACH, speaking with attendees about what modern Identity Governance and Administration (IGA) means to us, and why organizations today need it more than ever. The IDM event has a great agenda, and we’re slotted to speak in the morning session on May 24th. This...
Traditional Two-Factor Authentication vs. Beyond Identity’s Passwordless Authentication
Traditional Two-Factor or Multi-Factor Authentication (2FA/MFA) remains the “default” for dealing with fundamentally insecure, password-based authentication methods. We understand why they were the “go-to,” but hope to interrupt the “passwords are bad, so we need 2FA/MFA” refrain. There is now a new option grabbing attention and gaining traction – Modern Passwordless Authentication. Let’s compare traditional...