Seminars @

IDM europe

VIRTUALCONFEX

28 September 2021

Brought to you by Whitehall Media

Seminars @ IDM europe

Seminars

Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Delegates will be able to attend one seminar live at the event. No pre-selection is required – delegates will be able to select which session they attend live and watch the remainder on demand.

Seminar A – BeyondTrust – Building Cybersecurity Immunity to Ransomware with PAM

SEMINAR A

James Maude, Lead Cyber Security Researcher, BeyondTrust

Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them.

Attend this session to learn:

• 6 things to know about ransomware

• Realistic security practices you can implement to protect against ransomware

• The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.

view presentation

James Maude
Lead Cyber Security Researcher, BeyondTrust
view profile
Room / Location:
Session Four @ 13:45

Seminar B – ForgeRock – Achieve Regulatory Compliance, Mitigate Risks, and Reduce Costs with AI-Driven IGA

SEMINAR B

Tim Bedard, Senior Product Marketing Director, ForgeRock
Dennis Haake, Sr Solution Architect, ForgeRock

Megatrends like digital transformation, rapid cloud adoption, and a historic rise in remote work are redefining the parameters of good identity governance and administration (IGA). With legacy role-based access control (RBAC) solutions relying on manual role mining and modeling, this approach fails to keep up with identities at scale in today’s fluid business environments, where employees frequently change jobs, roles and or organisations. The results are overprovisioned access, orphaned accounts, and entitlement creep.

Traditional RBAC solutions must modernise by augmenting manual role management with automation and intelligence. But how can you achieve this? ForgeRock’s Autonomous Identity provides what you need to modernise RBAC by leveraging artificial intelligence (AI) and machine learning (ML). There’s no need to replace your IGA infrastructure. ForgeRock Autonomous Identity augments your existing IGA solution to improve your organisation’s agility and productivity. Modernising RBAC with ForgeRock helps you reduce operational costs, mitigate risks, seamlessly integrate Zero Trust, and ensure continuous compliance.

Find out how your organisation can achieve least privilege by modernising your Role-based Access Control (RBAC) capabilities at scale to:

– Discover and analyse role access patterns across your entire enterprise

– Customise risk criteria according to your organisation specific needs

– Gain visibility into existing user access and the associated risk levels

– Automate the definition and creation of roles in days, not years

view presentation

Tim Bedard
Senior Product Marketing Director, ForgeRock
view profile
Room / Location:
Session 4 @ 13:45

Seminar C – Okta – Identity Enables Digital Trust

SEMINAR C

Craig Perrett, Global Head of Identity Architecture, WPP

Max Faun, Head of EMEA Consulting & Ian Lowe, Director of Industry Solutions, Okta

The way we work has changed forever. With hybrid offices fast becoming the new normal, employees today expect the freedom to work wherever works for them, and organisations must find a way to deliver that freedom without jeopardising security. In this context, digital trust becomes a top priority, and identity is its key enabler.

Join us to discuss:

  • How hybrid work is transforming the enterprise landscape
  • Why trust is crucial for balancing the scale between freedom and security
  • What role identity plays in enabling trust in the digital era

view presentation

Craig Perrett
Global Head of Identity Architecture, WPP
view profile
Max Faun
Head of EMEA Consulting, Okta
view profile
Ian Lowe
Director of Industry Solutions, Okta
view profile
Room / Location:
Session 4 @ 13:45

Seminar D – Auth0 – The Login Experience Customers Want

SEMINAR D

Domanic Smith-Jones, Solutions Engineer II, Auth0

Consumers around the world are becoming more educated on best practices, and are increasingly considering how application and service providers implement and manage identity when deciding whether to interact with and share their personal information. Auth0 and YouGov’s recently published global research, ‘The Login Experience Customers Want’, reveals that most businesses fail to meet consumer expectations around login technology, and risk frustrating their users and losing sales, as more than 8 in 10 consumers abandon carts or apps due to arduous login experiences.

In this session, Yvo van Doorn, Senior Solutions Engineer at Auth0, will discuss:

  • The widening gap in consumer expectations.
  • What this means for the identity management landscape.
  • How the desire for convenience and security is driving consumers to seek out modern identity solutions.
  • How you can deliver both convenience and security without compromise

view presentation

Room / Location:
Session 4 @ 13:45

Seminar E – Saviynt – Protecting and monitoring privileged access in the cloud: the convergence of IGA + PAM

SEMINAR E

Chris Owen, Director of Product Management, Saviynt

Today, many organisations have digital transformation and cloud-first initiatives as their top priorities. For Privileged Access Management (PAM) solutions, the transient nature of the cloud is one of the biggest challenges. Critical assets have changed. Workloads can be spun up and down within days or hours. Admins connect to the cloud in multiple ways to perform privileged activities. Each of these new access points creates a new risk that organisations need to manage and monitor.

Traditionally, PAM was viewed as an IT problem, not a business problem, resulting in separate access policy silos and a lack of visibility into the most critical access within an organisation. But how can we truly understand what a person does with their privileged access and the risk associated with the totality of a user’s access across the enterprise?

Join this session and learn how combining Cloud PAM with Enterprise IGA can help you: –

Build a new, automated approach to securing critical assets within the cloud
Enhance your Zero Trust strategy with risk analytics
Inject preventative critical access risk analysis into the request process
Create risk-based approval workflows during the access request process
Include risk analytics in the privileged user access review process

view presentation

Chris Owen
Director of Product Management, Saviynt
view profile
Room / Location:
Session Five @ 14:45

Seminar F – ManageEngine – The Role of Delegation and Automation in Identity and Access Management

SEMINAR F

Vivin Sathyan , IT Security Specialist, ManageEngine

As organizations grow, networks, additional resources, and administrative tasks also grow at a faster pace. It becomes difficult for the IT department to manage the entire Active Directory in a timely, error-free and efficient manner. The fact that the IT admins have to follow a long list of best practices to delegate Active Directory administration only makes things worse, especially in the present scenario where majority of the workforce has shifted to a Work-from-home mode. Thus, the need to the hour is to delegate actions to other users in a non-intrusive manner which will help us keep the number of administrative accounts to a bare minimum. In this session we will be discussing the challenges with the native delegation methods and the action items to overcome those and the need of automating routine tasks in a hybrid Active Directory environment.

view presentation

Vivin Sathyan
IT Security Specialist, ManageEngine
view profile
Room / Location:
Session 5 @ 14:45

Seminar G – Thycotic – From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack

SEMINAR G

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

Following in the footsteps of a cybercriminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker’s techniques used and how they went from zero to full domain admin compromise that resulted in a nasty ransomware incident.

view presentation

Joseph Carson
Chief Security Scientist & Advisory CISO, Thycotic
view profile
Room / Location:
Session 5 @ 14:45

Seminar H – Elimity – The importance of a user access inventory in identity-first security

SEMINAR H

Maarten Decat, CTO, Elimity

Securing identities has become the cornerstone of a modern cybersecurity strategy for every company. A thorough understanding of the users and their accesses across your IT landscape is crucial to identity-first security. Because IAM projects typically incur multi-year roll-outs, companies that focus on cybersecurity increasingly opt for a user access inventory instead. This inventory provides the required visibility and guides further IAM improvements, while incurring far less costs.

In this session, we go deeper into the evolution towards identity-first security and the role of a user access inventory. You will learn how such inventory has helped companies:
1. fundamentally improve security, 2. achieve provable control of user accesses without the need for multi-year IAM projects, and 3. lay the foundations for both full identity management as well as complete cybersecurity asset management. In addition, you will learn best practices on how to bootstrap a user access inventory yourself.

view presentation

Maarten Decat
CTO, Elimity
view profile
Room / Location:
Session Five @ 14:45

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Six Questions Secret Server Answers in the Latest Updates
Written by Barbara Hoffman You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data...
Digital Consultation for Identity Launch
The UK government has launched a consultation towards its latest plans for digital identity. The Department for Digital, Culture, Media and Sport (DCMS) aims to gather viewpoints from interested parties towards proposals of making digital identities trusted and secure like official documents. Establishing the Trust Mark Following on from the publication of a draft digital...
Homeland Security Adds Ping Identity
Two of Ping Identity’s solutions have been added to the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL). Confidence in Vetting Highlighted in the Executive Order on Improving the Nation’s Cybersecurity, the program presents resources that provide agencies with the ability to select vetted technology at a more confident...