SOCIAL


LATEST TWEETS

THE UK’s LEADING EVENT FOR RISK DRIVEN
business-centric IAM luminaries, practitioners and end-users from across government and large enterprise organisations, this is IDM JUNE 2019.

 

At a glance

Today’s connected and globalised enterprise leaves little room for cyber-attacks and information breaches when securing organisations data assets and access points. This conference takes a deep dive into the innovative new trends within the identity management space. We look at new innovations and their potential for mass disruption for digital identity security.

JOIN HUNDREDS OF THOUGHT-LEADERS AND INNOVATORS AT WHITEHALL MEDIA’S LEADING 19th BIANNUAL IDENTITY MANAGEMENT CONFERENCE
to identify new frontiers and opportunities, discuss ways to transform your IAM infrastructure into an actionable critical business resource and review the latest trends and technologies shaping the IAM sector to help you stay ahead of the curve.

 

FEATURED TOPICS

  • Analytics (user behaviour, privileged accounts)
  • Authentication, Authorisation, Access
  • Blockchain and Identity – use cases and potential
  • Cloud Computing Challenges
  • Data Governance / Protection
  • Data Loss Prevention
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies (Cloud, IoT, Blockchain) – opportunities and risks
  • IAM Programme Management
  • Identity Administration
  • Identity Intelligence
  • Identity as a Service (IDaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Network Security and IAM considerations
  • Risk Management and Information Security
  • Security Classification and Policy Enforcement
  • Security Intelligence and Analytics
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • Two-factor Authentication
  • User Credential Management
  • User Self-Service

Previous Speakers

SPONSORS

cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking