Session One: Identity and Access Management for Enterprise
We explore how IAM can become a key enabler to organisations. Through cross-sector case studies and industry perspectives we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The early morning session will also explore:
- Why businesses require identity governance
- Examples of successful deployments of comprehensive, customer focused identity management infrastructures
- The impact of identity management investment on top-line revenue
- How to use IAM to achieve business goals and empower digital business
- The changing security landscape and disruptive technologies
- Operationalising identity intelligence for efficiency and risk mitigation
- Identifying future trends in the IAM space
Conference Chair’s Opening Address
IAM and Digital Transformation
Digital transformation brings a whole host of new security challenges and risks; we focus on using IAM solutions to compliment and drive your business strategy, allowing organisations to become more agile and secure.
- Aligning enterprise business strategies and objectives with solutions
- Breaking down siloes and bridging the gap between business and technology with a focus on IAM
IAM – From Strategy to Implementation
Enterprise security has evolved from a network-centric to and identity-centric architecture in recent years. We look at:
- Best Practice – There are numerous business drivers that IAM needs to address e.g compliance, efficiency and cost savings in order to create a better business investment.
- Benefits of an IAM architecture- An implemented IAM solution will reduce costs and will propel other cost saving initiatives.
- Overcoming the challenges of achieving a strong IAM strategy- i.e Lack of clear business and strategy objectives, lack of planning, not defining the post-production phase and improper IAM product selection
How Machine Learning and AI are set to shape IAM
- How to implement privileged identity management that uses algorithmic intelligence to analyse activity and usage patterns
- Using AI for conditional access and authorisation
- Overcoming potential challenges – avoiding errors and bias
The Identity of Things
The Internet of Things is a complex web of relationships, all IoT entities such as People, Services, Applications and Devices must have an identity. This identity needs to be protected in order for the IoT to develop to its full potential. This session explores the disruptive new trend of IoT and how IAM is scaling up to meet its complex needs so users can be truly connected.
- Businesses need to strategically evolve their processes in managing and defining relationships
- Scaling IAM to match the complexity of IoT to secure all devices
- Public Key Infrastructure- To reduce the complexity of IAM when utilising M2M and IoT through encryption keys and public key certificates
Implementing a Full Lifecycle Incident Management Solution
The IT Ecosystem in becoming increasingly complex to manage and secure. We explore the intricacies of a robust incident management system, with a view to discussing:
- Cyber Attack Lifecycle Steps
- A how to guide – for reducing teams Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)
- Disaster recovery post security breach – the toolkit and expertise all enterprises must have
Finding the Right Balance between Security and Usability
One of the main challenges of Identity Management is finding the right software which will allow easy navigation and better usability for consumers. We look at:
- Designing a UX of Security and other factors that will contribute to a safer customer journey
- More complex passwords don’t always make users secure – are they redundant?
- Examining the benefits and implementation challenges of SSO
Questions To The Panel Of Speakers
Refreshment Break Served in the Exhibition Area
Migrating IAM to the Cloud: The Benefits of a Hybrid Approach
Hybrid approaches can provide enterprises with the flexibility of slowly migrating to cloud based services, improve IT agility and reduce security risk. However the big challenge of having a mixture of on premise and cloud based applications is the freedom of movement for users of the environment. We explore:
- Ensuring appropriate security for a hybrid environment: Building an IAM Solution to securely enable the access and engagement of cloud services
- Avoiding identity silos and setting new perimeters- Centralising your IAM service to manage all users’ access and authentication before they venture into any applications
- Strongly integrating on premise Active Directory and LDAP to operate smoothly and provide real-time, bi-directional synchronisation of users
Detecting Advanced and Insider Threats with User Behaviour Analytics
Exploring how to proactively detect a potential breach before it happens, to keep your enterprise at the forefront of a security-centric digital transformation and reap the benefits providing actionable threat intelligence.
- Reviewing your user monitoring, profiling and anomaly detection functionality in your current SIEM systems, before evaluating potential UBA Platforms
- Secure agility UBA uses big data and Machine Learning algorithms combined to create a risk assessment in near-real time of user activity
- Risk Behaviour Modelling – assessing and defining risk
Questions to the Panel of Speakers
Delegates move to the Seminar Rooms
Networking Lunch Served in the Exhibition Area
Session Two: Case Studies and Best Practice for IAM in Large Enterprise Organisations
- Exploring privileged access management: What happens when you add new technology to traditional or legacy security software
- Creating a threat-centric IAM to secure your intelligent assets and becoming proactive to a breach not reactive
- Embracing CIAM as a key driver for customer identity security
- Security talent and skills, learn exactly why there is a shortage of security professionals and how to break away from the standard talent pool to acquire new IAM talent
- Keeping ahead of the curve: Defining the future of IAM, trends for 2019 and beyond
Conference Chair’s Afternoon Address
Privileged Access Management: Adding New Technology to Traditional Security Software
Security perimeters are changing and expanding to accommodate newer trends and disruptions. PAM looks to grant certain employees privileged rights and access by meeting certain credentials. We explore:
- Defining what Privileged Access Management means to your organisation- Where does it fit in your business strategy map?
- Empowering employees and ensuring a positive security experience
- Developing IT Security policies that explicitly cover privileged accounts, using PAM as a fast route to compliance and as a key tool in the fight against cybercrime
Creating a Threat-Centric IAM Solution - A Capability Model
- Defining the key elements of the IAM- Threat Centric Strategy, the core elements including policy and new IAM technologies
- Analysing various integration methods for threat intelligence into the IAM Stack to improve design, provision, run and access times
- IAM maturation and becoming ready to embrace new disruptive technologies like IoT
Improving Customer Journeys
Customers are the all-important key to business feedback no matter the size of the enterprise. We discover new systems for managing customer data and insights and having a more well-rounded view of the customer journey as well as keeping their data safe at all times.
- Is CIAM data more consistent than CRM?
- IAM can enable security through a combination of a strong identity, context and access rights
- Understanding the difference between IAM systems including Traditional, Federated and CIAM
Building Blocks to GDPR Compliance: Why IAM is a key enabler to success
A strong IAM strategy can enable organisations to quickly identify a GDPR breach by using numerous systems to keep access management regulated. This presentation looks at how a clear segregation of duties can reduce error and fraudulent activity, and improve access security for corporate data.
Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Blockchain for Digital Identity
Blockchain allows many benefits when partnered with Identity Management, it allows you to be the owner of your own data, and it is inherently resistant to tampering which enables added on extra security for your companies’ data. However blockchain is in its infancy and is commonly utilised more by financial institutions than any other sector. We discuss how enterprises can benefit from enabling the tracking of data to allow for quicker reactions to information breaches, and giving control back to the data owner. We also explore the key industries primed for blockchain disruption.
Is there a shortage of security talent?
(ISC)2 estimates that “by 2019 there will be a need for 6 million security professionals, but only 4.5 million will have the necessary qualifications for those jobs”. We look to understand the disconnect in the above figures:
- Is there a shortage of skills? What can businesses and universities do to plug the gaps?
- Training and upskilling your existing security and IT teams
- Venturing outside the existing talent pool, recruiting from other industries
- Retaining your security staff
IAM trends in 2019 and beyond
The IAM landscape is evolving. Solution providers are continually creating new and exciting tools and technologies in this space.
This end of the day session will inspire and educate IAM visionaries on the coming trends to look out for.
Questions to the Panel of Speakers
Closing Remarks from the Conference Chair
Whitehall Media reserve the right to change the programme without prior notice.