SOCIAL


LATEST TWEETS

SEMINARS

Thursday 18th June 2019

The Seminars will take place from 12.15 hrs – 13.00 hrs
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
Designing UI and UX Interfaces with Security in mind

Learn the best solutions for designing or purchasing interfaces which puts ease of access for both internal employees and external users and security as its main priorities.

SEMINAR 2
Implementing a hybrid IAM/ AI Strategy

This seminar covers AI with a particular focus on automating IAM processes and creating algorithms that can automatically process user data and credentials to provide Privileged Access Management.

SEMINAR 3
CIAM Systems — What they can do that your CRM can’t

We will give you real life case studies of the application of various CIAM systems in large enterprises. We discuss the benefits and add-on features of CIAM, such as improving the customer journey and easily analysing data.

SEMINAR 4
How Blockchain will disrupt IAM

Blockchain is an increasingly popular disruptive trend. We look more specifically at existing case studies, and how businesses can use blockchain to give control of data back to the owners.

SEMINAR 5
Disaster Recovery – Why it’s vital to your business
  • Discovering the key stages to the life cycle process of a cyber attack
  • How to reduce detection times
  • Incident response mechanisms in the event of data loss
SEMINAR 6
Incorporating Security in the DevOps process

The process of DevOps is time consuming and complex for many companies, and includes a whole organisational culture change. Continuous development goes hand in hand with continuous security. We look at protecting applications and data within the DevOps automation chain.

SEMINAR 7
IAM in the Cloud

Cloud delivery models comprising mainly of SaaS, PaaS and IaaS require seamless integration between cloud services and an organisation’s IAM practices, processes and procedures, in a scalable, effective manner. Learn how to integrate your IAM and Cloud infrastructure with ease.

SEMINAR 8
Incorporating Security in the DevOps process

We explore three key areas of Identity Management building on how each can aid in improving your enterprises GDPR compliance.

  • Privileged Account Management
  • Identity Governance
  • Access Management