SOCIAL


LATEST TWEETS

THE UK’S LEADING EVENT FOR RISK DRIVEN BUSINESS-CENTRIC IAM LUMINARIES, PRACTITIONERS AND END-USERS FROM ACROSS GOVERNMENT AND LARGE ENTERPRISE ORGANISATIONS, THIS IS IDM JUNE 2020

 

At a glance

What are the typical challenges you face within your organisation when implementing an IAM system? Access governance is all about reducing to the greatest possible extent the risk that comes with end-users and, more specifically, excessive or unnecessary access privileges to critical systems and data. It is vital therefore that you have the tools to monitor use, detect anomalies, keep track and act, as the access and governance system landscape continues to evolve driven by ever-growing business needs.

JOIN HUNDREDS OF THOUGHT-LEADERS AND INNOVATORS AT WHITEHALL MEDIA’S LEADING 21 st BIANNUAL IDENTITY MANAGEMENT CONFERENCE to identify new frontiers and opportunities, discuss ways to transform your IAM infrastructure into an actionable critical business resource and review the latest trends and technologies shaping the IAM sector to help you stay ahead of the curve.

FEATURED TOPICS

IAM Fundamentals: Best Practice on Strategy and Implementation

  • Building your business case
  • Ensuring the success of your IAM project – strategy and metrics
  • Managing entitlements, credentials, privileges, duties and roles
  • Provisioning/De-provisioning
  • Federated Access Management
  • CIAM vs Enterprise IAM
  • Intelligent API Security
  • CRM and IAM
  • Selecting the right solution provider
  • Effective data management and security
  • Taking account of GDPR
  • Essentials of identity administration and governance
  • Defining policy and action response
  • Server and network security
  • Password Management

Benchmarking for Success: Moving your IAM programme forward

  • Identifying and tracking new and emerging risks
  • Customer IAM – dealing with challenges
  • Encryption techniques
  • Endpoint security
  • Privileged Account Management
  • Business GRC
  • Security classification and policy enforcement
  • IAM Security / Threat Monitoring and Intelligence
  • Anomaly detection (analytics)
  • Incident and breach response
  • Multifactor authentication
  • Self-service IAM
  • Single Sign-On (SSO) Capabilities
  • Cloud user and access security
  • Continuity planning and data loss prevention

Future-proofing your IAM investment

  • Exploring future IAM trends
  • IAM and Disruptive Technologies – opportunities and risks
  • Blockchain-enabled IAM
  • Machine Learning and IAM
  • Automating manual processes
  • Deploying analytics for an insight-driven IAM programme
  • Understanding the evolving nature of trust and digital identity
  • Evaluating IaaS and PaaS service providers
  • Overcoming challenges with legacy
  • IAM
  • Keeping up with user expectations

Previous Speakers

SPONSORS

cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking