Seminars
Away from the virtual plenary you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.
The Seminars will take place from 12:15 – 13:00
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Build trust in your business: orchestrate your activity
SEMINAR A
As we move towards a password-free world in an attempt to facilitate frictionless access on a globally dispersed and distributed way, businesses are having to integrate their It function into increasingly complex ecosystems. In order to do so successfully, what is required more than anything is for this environment to be founded on trust.
In this session, we will address how to deploy, implement, and manage an identity hub which can orchestrate your IAM integration into the wider business digital ecosystem.
Room / Location:
Oudegracht 1-5 (Main Conference Room), Level 1
AI identity: automating IAM
SEMINAR B
The trend towards the adoption of new technologies combined with the move to the cloud has made it increasingly difficult for IT to manage user access. Added to this is the role that legacy IAM systems which are typically manually configured making it more difficult to adhere to security regulations as the space for errors open up at the same time as security vulnerabilities reveal themselves.
We address:
- AI automated identity authentication and verification
- Enhance and accelerate identity related decisions and tasks
- Identify risks and security issues
- Enable, empower, and optimise your IAM team
Room / Location:
Domtoren 1, Level 1
Delivering great experiences: building and retaining your customer base
SEMINAR C
In order to be competitive in today’s highly disruptive, fast paced, and prone to rapid change enterprise environment, businesses need to create exceptional customer experiences. A comprehensive CIAM functionality is the base upon which you can build and retain your customer base.
We address:
- Personalised customer experiences
- Secure and connect billions of customers and devices
- Authenticate and authorise billions of logins and transactions
- Facilitate data collection, security, analytics, privacy, and control
- Identify and protect against malicious activities and fraudulent behaviour
Room / Location:
Domtoren 3, Level 1
Secure all identities: adopting an intelligent identity platform
SEMINAR D
With an intelligent identity platform, you no longer have to choose between security and convenience. With smart authentication, you can transform your security and make it apart of your business enabling technology portfolio.
We address:
- Intelligent IAM as a productivity maintainer
- Simplified admin control
- Secure performance without interruption
- Deploy across platforms
Room / Location:
Domtoren 4, Level 1
Non-employee identity and risk mitigation: mapping your points of contact
SEMINAR E
Many organisations do not possess the capability to trace and secure their relationships with third-party actors, many of whom have PAM level credentials. As the non-employee element of how a business operates continues to expand, so too is the attack surface for both small and large businesses.
Given that more than a third of data breaches occur due to third-party mismanagement, the time has come to reduce your risk with third parties.
We address:
- Rating third-party identities
- Automate your workflows
- Support identity revalidation
- Transparent provisioning and de-provisioning
- Ease of integrations in order to validate access demands
- Avoid misclassification of non-employees
Room / Location:
Domtoren 5, Level 1
Cleaning up your entitlement landscape!
SEMINAR F
Having to prove, clean and manage access rights is becoming an increasingly difficult task as the IAM environment becomes more crowded. What is required in response, is a transparent, secure, and auditable way to appropriately archive clean permissions on all target systems and applications.
Attend this seminar to learn more about how you can implement an identity management platform which can address your IAG entitlements concerns.
Follow us on social
Keep up to date with what's going on by following us on social media.