Seminars @

IDM uk


15 June 2021

Brought to you by Whitehall Media

Seminars @ IDM uk


Away from the virtual plenary you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Delegates will be able to attend one seminar from each session live. No pre-selection is required – .and the remainder are available on demand as soon as they conclude.



A – BeyondTrust – The Path to Zero Trust with Least Privilege & Secure Remote Access


Karl Lankford, RVP Solutions Engineering, BeyondTrust

For most organizations the path to achieving 100% Zero Trust across their organization is far from clear. Understanding the barriers to implementation and the tools available to help you successfully deliver a Zero Trust strategy enables you to develop your best route to optimally securing your environment and minimizing your cyber risk.

In the session Karl Lankford, RVP Solutions Engineering from BeyondTrust will explore:

• What zero trust is and how NIST defines it

• The goals of zero trust

• Roadblocks to zero trust (legacy architectures and technologies)

• How Privileged Access Management aligns with and enables zero trust

view presentation

Karl Lankford
RVP Solutions Engineering, BeyondTrust,
view profile
Room / Location:
Session 4 @ 13:45

B – Auth0 – From Business to Business: Your customers and partners deserve a better IAM experience!


Ruben Rodriguez Perez, Senior Solutions Engineer, Auth0
Tobias Urban, Partner Solutions Engineer, Auth0

With businesses as the target customer for SaaS and B2B companies, handling authentication of users within these businesses can be complicated. How are users organized within a specific target business? What about separate branding, access control, and SSO for each business? We’re forced to build this all from scratch each time we create an application, which cuts into the time we have to build the app itself. We’ve struggled with this at Auth0 ourselves when building our applications, like our Dashboard.
Join us in this seminar where we share our learnings and Best Practices around building resilient, secure and exciting B2B applications that are powered by your IAM system. We will cover:
• Why a strong Identity foundation is essential for any B2B app
• How to secure and excite your business customers and partners
• The potentials and quick wins you should consider next time you work on your B2B offerings


view presentation

Tobias Urban
Partner Solutions Engineer, Auth0
view profile
Ruben Rodriguez Perez
Sr. Solutions Engineering, Auth0
view profile
Room / Location:
Session 4 @ 13:45

C – SAVIYNT – Protecting and monitoring privileged access in the cloud: the convergence of IGA + PAM


C – Saviynt – Protecting and monitoring privileged access in the cloud: the convergence of IGA + PAM

Chris Owen, Director of Product Management, Saviynt

Today, many organisations have digital transformation and cloud-first initiatives as their top priorities. For Privileged Access Management (PAM) solutions, the transient nature of the cloud is one of the biggest challenges. Critical assets have changed. Workloads can be spun up and down within days or hours. Admins connect to the cloud in multiple ways to perform privileged activities. Each of these new access points creates a new risk that organisations need to manage and monitor.

Traditionally, PAM was viewed as an IT problem, not a business problem, resulting in separate access policy silos and a lack of visibility into the most critical access within an organisation. But how can we truly understand what a person does with their privileged access and the risk associated with the totality of a user’s access across the enterprise?

Join this session and learn how combining Cloud PAM with Enterprise IGA can help you: –

Build a new, automated approach to securing critical assets within the cloud
Enhance your Zero Trust strategy with risk analytics
Inject preventative critical access risk analysis into the request process
Create risk-based approval workflows during the access request process
Include risk analytics in the privileged user access review process

view presentation

Chris Owen
Director of Product Management, Saviynt
view profile
Room / Location:
Session 4 @ 13:45

D – Darktrace – IoT Under Attack: Thwarting Zero-Days with Cyber AI

Elliot Stocker, Account Director, Darktrace
Join Elliot Stocker, Account Director at Darktrace, as he discusses the challenges of securing IoT devices, and learn how Cyber AI is able to detect and autonomously respond to the full range of IoT threats in their earliest stages.
In this session, we will uncover:
• How Darktrace’s AI understands what ‘normal’ looks like for all IoT devices on the corporate network
• How Darktrace recently thwarted a Mirai malware attack on a CCTV camera
• How a low-and-slow attack on a smart locker was neutralized by Cyber AI within seconds.

view presentation

Elliot Stocker
Account Director, Darktrace
view profile
Room / Location:
Session 4 @ 13:45

E – ForgeRock – Incorporating AI/ML and Identity Governance as part of a Continuous Compliance Architecture


Chip Hughes, Global Autonomous Identity Lead, ForgeRock

Global organisations have long used identity governance solutions to address user access and regulatory compliance requirements.  Each technology requires a clear identification of which users need access, what resources they need, and how access can be controlled to prevent unauthorised usage. As the size and scope of these challenges has increased, traditional approaches like RBAC have fallen short, for the simple reason that defining and maintaining roles is time consuming and difficult using legacy tooling or even the dreaded spreadsheets. Operational costs are exploding, users are suffering from identity fatigue, and auditors are calling out rubber stamping as a regulatory issue.

In this session, we will discuss how leveraging ML based approaches with Identity Governance can address these issues. More specifically, we will discuss how ML can help:

  • Automate the definition and creation of roles in a process that takes days not months
  • Provide visibility into existing user access and the confidence associated with that access
  • Identify outlier access that should be areas of focus as potential security concerns

Each of these areas can be incorporated into an Identity Governance architecture to both drive better security through continuous compliance and help alleviate identity fatigue and rubber stamping for the business.


view presentation

Chip Hughes
Global Autonomous Identity Lead, ForgeRock
view profile
Room / Location:
Session 5 @ 14:45

F – Venafi – What is Machine Identity Management and why should my company care


Jens Sabitzer, Senior Solution Architect, Venafi
Stephane Dorchin, Commercial Director – Continental Europe, Venafi

Just like user names and passwords authorize access to humans, keys and certificates act as machine identities that authorize and validate machine access to valuable data.

However, in many ways protecting the identities of machines is more challenging than protecting those of humans. Learn more about Machine Identity Management and why your company should care.

view presentation

Jens Sabitzer
Senior Solution Architect, Venafi
view profile
Stephane Dorchin
Commercial Director – Continental Europe, Venafi
view profile
Room / Location:
Session 5 @ 14:45

G – Ping Identity – Why Identity is the Key to Your Zero Trust Success


Jason Goode, Regional Director, Ping Identity

The shift to remote work has increased the urgency behind Zero Trust adoption as organizations seek to find the optimal balance between employee security and productivity.

Join us for a discussion on why identity should be the core of your Zero Trust strategy. We’ll draw on our experience helping the largest enterprises in the world further their Zero Trust initiatives, to cover:

-An overview of Zero Trust and the importance of Identity
-Immediate priorities for securing remote work
-How to strengthen security and reduce friction
-Strategic advantages of implementing Zero Trust architecture

view presentation

Jason Goode
Regional Director, Ping Identity
view profile
Room / Location:
Session 5 @ 14:45

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

How To Use MFA To Achieve Regulatory Compliance
By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading industry regulations. Lately it has also become a necessity to qualify for cyber insurance. This is because MFA significantly reduces the risk of system penetration, up to a remarkable 99%. Let’s dive into MFA and how...
Modern IGA means Simple, Scalable, Agile
By Rod Simmons | Omada Next week, we’ll be at IDM DACH, speaking with attendees about what modern Identity Governance and Administration (IGA) means to us, and why organizations today need it more than ever. The IDM event has a great agenda, and we’re slotted to speak in the morning session on May 24th. This...
Traditional Two-Factor Authentication vs. Beyond Identity’s Passwordless Authentication
Traditional Two-Factor or Multi-Factor Authentication (2FA/MFA) remains the “default” for dealing with fundamentally insecure, password-based authentication methods. We understand why they were the “go-to,” but hope to interrupt the “passwords are bad, so we need 2FA/MFA” refrain. There is now a new option grabbing attention and gaining traction – Modern Passwordless Authentication. Let’s compare traditional...