Seminars @

IDM uk

VIRTUALCONFEX

15 June 2021

Brought to you by Whitehall Media

Seminars @ IDM uk

Seminars

Away from the virtual plenary you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

The Seminars will take place from 12:15 – 13:00

Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.

Build trust in your business: orchestrate your activity

SEMINAR A

As we move towards a password-free world in an attempt to facilitate frictionless access on a globally dispersed and distributed way, businesses are having to integrate their It function into increasingly complex ecosystems. In order to do so successfully, what is required more than anything is for this environment to be founded on trust.

In this session, we will address how to deploy, implement, and manage an identity hub which can orchestrate your IAM integration into the wider business digital ecosystem.

Room / Location:
Oudegracht 1-5 (Main Conference Room), Level 1

AI identity: automating IAM

SEMINAR B

The trend towards the adoption of new technologies combined with the move to the cloud has made it increasingly difficult for IT to manage user access. Added to this is the role that legacy IAM systems which are typically manually configured making it more difficult to adhere to security regulations as the space for errors open up at the same time as security vulnerabilities reveal themselves.

We address:

  • AI automated identity authentication and verification
  • Enhance and accelerate identity related decisions and tasks
  • Identify risks and security issues
  • Enable, empower, and optimise your IAM team
Room / Location:
Domtoren 1, Level 1

Delivering great experiences: building and retaining your customer base

SEMINAR C

In order to be competitive in today’s highly disruptive, fast paced, and prone to rapid change enterprise environment, businesses need to create exceptional customer experiences. A comprehensive CIAM functionality is the base upon which you can build and retain your customer base.

We address:

  • Personalised customer experiences
  • Secure and connect billions of customers and devices
  • Authenticate and authorise billions of logins and transactions
  • Facilitate data collection, security, analytics, privacy, and control
  • Identify and protect against malicious activities and fraudulent behaviour
Room / Location:
Domtoren 3, Level 1

Secure all identities: adopting an intelligent identity platform

SEMINAR D

With an intelligent identity platform, you no longer have to choose between security and convenience. With smart authentication, you can transform your security and make it apart of your business enabling technology portfolio.

We address:

  • Intelligent IAM as a productivity maintainer
  • Simplified admin control
  • Secure performance without interruption
  • Deploy across platforms
Room / Location:
Domtoren 4, Level 1

Non-employee identity and risk mitigation: mapping your points of contact

SEMINAR E

Many organisations do not possess the capability to trace and secure their relationships with third-party actors, many of whom have PAM level credentials. As the non-employee element of how a business operates continues to expand, so too is the attack surface for both small and large businesses.

Given that more than a third of data breaches occur due to third-party mismanagement, the time has come to reduce your risk with third parties.

We address:

  • Rating third-party identities
  • Automate your workflows
  • Support identity revalidation
  • Transparent provisioning and de-provisioning
  • Ease of integrations in order to validate access demands
  • Avoid misclassification of non-employees
Room / Location:
Domtoren 5, Level 1

Cleaning up your entitlement landscape!

SEMINAR F

Having to prove, clean and manage access rights is becoming an increasingly difficult task as the IAM environment becomes more crowded. What is required in response, is a transparent, secure, and auditable way to appropriately archive clean permissions on all target systems and applications.

Attend this seminar to learn more about how you can implement an identity management platform which can address your IAG entitlements concerns.

Room / Location:
Domtoren 6, Level 1

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Amazon Trials at Hand
In a progressive step for the online retail giant, Amazon has presented a new and improved contactless payment service currently being trialled is US Amazon Go stores. Amazon One The new biometric scanner is the hope to streamline contactless payment security as well as physical access for consumers. Labelled as Amazon One, the device scans...
Remote workers on the front line: access to sensitive data and its security implications
Remote workers needing access to sensitive data and their security implications Following the overwhelming success of IDM Europe and ECS UK, we were delighted once again with the outcome of our Government IT Security virtual conference, which was held on the 23rd of September. During this event, delegates were enlightened by our guest speakers who...
Fixing the cybersecurity shortage
Our Annual Enterprise Cyber Security Virtual Conference was held on the 22nd of September. At this event, our guest speakers were able to express their personal and professional opinions in regards to their organisational roles and responsibilities In addition, our industry partners had the opportunity to expand their client base and delegates were able to...