Programme @

IDM

Identity Management

15 June 2022

London

Programme @ IDM

Session One

building a more secure, trustworthy and reliable IAM enterprise

  • With whom does identity sovereignty lie?
  • How to establish, build and sustain a more robust digital trust framework
  • Putting identity at the centre of your security strategy
  • IAM convergence: centralise your IAM policy decision making
  • You’ve successfully implemented an Identity Governance Solution – How have you positioned yourself to ensure successful auditing?
  • Identity security: a CISO perspective

09:00 (BST)

Conference Chair's Opening Address

09:05 (BST)

With whom does identity sovereignty lie?

With the rapid fusion of physical, biological and digital, identity is now more personal than ever. At the same time, data breaches, hacking and centralised honey pots mean that customers are more vulnerable than ever before.

How we collect and process data in order to personalise services may be the difference between gaining trust or getting fined.

A distributed ledger, Self-Sovereign Identity and Zero Knowledge Proofs offer new opportunities to build trusted data and identity stack.

Taking the best of CIAM together with increasing the rights and protections for customers will drive connected use-cases, lower costs and enable new business models.

This session will focus on how incorporating SSID, ZKP and progressive disclosure enables an enterprise to personalise products and services without putting customers at risk.

09:20 (BST)

How to establish, build and sustain a more robust digital trust framework

Delivering digital experiences that meet customer expectations is critical to digital transformation, but opportunities to get up close and personal with customers intersects with risk, security and a lack of trust.

In this talk, we share our perspective on how best to respect end-user sovereignty, manage enterprise security and strengthen brand reputation.

  • Engagement based on transparency, choice and control
  • Data as a shared asset in a true value exchange
  • Layered Consent and Lifecycle Management
  • Profile and Privacy Management Dashboard

09:35 (BST)

Putting identity at the centre of your security strategy

The trend towards the acquisition of new technology platforms means that many are finding it increasingly difficult to secure their new environments, both in terms of user access and against bad actors.

A crowded marketplace of new and emerging products, solutions, and services in which employees, customers and third-party actors interact has ensured that identity compromise and privilege elevation has become the primary cause of a security breach.

It is for this reason that organisations have increasingly turned to the adoption of a zero-trust model in which identity sits at the centre of the security strategy.

Join us as we highlight the importance of having an assumed breach mindset, how to shift your risk posture, and make identity central to your security strategy.

09:50 (BST)

IAM convergence: centralise your IAM policy decision making

This session will provide you with practical solutions and implementation models to allow you to go behind the UX SSO curtain, expose the many distributed systems and platforms that mandate their own rules for providing access, and highlight how you can undo the seemingly intractable problem of related but differentiated access points in order to centralize your policy management to provide standardization, visibility, security, and easier management of your access rules.

You will come away with proven architectures and strategies that you can begin to implement within your own organization.

10:05 (BST)

You’ve successfully implemented an Identity Governance Solution - How have you positioned yourself to ensure successful auditing?

Enterprises are responding to cybersecurity threats and concerns of their boards by making substantial investments into their Identity Governance programs.  This is often done without factoring in downstream impacts to control management and audit requirements. After the last SOW is paid and the deployment of new technology is deemed a success, IAM program owners are often surprised by their new responsibilities to internal and external auditors.

This discussion aims to address this common issue and provide guidance on setting expectations of what audit will require of program owners. Building governance in from the onset of the roll out of new services will enable successful outcomes long after your partner teams have departed.

10:20 (BST)

Questions to the Panel of Speakers

10:35 (BST)

Refreshment Break Served in the Exhibition Area

11:05 (BST)

Panel Discussion and Audience Q&A

Identity security: a CISO perspective

Identity now underpins everything we do. Whether that be rolling out new services, communicating with our customers or supporting internal collaboration and communication.

The centrality of identity in enterprise activity has brought it into a sharper focus than ever been before.

Now that management has realised that they need to give it increasing degrees of attention, the question is how to best build out an identity-led organisation which is secure, responsive and productive.

Join us for this exclusive insight into what constitutes IT and business imperatives from the perspective of the gatekeeper of enterprise information security.

11:35 (BST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

11:50 (BST)

Seminar Sessions

12:30 (BST)

Networking Lunch Served in the Exhibition Area

Session Two

building back better with your users, customers and business in hand

  • The building blocks of advancing your customer journey
  • Adopting a holistic approach to PAM: support the shift to a zero-trust model
  • Business friendly IAM: what it means and why it matters
  • Building the pillars of a ransomware aware business
  • The entitlement management journey – from spreadsheets to AI
  • True end-to-end lifecycle management: a holistic approach to identity and authentication
  • from the shop floor to the heavens: implement a modern identity infrastructure

13:30 (BST)

Conference Chair’s Afternoon Address

13:35 (BST)

The building blocks of advancing your customer journey

If done well, integrating marketing and customer relationship management functions with CIAM can help business owners achieve ROI.

Join us as we explain how powerful CIAM can be when you are transforming your organisation to become successful in doing business online.

We address:

  • How to onboard new customers within minutes while applying a zero-trust approach
  • How to balance the user experience, cost, and security requirements the right way
  • Integrating CIAM with Salesforce to support a digital customer journey from A to Z
  • The power of CIAM in future online business model

13:50 (BST)

Adopting a holistic approach to PAM: support the shift to a zero-trust model

In light of the great migration to remote working, the past year has seen an intensification in the prioritisation of remote privileged access and secrets management.

From a business perspective, being able to secure and control employee and third-party access in the age of the hyper-distributed workforce is an increasingly difficult dynamic to tame.

We address, how, with a zero-trust security posture you can secure access for your global workforce, from your employees, partners, and contractors.

14:05 (BST)

Business friendly IAM: what it means and why it matters

IAM is a key element in securing the data of your company. Yet, IAM is also the front door of all employees.

How do you make sure IAM is both secure and easy to use?

In this presentation, we will address the balance between ease of use and security, as well as the communication around IAM implementations, which is key to a successful IAM strategy.

  • How is IAM presenting itself in your company?
  • How to balance IAM security and ease of access?
  • How to successfully communicate IAM implementations?

14:20 (BST)

Questions to the Panel of Speakers

14:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:05 (BST)

Building the pillars of a ransomware aware business

Ransomware is now the single biggest risk for enterprises, regardless of size or industry.

Not only has the number of attacks increased but so too has the severity of damage done per incident.

Of equal concern is the production of ransomware on an industrial scale.

Join us as we look at the state of ransomware from a business and technical perspective, highlight the ransomware attack surface, and map out the ransomware essentials you need to implement and manage.

15:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

16:05 (BST)

The entitlement management journey - from spreadsheets to AI

Access management started with the dumping of data into spreadsheets and progressed to tools with impressive UI’s showing how to review data and certify in an accessible package for auditors.

Since then, the industry has evolved significantly from manual to automated provisioning and centralising tools in order to support the ambition towards a truly centralised IAM system of authentication and verification.

We address, why recertification no longer has a place in a highly regulated and complex businesses environment and should be replaced by automated approval and rejection of access via the use of analytics.

16:20 (BST)

True end-to-end lifecycle management: a holistic approach to identity and authentication

As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points.

Of course, the identity and access management solutions you need to manage these access points are plentiful. The larger question is how do you make sure the person who wants access is who they say they are?

We address, the criticality of ensuring you expertly manage the full identity lifecycle of users across your organisations hybrid on-premises and cloud environment, and how this can best be achieved through automation.

16:35 (BST)

From the shop floor to the heavens: implement a modern identity infrastructure

As organisations continue to move into the cloud, they face significant technical debt as they attempt to migrate away from burdensome legacy systems.

Given that 80% of IT budgets are consumed by operating, maintaining, and managing existing systems and workloads, a successful migration to a modern identity infrastructure is in everyone’s interest.

We address, how you can modernise your infrastructure by extending identity and access management for end users, partners, APIs, and servers to the cloud.

16:50 (BST)

Questions to the Panel of Speakers

17:00 (BST)

Closing Remarks from the Conference Chair

17:05 (BST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...