Programme @


Identity Management

15 June 2022

Millennium Gloucester Conference Centre, London

Programme @ IDM

Morning Session

building a more secure, trustworthy and reliable IAM enterprise

  • With whom does identity sovereignty lie?
  • How to establish, build and sustain a more robust digital trust framework
  • Putting identity at the centre of your security strategy
  • IAM convergence: centralise your IAM policy decision making
  • You’ve successfully implemented an Identity Governance Solution – How have you positioned yourself to ensure successful auditing?
  • Identity security: a CISO perspective

09:00 (BST)

Conference Chair's Opening Address

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Gilad Rosner, Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

09:15 (BST)

Customer Case Studies: If it’s not Simple, Scalable and Agile, it’s not Modern IGA

Craig Ramsay
Senior Solution Architect, Omada
view profile

Craig Ramsay, Senior Solution Architect, Omada

IGA continues to evolve and for any solution to be fit for purpose and meet the demands of organisations today, it needs to be easy to configure, provide elastic scalability and deliver rapid Time-to-Value.

We’ll share our views of how IGA needs to evolve, highlight key winning strategies from our proven best practice framework, and show how our customers are securing their organisation’s identities with successful modern IGA programs that are delivering rapid value and low TCO.

09:30 (BST)

Digital Identity Ecosystems for the Travel Industry; interoperability across borders

Annet Steenbergen
Advisor digital identity & travel Government of Aruba
view profile

Annet Steenbergen, Advisor digital identity & travel Government of Aruba

Identity has always and will always be central to travel; from booking a flight, a hotel or a car rental and crossing a border. The many developments in digital identity give the opportunity to assist the travel industry in the recovery from the Covid-19 pandemic with more efficiency, better customer experience and sustainability. An identity management ecosystem for the travel industry needs to serve many stakeholders (public and private) to create a seamless experience that centres around the traveller.

Over the last two years, the traveller data set has also seen the addition of the first digital travel credential specifications and digital health credentials.

This session will address the interoperability, standards and trust frameworks needed for a travel identity management ecosystem from a public and private perspective. The experience from the developing next phase of the Aruba Happy Flow Project serves as a practical use case.

09:45 (BST)

Redefining Identity Security for the Modern World

Paul Squires
Identity Strategist, SailPoint
view profile

Paul Squires, Identity Strategist, SailPoint 

A key factor of good Identity Security practice is the integration of the applications and data. In this session we will look at how traditional “best practice” approaches don’t always work and the compromises that are often made. We will then cover how we can leverage modern capabilities to improve these approaches and help drive better results for a security-led identity programme.


10:00 (BST)

A single digital identity within the financial services industry and beyond – case study

Harry Weber-Brown
Digital Innovation Director, TISA UK
view profile

Harry Weber-Brown, Digital Innovation Director, TISA UK

The vision is to create a single Digital ID that meets all relevant regulatory requirements (KYC and AML) and is positioned to consumers, as the prime
means for securely identifying themselves to UK Financial Services.

This Digital ID will allow consumers to re-use their verified identity and associated KYC attributes to open and access online financial services.

The ID standards also support EU requirements, and as such will facilitate cross border EU trading.

Problem area: consumers do not have a reusable identity they can use across
financial services, which are costly and duplicative for the industry

Aims – to test a how a federated digital identity scheme could be used by
consumers and financial services

Methods: developed a Proof-of-Concept and tested it with consumers, financial
services and identity providers, now moving to a Live Pilot.

Results: Proof-of-Concept results and an overview of plans for the Live Pilot.

10:15 (BST)

Orchestrate the Friction Out of Building Secure Digital Experiences

Rob Otto
EMEA Field CTO, Ping Identity
view profile

Rob Otto, EMEA Field CTO, Ping Identity

As the number of digital touchpoints in the customer journey rises, IT teams are relying on customer identity to optimize security and user experience. But, ensuring one doesn’t overshadow the other often requires multiple integrations and custom development that add internal friction and slow down innovation.

Join this session to see how you can use identity orchestration to eliminate roadblocks and increase cross-functional collaboration to get seamless, secure customer experiences to market faster.

You’ll learn how Ping’s approach to building, testing and optimizing secure digital journeys using an intuitive drag-and-drop interface combined with out-of-the-box integrations can boost IT agility to meet every business requirement

10:30 (BST)

PlainID: Why Policy-Based Authorization is Critical for Identity First Security

Pascal Jacober
Sales Director, Europe PlainID - The Authorization Company
view profile

Pascal Jacober Sales Director, Europe PlainID – The Authorization Company

The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly segmented world, CISOs and IAM leaders find themselves struggling with multiple systems and interfaces that control the most basic question: Who has access to what and when?

In this session, we will present a new architecture for Identity First Security based on centralized Access and Authorization Policy Management Platform, and discuss the pros and cons, specific real-world implementations and more.

10:45 (BST)

Questions to the Panel of Speakers

11:00 (BST)

Refreshment Break Served in the Exhibition Area

11:25 (BST)

Welcome to Session Two

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Gilad Rosner, Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

11:30 (BST)

Why Zero Trust, Why Now?

Brian Chappell
Chief Security Strategist, BeyondTrust
view profile

Brian Chappell, Chief Security Strategist, BeyondTrust

Remote working is now commonplace, while hybrid and multi-cloud footprints continue to rapidly expand.

In this increasingly perimeterless world, organizations must embrace zero trust security principles, such as least privilege, continuous authentication and monitoring, segmentation, and micro segmentation to stay secure, while moving digital transformation forward.

Join Brian Chappell, Chief Security Strategist, who will share:

• What Is Zero Trust?
• Zero Trust vs. Zero Trust Architecture – Are They Different?
• The Path to Zero Trust

11:45 (BST)

The key to sustainable and successful IAM – exploring self-service and trends that make-or-break IAM functions

Peter Barta
IAM Cloud Security Engineer, Norges Bank Investment Management
view profile

Peter Barta, IAM Cloud Security Engineer, Norges Bank Investment

IAM offers the means to manage and secure the identities and data within your organisation, but who can keep track of it all?

Scalable IAM must be secure, and easy to use, but requires empowering and educating users to manage their own resources.

In this presentation, we will address the balance between ease of use and security, as well as the communication around IAM implementations, which is key to a successful IAM strategy.

• How is IAM presenting itself in your company?
• How to balance IAM security and ease of access?
• How to successfully communicate IAM implementations?

12:00 (BST)

Strategies to make Zero Trust become Zero Friction

Scott Shields
Senior Security Engineer, Delinea
view profile

Scott Shields, Senior Security Engineer, Delinea

Regulatory bodies, government agencies and CIOs continue to mandate Zero Trust as a key cyber security framework. But what are the main considerations and how do you achieve this vision without sacrificing productivity? With many definitions and different interpretations of Zero Trust and ways to communicate its importance, it’s key to understand the critical steps. This session gets back to basics, covers the fundamentals and helps uncover the reality check on what Zero Trust really means along with the path to success.

Key takeaways:
-How the principles of least privilege can be applied at speed and scale to help enable Zero Trust
-Just-in-time and on-demand privilege elevation strategies
-How organisations can balance security and productivity while securing critical infrastructure
-Critical steps that IT decision-makers must take to address current cybersecurity challenges

12:15 (BST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

12:30 (BST)

Seminar Sessions

13:15 (BST)

Networking Lunch Served in the Exhibition Area

Afternoon Session

building back better with your users, customers and business in hand

  • The building blocks of advancing your customer journey
  • Adopting a holistic approach to PAM: support the shift to a zero-trust model
  • Business friendly IAM: what it means and why it matters
  • Building the pillars of a ransomware aware business
  • The entitlement management journey – from spreadsheets to AI
  • True end-to-end lifecycle management: a holistic approach to identity and authentication
  • from the shop floor to the heavens: implement a modern identity infrastructure

14:00 (BST)

Conference Chair’s Afternoon Address

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Gilad Rosner, Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

14:05 (BST)

Identity Convergence using The Virtual Platform

Andy Pinnington
Executive Director and Co-founder, CyberIAM
view profile

Andy Pinnington, Executive Director and Co-founder, CyberIAM

This session will explore:

-Single Sign On, Identity Access Governance and Privileged Access Management is converging
-Business and Technology Advisory and Consulting joins technology to business delivery
-A Virtual Agnostic Converged Platform results in a low-risk single programme of success

14:20 (BST)

PIB Insurance : Zero Trust Empowering Company Growth

Jason Ozin
Chief Information Security Officer, PIB Group; member, Cyber Club London
view profile

Jason Ozin, Group Information Security Officer, PIB Insurance

This session will look at how PIB Insurnance moved to a zero trust based access architecture to reduce the attack surface, improve their security posture, while enabling the business to grow rapidly from 60 to over 2500 employees in a very short window, simplifying architectures, improving agility and efficiency and realising cost savings along the way.

14:35 (BST)

CIAM for the Win

Michael Bunyard
Head of Marketing for IAM, WSO2
view profile

Michael Bunyard, Head of Marketing, IAM, WSo2

Your Customer Identity and Access Management (CIAM) program don’t have to be burdened with uncomfortable tradeoffs.

You can achieve your security objectives AND deliver a low-friction customer experience (CX), extend the platform to suit your organization’s needs, deploy it however your organization requires, and achieve a quick ROI.

All of these features are best in class B2B use case support.

14:50 (BST)

Case Study: An Automation Story from the Healthcare Industry

Teemu Nieminen
Solutions Architect, Apotti Oy
view profile

Teemu Nieminen, Solutions Architect, Apotti Oy

This session will explore:

  • Challenges in the first electronic client and patient record and ERP system in the world combining social care and health care
  • Functional requirements for the account management
  • Level of automation today

15:05 (BST)

Questions to the Panel of Speakers

15:20 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:45 (BST)

Welcome to the Final Session

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Gilad Rosner, Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

15:50 (BST)

Reusable Identity case study: Mobile ID for Strong Customer Authentication

Niko Häkkinen
Solutions Architect, Telenor/DNA Oy
view profile

Niko Häkkinen, Solutions Architect, Telenor/DNA Oy

The opportunities for secure, efficient, and user-friendly identity journeys with Reusable Identity/Bring Your Own ID Case study: why and how DNA Telecom is revolutionising Mobile PKI and reducing fraud with the new Finnish Mobile ID The unique benefits that Telcos bring to the reusable identity landscape

16:05 (BST)

Why Legacy MFA is Not Good Enough for Modern Authentication Requirements

Dan Gadd
Senior Sales Engineer, Beyond Identity
view profile

Dan Gadd, Senior Sales Engineer, Beyond Identity

Passwords: Are the top initial attack vector of security breaches

  • How can we resolve this? Issues with “Legacy MFA”
  • It’s simply not secure enough anymore
  • How Does Strong Auth Relate to Zero Trust?
  • Beyond Identity – Frictionless, Passwordless MFA


16:20 (BST)

Power of the ServiceNow Platform: Building IGA in Your Workflows

Paul Walker
Vice President, Product Management, Clear Skye
view profile

Paul Walker, Vice President, Product Management, Clear Skye

From identity and access management (IAM) to zero trust, solutions for every security challenge have hit the market in droves. With threats growing in sophistication and frequency, enterprises have adopted a ‘more is more’ mentality. But rather than leaving businesses better protected and efficiently running, it’s resulted in multiple, siloed, best-of-breed tools that fail to complement how people work. From this, a new powerful trend has emerged: organizations are turning to ITSM/workforce management platforms to manage identity.

In this session, Paul Walker, VP of Product Management at Clear Skye will discuss why ServiceNow is the new foundation for identity governance and security. You will learn the benefits of carrying out identity tasks on the Now Platform, including improved UX, quicker time to value, and reduced friction from fewer business siloes.

16:35 (BST)

Questions to the Panel of Speakers

16:50 (BST)

Closing Remarks from the Conference Chair

17:00 (BST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Zero Trust user verification using SIM-based authentication
Zero Trust is increasingly being adopted as the best strategy for access management and fraud prevention. To help achieve progress on Zero Trust, there is now a new, effortless way to implement continuous user verification – use SIM-based authentication that uses the cryptographic security already used by mobile operators. Before we show you how it...
Frequently asked questions about IGAmore application.
Blog By: Appmore   What is IGAmore? IGAmore is the ServiceNow IGA solution built to answer all needs for state-of-the-art IGA, IAM, IDM solution. The organizational policies and processes and procedures related to the oversight of identity management can be referred to as Identity Governance and Administration (IGA). Is IGAmore available in ServiceNow Store Yes:!/store/application/38e2cb954f2a8f008ef74fa18110c78f...
How To Use MFA To Achieve Regulatory Compliance
By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading industry regulations. Lately it has also become a necessity to qualify for cyber insurance. This is because MFA significantly reduces the risk of system penetration, up to a remarkable 99%. Let’s dive into MFA and how...