Seminars @


Identity Management

15 June 2022

Millennium Gloucester Conference Centre, London

Seminars @ IDM


Away from the plenary, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

The Path to Zero Trust by Securing Privileged Identities


Brian Chappell, Chief Security Strategist, BeyondTrust

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments. In this interactive workshop, Brian will outline: • Why protecting identities is fundamental to achieving Zero Trust • Practical steps you can take NOW to secure your privileged identities • The pivotal role Privileged Access Management plays in achieving Zero Trust

Brian Chappell
Chief Security Strategist, BeyondTrust
view profile
Room / Location:
Main Conference Room

Identity Lifecycle Tools for Your *Entire* Workforce


Jonathan Neal, VP, International Solutions Engineering, Saviynt

The global workforce is experiencing tremendous churn caused by the Great Resignation and other effects of the pandemic. Security teams are overwhelmed by the sheer volume of joiners, movers, and leavers and the increased focus on third-parties to enable the business. Managing identities and access policies across your entire workforce requires integrated tools to automate manual processes and provide risk-based visibility into potential weaknesses. Join this session to find out how cloud-based solutions for identity governance and administration combined with third-party access governance are critical to close your employee and third-party security gaps.

Jonathan Neal
VP, International Solutions Engineering, Saviynt
view profile

Role of IAM and Log Forensics in Mitigating Insider Threats


Vivin Sathyan, Senior Technology Evangelist, ManageEngine 

Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program. This is the main reason for organizations to opt for a hybrid AD approach. However, the other side of the coin w.r.t the hybrid AD approach and remote work is, that your network perimeters disappear. This paves the way to an increase in insider threats. To address this new challenge, organizations must build a integrated security strategy with hybrid identity management and log forensics at the center.

Vivin Sathyan
Senior Technology Evangelist, ManageEngine
view profile
Room / Location:

How I learned to love Azure Active Directory B2C, and you can too!


Marcus Idle, Head of External Identity, Kocho 

It can be a difficult balancing act trying to provide a seamless and confident customer experience whilst simultaneously protecting their identities. But Microsoft’s advanced security tools are here to provide stability. In this session, I will show how Azure AD B2C can delight your customers and other external users – consumer, business, and anything in between – with hassle-free login and authentication experiences – while providing market-leading security and compliance features. From single sign on to out-of-the-box integrations, I’ll explain the features and benefits of Azure AD B2C, including real-life examples of it in action.

Marcus Idle
Head of External Identity, Kocho
view profile

How IAM Managed Services Contribute to a Global Cyber Security Strategy – Challenges & Best Practices


Gavin Brown, Sales Director UK, iC Consult UK

Digital Identities are the core of Zero Trust. Managed Services for IAM are an efficient approach to leverage consistent levels of security with factory patterns. DevOps models require flexibility, so it is crucial to ensure that central MSP approaches do not conflict or slow down agile development.


  • The role of Managed Services in Zero Trust
  • How IAM processes enable DevOps teams
  • How MSP supports a Zero Trust Strategy at a global scale
Gavin Brown
Sales Director, iC Consult UK
view profile
Room / Location:
Cromwell 2

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Zero Trust user verification using SIM-based authentication
Zero Trust is increasingly being adopted as the best strategy for access management and fraud prevention. To help achieve progress on Zero Trust, there is now a new, effortless way to implement continuous user verification – use SIM-based authentication that uses the cryptographic security already used by mobile operators. Before we show you how it...
Frequently asked questions about IGAmore application.
Blog By: Appmore   What is IGAmore? IGAmore is the ServiceNow IGA solution built to answer all needs for state-of-the-art IGA, IAM, IDM solution. The organizational policies and processes and procedures related to the oversight of identity management can be referred to as Identity Governance and Administration (IGA). Is IGAmore available in ServiceNow Store Yes:!/store/application/38e2cb954f2a8f008ef74fa18110c78f...
How To Use MFA To Achieve Regulatory Compliance
By Eran Shmuely | Cyolo Multi-factor authentication (MFA) is a powerful solution for achieving and maintaining compliance with the leading industry regulations. Lately it has also become a necessity to qualify for cyber insurance. This is because MFA significantly reduces the risk of system penetration, up to a remarkable 99%. Let’s dive into MFA and how...