Speakers @

IDM

Identity Management

15 June 2022

London

Speakers @ IDM

Featured Speakers

Extensive research is carried out in order to ensure that our programmes provide a platform for industry experts from the worlds most data driven organisations are able to address the most important issues which matter to you and provide a path towards greater success

Previous Speaker
Jon Lehtinen
Director, Identity & Access Management, Board Member, IDPro

Jon Lehtinen is an identity & security professional with 16 years of experience driving global-scale organizations like Thomson Reuters & General Electric to mature their identity & security postures.

He advocates for the adoption of standards-based protocols, automation, and self-service while reducing barriers to adoption through continuous customer engagement.

Jon is dedicated to the growth and maturity of IAM as a profession and is eager to mentor early career professionals to inject new voices into the industry.

He is a member of the OpenID Foundation, the Kantara Initiative, Women in Identity, and is a founding member of IDPro where he currently serves on the Board of Directors.

Previous Speaker
Kumud Dubey
Senior ASIC verification Engineer, Boeing

With over 18 years of experience in the software industry with leading MNCs like Alcatel Lucent, Mentor Graphics and Cadence Design Systems, Kumud has been a part of senior management and recognised as a thought leader within these organizations.

At present, she is working with Boeing India as a Senior ASIC Verification Engineer.

Being a prominent speaker and a well sought-after name in national and international conferences, she has been regularly quoted in Indian print and digital media on global issues. She has been invited by various Indian government bodies, including its defence forces to train their cyber workforce.

Along with her team, she has devised and conducted various events for capacity building and cyber safety awareness in association with state police departments and UNICEF.
She has supported various government initiatives in their technical reviews and audits, especially the smart city initiatives of the Government of India.

She has been involved actively in the Cadence Design System for solving complex design problems using Machine Learning Algorithms.

 

Previous Speaker
Yash Prakash
Chief Operating Officer, Saviynt 

As Saviynt’s COO, Yash works closely with customers, partners and employees to successfully deliver an intelligent Identity Governance and Cloud Security solution. This includes taking Saviynt’s unique solution approach from inception to delivering the right capabilities so Saviynt customers can effectively manage security and protect business-critical assets. As a key member of the executive team, Yash leads several strategic initiatives to drive company growth and deliver on the company’s mission of enabling smarter security for its customers. Prior to taking up this role, Yash led several key functions within Saviynt including product management, marketing, analyst relations, information security, and professional services. He brings over two decades of experience in product management, consulting, business development, and executing complex engagements for leading enterprises across the globe. Prior to joining Saviynt, Yash held leadership positions at IBM and Infosys.

 

Previous Speaker
Lydia Payne-Johnson
Director, Information Security, Identity & Access Management and Risk, The George Washington University

Lydia Payne-Johnson is the Director of IT Security, Identity Management and Cybersecurity Risk at The George Washington University. In this role, Lydia is responsible for her teams’ service delivery, including alignment with the university’s digital transformation strategy. She is a dynamic, multi-talented executive with more than 35 years’ experience in regulatory compliance, risk, information security, data management, and consumer marketing across financial services, health information management, and higher education. She is a published subject matter expert, noted industry panellist, speaker, and mentor. She is an exceptional communicator and a culture change agent.

An effective leader, Lydia has been a Chief Privacy Officer and successfully led teams at Freddie Mac, Morgan Stanley, PwC, Verispan and CIT Group. She designed and led the implementation of privacy and cybersecurity policies, standards, risk and controls frameworks, and data classification schema, risk monitoring measures, data loss prevention, incident response, as well as privacy impact and third-party assessments. In addition, Lydia is adept at forging partnerships across businesses, IT, and service lines.

Early in her career, Lydia was Senior Vice-President and Global Advertising Director with Dean Witter Reynolds Inc. At Dean Witter, she was the primary driver overseeing creative processes for the firm’s highly successful, and globally recognizable media campaigns.

Lydia has a J.D. from New York Law School, is a Certified Information Privacy Professional (CIPP) and holds a certification for GIAC Law of Data Security & Investigations (GLEG). She is a graduate of the Executive Leadership Program of the Dartmouth College Tuck School of Business and holds certificates from KPMG’s Executive Leadership Institute for Women and the Securities Industry Institute of the Wharton School of Business

Previous Speaker
George Rogers
Enterpise Account Manager, BeyondTrust

With over 8 years experience in the Cyber Security industry George has developed a value driven, outcomes based, consultative approach to sales enabling him to connect technology with business needs. George is responsible for leading Enterprise Sales of BeyondTrust’s Universal Privilege Management portfolio into key strategic global accounts across all major verticals.

Previous Speaker
Karl Lankford
RVP Solutions Engineering, BeyondTrust,

Karl Lankford is the Regional Vice President, Solutions Engineering EMEIA, for BeyondTrust, where he has worked for 7 years. A highly capable security leader, Karl has acquired a wide range of security experience and knowledge over the last decade, working across multiple industries. Karl is a regular speaker at industry conferences, delivering disruptive technical and strategic thought-leadership insight to the international cybersecurity community.

Previous Speaker
Chris Eckl
Chief Technical Officer Condatis

Chris Eckl, Chief Technical Officer, leads a team of over 30 identity specialists at Condatis. He is an internationally acknowledged subject matter expert in identity systems and their application in healthcare, government, and commercial settings. Chris has been the Chief Architect of several substantial public and private sector identity projects. He sits on the Sovrin Governance Board, helping to shape the future of decentralized identity technology.

Previous Speaker
Johann Dilantha Nallathamby
Head of Solutions Architecture for IAM, WSO2

Johann is the Head of Solutions Architecture for IAM at WSO2. With more than 9 years of industry experience he is an in-house Subject Matter Expert (SME) for IAM, in which capacity he works with many global enterprises. Previously, he was the lead architect for WSO2 Identity Server. He has been a speaker at international conferences such as IDM Whitehall UK, a regular speaker at WSO2Con, conducted several meetups, workshops and technical webinars around the globe. He holds a First Class BSc (Hons.) degree in Computer Science and Engineering, from the University of Moratuwa, Sri Lanka.

Previous Speaker
Nick Mothershaw
Chief Identity Strategist, Open Identity Exchange

Nick is Chief Identity Strategist at the Open Identity Exchange, a community for all those involved in the ID sector to connect and collaborate, developing the guidance needed for interoperable, trusted identities. Through OIX’s definition of, and education on, Trust Frameworks we create the rules, tools and confidence to allow every individual a trusted, universally accepted, identity.

Nick has expert knowledge of Identity and Fraud solutions for a variety of different sectors using different verification techniques, spanning data validation to document selfie verification.

Nick was previously Director of ID and Fraud at Experian where he was responsible for the development of Experian’s fraud and identity solutions for both the public and private sectors.

Nick led Experian’s development, launch and operation of a full “Identity as a Service solution” which was the first live example of a Digital ID that is seamlessly interoperable across the public and private sector in the UK.

Previous Speaker
Niamh Muldoon
Global Data Protection Officer and EMEA Trust & Security Leader, OneLogin

Niamh Vianney Muldoon, award-winning information security thought leader with extensive expertise in creating and leading global security initiatives across multiple industries. Muldoon is OneLogin’s Global Data Protection Officer and EMEA Trust and Security Leader. Based in Dublin, Ireland, Muldoon heads-up all things trust, security, and privacy for OneLogin’s EMEA operations. This includes driving sales, engineering and customer service activities across the region.

Previous Speaker
Tobias Urban
Partner Solutions Engineer, Auth0

As a Partner Solutions Engineer, Tobias focuses on educating and enabling Auth0 partners in building modern and scalable CIAM solutions and in using Auth0 to create the best value possible for their customers. He is specifically focused on Cloud-native applications and Cloud Transformation and helping architects to design great solutions for their internal and external Identity needs.

Prior to Auth0 Tobias worked with major cloud providers and held roles in System Architecture and Product Development in the broader Identity landscape.

Previous Speaker
Ruben Rodriguez Perez
Sr. Solutions Engineering, Auth0

As a Sr. Solutions Engineering, Ruben is responsible for technically supporting the sales cycle when engaging with Auth0 prospects and customers to understand their technical requirements and guide them to the most appropriate identity solution based on their requirements. He has a wealth of knowledge and experience working with organisations to help them design and implement solutions that address internal, external, and regulatory compliance mandates through the effective use of technology.

Ruben has more than 10 years of experience in the IT industry, having worked for both large corporate organisations, and software analytics vendors. Prior to Auth0, he held senior consulting and presales roles for enterprise and strategic accounts at Capgemini and Qlik.

Previous Speaker
Ben Bulpett
EMEA Marketing Platform Director SailPoint Technologies

Ben is the SailPoint EMEA Marketing Platform Director, working across the region he supports the local SailPoint teams, partners and customers in helping define their strategy and adoption of an integrated Identity Governance platform. He also works closely with product management and the CTO office in inputting in future product development.With over 25 years’ experience in the software industry; where he has led teams,in the development and implementation of complex IT Security solutions in areassuch as; Access Management, Identity Management, Data Governance and Database etc across multiple verticals. Ben has travelled extensively throughout Europe, Middle East, Africa & America through his work responsibilities. He has spoken at numerous events on matterssuch as Security, Identity Governance and various related privacy issues.

Previous Speaker
Chris Owen
Director of Product Management, Saviynt

Chris is currently responsible for helping to drive Saviynt’s product innovation, roadmap, go-to-market messaging and competitive intelligence.

He has acquired a wealth of experience in Identity & Access Management (IAM) and Privileged Access Management (PAM) over a 15-year career in various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust and Centrify.

Chris began his career as a technical lead of one of the largest transformation projects in Europe at that time.

Previous Speaker
Eve Maler
Chief Technology Officer, ForgeRock

Eve is a globally recognised strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating standards such as SAML and User-Managed Access (UMA) and publishing research and has served as a Forrester Research security and risk analyst. She leads the ForgeRock Labs team investigating and prototyping innovative approaches to solving customers’ identity challenges.

Previous Speaker
Chip Hughes
Global Autonomous Identity Lead, ForgeRock

Chip is the global lead for ForgeRock’s Autonomous Identity solution. In this role, Chip is responsible for driving customer growth and success as well as acting as the liaison between Product, Engineering, Sales and Marketing. Prior to this role, Chip led the America’s South Sales team as a RVP and spent 8 years as part of the security software Sales team at Oracle. Chip’s depth of security domain expertise was built upon his 8.5 years delivering Identity Governance solutions to large-scale, global enterprises as a consultant at PwC.

Previous Speaker
Jens Sabitzer
Senior Solution Architect, Venafi

Jens Sabitzer is a Senior Solution Architect at Venafi, where he helps users to establish effective machine identity management programs that help them drive digital transformation efforts. With nearly 20 years of technology experience, Jens believes no one should do the same thing twice when it comes to IT security. Jens knows that digital transformation is at the heart of secure communications, and he is dedicated to managing machine identities that are often overlooked.

Previous Speaker
Stephane Dorchin
Commercial Director – Continental Europe, Venafi

Since more than 20 years Stephane helps European companies to transform their IT, their business and their security. As leader of Venafi in Continental Europe, Stephane became the trust advisors of CISOs, CIO and Security Professional in the IAM strategy with a focus on Machine Identity Management. Guiding them to identify their key challenges and the path to realize benefits in very short time.

Previous Speaker
Craig Ramsay
Senior Solution Engineer, Omada

An Identity Management enthusiast, Craig Ramsay has more than 10 years of experience in the Identity & Access Management field. Throughout his career he has worked within Professional Services, developing and delivering Identity strategies for clients across EMEA with a focus on IAM. He has strong experience in User Lifecycle Management; Role Management; Violation Management and Identity Strategy with knowledge of complimentary Identity technologies such as PAM, UEBA, DAG and others.

Previous Speaker
Elliot Stocker
Account Director, Darktrace

Elliot Stocker is a cyber security account director at Darktrace, a world leading AI company for cyber defense. Elliot advises many companies from a variety of industries on the use of artificial intelligence for their cyber defense strategy, including financial services, manufacturing and retail.

Previous Speaker
Jason Goode
Regional Director, Ping Identity

Jason Goode has over two decades specialising in Identity and Access Management including multi-factor authentication, single sign on (SSO) and Identity Governance. A track record of success, and a proven ability to establish and grow new businesses in EMEA, nurturing new and existing business relationships. Jason has vast experience across all vertical markets, supporting enterprises in large and complex IAM projects from inception through to closure. Striving every day to help clients and partners derive value from the technology, ultimately to drive business value.

Previous Speaker
David Terrar
Director and Chair, Cloud Industry Forum

David is a well-known strategist, keynote speaker and influencer on cloud computing, digital transformation, social collaboration and ERP software.

He is a Director and Deputy Chair of the Cloud Industry Forum, judges the UK Cloud Awards, and is Founder & CXO of digital strategy consultancy Agile Elephant.

He is a specialist in sales, marketing and operations in the technology sector, and guest lectures on digital and social media at Henley Business School and on INSEEC’s MBA programme.

David is an advisor and non-exec director for several companies, and a regular host on the tech TV channel Disruptive. Live.

Previous Speaker
Sara Farmer
Identity & Access Management Governance Lead / Risk Manager, Thomson Reuters

Sara Farmer specializes in the marrying of identity governance strategy, implementation and subsequent evidencing as required by industry auditing trends.

Sara has more than 15 years of experience in the Identity & Access Management space and has primarily focused on Access Operations protocols. Throughout her career,q she has worked with several industry-leading international organizations such as Thomson Reuters, Bank of America & American Insurance Group (AIG) on the re-design of critical access request lifecycle processes.

In her free time, Sara is invested in supporting the youth in her community by volunteering at her local 4-H chapter in the areas of technology and raising poultry. Sara is also committed to continuing her professional development as an active member of the Executive Women’s Forum and Women in Identity

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...