Seminars @

IDM

Identity Management

18 June 2024

Victoria Park Plaza Hotel, London

Seminars @ IDM

Seminars

Away from the plenary, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Hackers Don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise

SEMINAR A

James Maude, Director of Research, BeyondTrust

The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security, effectively meaning the hacker has been replaced by the credentials thief. With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter. Following on from his main agenda session, join the discussion with James as he shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools. You will hear:

  • How the threat landscape is evolving.
  • Real world examples of identity breaches.
  • How attackers are exploiting hidden paths to privilege.
  • How controlling identities and privileges can be your greatest defense.
James Maude
Director of Research, BeyondTrust
view profile
Room / Location:
Main Conference Hall

The Journey to Zero Risk – Going Beyond IGA with Identity and Access Security Governance

SEMINAR B

Keri Bowman, Senior Director Product Marketing, Pathlock

It’s never too late to start your risk reduction journey and there are key considerations when evaluating what solution best suites the needs of your organization. From reviewing your app catalog for risk and regulatory reporting apps, to assessing total time spent provisioning to determine the cost vs value of IGA for some vs all apps, and identifying the risk exposure of the organization through the access granted to identities – all of these and more are driving companies to think beyond IGA to Application Access Governance (AAG) for identity and access security governance. The value in a unified identity governance and security approach is compounding and helps organizations realize faster time to value, lower TCO and longer term consistent risk exposure reduction.

Keri Bowman
Senior Director, Product Marketing, Pathlock
view profile

One Identity

SEMINAR C

coming soon – co presented with Quest

 

Saviynt

SEMINAR D

coming soon

Unite Identity and Devices – Delight Users With Identity-Driven End-to-End Device Management

SEMINAR E

Andy Brown, Product Director, Kocho

Discover how to reduce risk, improve compliance, and increase transparency, whilst creating an unforgettable experience for your teams.

We’ll discuss how to:

  • Reduce waste and automate JML processes.
  • Increase security with industry-leading Microsoft solutions.
  • Gain better control and visibility of devices.
  • Improve operational cost management.
  • Upgrade your user life-cycle experience to first class!

Learn how to improve your complete device lifecycle and the corporate experience for you and your users.

Andy Brown
 Product Director, Kocho
view profile

Building Radiant AI: Lessons Learned on Applying Large Language Models in Identity

SEMINAR F

Sebastien Faivre, CTO and Head of Product Management, Radiant Logic

Generative AI, with its capabilities in analyzing data and behavior, presents a promising solution to improve identity and application access risk management. Large Language Models (LLMs) provide a generational leap for understanding risks and detecting anomalies in data. However, they also suffer from a wide range of issues including hallucinations, privacy, and data protection–blocking many use cases. This session will cover our experiences in the integration of LLMs to streamline access governance processes and reduce access risk management for business applications. Key topics to be covered include:

  • Real-World Applications: Using LLMs to improve identity and application risk management
  • Commercial and Open Source LLM options
  • Integration patterns like Chain-of-Thought prompting, Chain-of-Experts and Retrieval Augmented Generation

This presentation is designed for IT professionals, cybersecurity experts, and decision-makers seeking to stay ahead of the curve in protecting their organizations. Join us to discover how Generative AI can be a game-changer in mitigating risks and fortifying your identity security posture.

Sebastien Faivre
CTO and Head of Product Management, Radiant Logic
view profile

CyberArk

SEMINAR G

coming soon

ProofID

SEMINAR H

coming soon

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Why Henrique Teixeira Joined Saviynt | The IGA Problem, The Technology, The People | Saviynt
Blog By: Saviynt | Author: Henrique Teixeira The reason I’ve decided to join Saviynt was because my wife agreed it was a good idea. I’ve prepared an essay, entirely in my head, and I presented her the 3 things that made me think this was a good idea, during the Easter holiday of 2024. Today is...
Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...