Programme @

IDM Nordics

Identity Management

7 May 2024

Sheraton Stockholm

Programme @ IDM Nordics

Morning Session

towards a more robust, reliable and flexible ID-driven enterprise

  • Cybercrime – A Societal Threat
  • Securing the Future of Digital Identity
  • A Global Retails Access Governance Journey
  • Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
  • Unlocking the Power of CIAM: SaxoBank’s Road to Enhanced Security, User Experience, and Operational Efficiency
  • AI and role mining – do’s and don’ts
  • Prevention of Lateral Movement using MFA and service account protection in Active Directory

08:00 (CET)

Registration and Exhibition Opens

Refreshments will be available in the Exhibition area.

09:15 (CET)

Conference Chair's Opening Address

Dr Gilad Rosner
Digital Identity, Privacy and Regulatory Consultant
view profile

Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant

09:25 (CET)

Cybercrime - A Societal Threat

Jan Olsson
Police Superintendent / Operations Developer, SC3 Swedish CyberCrime Center
view profile

Jan Olsson, Police Superintendent/Operations Developer, SC3 Swedish CyberCrime Center

With each passing day, new and increasingly advanced cyberattacks are published. Pretty much every company and organization has had attacks from cybercriminals and many don’t even know about it. In a world that is painted more and more like an ongoing Armageddon, one wonders if there are even opportunities to protect oneself and one’s business?

The answer is that it is easy to significantly reduce the risks of an attack and significantly minimize damage in the event of a completed attack.

Jan will be discussing:

  • What the consequences are of cybercrime?
  • Who are behind the attacks?
  • What the police and other actors are doing?
  • What is fast approaching regarding the new Modus Operandi?

09:45 (CET)

Securing the Future of Digital Identity 

Mehmet Yaliman
Principal Solutions Architect , Ping Identity
view profile

Mehmet Yaliman, Principle Solutions Architect, Ping Identity

Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials.Decentralized identity represents a massive paradigm shift to a safer, more secure future by making the user’s device the transport mechanism for that single user’s data. In other words, no more “trusted” third parties. Decentralized identity eliminates the need to build connections into federation systems, and reduces the amount of personally identifiable information organizations must collect.In short, we’ll discuss how shifting to a decentralized identity model reduces risk for organizations while simultaneously improving users privacy.

10:00 (CET)

A Global Retails Access Governance Journey

Johan Finndahl
Engineering Manager – Access Governance, Enterprise Identity & Access Management, IKEA IT AB
view profile

Johan Finndahl, Engineering Manager – Access Governance, Enterprise Identity & Access Management, IKEA IT AB

How are IKEA approaching Access Governance for their global retail organisation with an everchanging digital landscape? This presentation will cover the following topics:

  • What are the Access Governance challenges in our organization?
  • Where did we start and what we have done up until today?
  • What’s next on our roadmap?
  • Lessons learned

10:15 (CET)

Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?

Hans-Robert Vermeulen
Identity Strategist, SailPoint
view profile

Hans-Robert Vermeulen, Identity Strategist, SailPoint

As you try to defend yourselves against current threats and have the desire to better control the access you hand out, you need to choose the right solution. With vendors in the Access Management and Privileged Access Management space branching out and offering IGA-like capabilities, it becomes more difficult to choose. Especially if you must rely on websites of different vendors, as you will quickly learn that they all use the same verbiage, making it difficult to understand the actual differences between these offerings. Differences you will need to understand to distinguish between the life jacket and the lifeboat before committing to a solution.

10:30 (CET)

Questions to the Panel of Speakers

10:45 (CET)

Refreshments Served in the Exhibition Area

11:15 (CET)

Welcome to Session Two

Dr Gilad Rosner
Digital Identity, Privacy and Regulatory Consultant
view profile

Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant

11:20 (CET)

Unlocking the Power of CIAM: SaxoBank's Road to Enhanced Security, User Experience, and Operational Efficiency

Ivo Van Bennekom
EMEA Impact Center Leader, Digital Identity, PwC.
view profile
Matthew Berzinski
Senior Director, Product Management, ForgeRock
view profile

Ivo Van Bennekom, EMEA Impact Center Leader, Digital Identity, PwC
Matthew Berzinski, Senior Director, Product Management, ForgeRock

As more financial services became primarily a digital experience, SaxoBank’s legacy application and security system was not able to keep up.  By putting security in the epicentre of their innovation they were able to develop new capabilities where security enhanced end user experiences and increased business, as opposed to being a hindrance as previously viewed. In this session, we will delve into a case study illustrating how SaxoBank revamped their CIAM infrastructure to deliver:

  • – Increased conversion rate of new investor self service enrollments
  • – Fast, yet secure, authentication for financial traders
  • – Flexible Journey Time Orchestration to meet unique user’s needs
  • – Improved Business Agility by reducing develop time to release new applications and feature

 

11:35 (CET)

AI and role mining – do’s and don’ts

Niels Fenger
Advisory Practice Director, Omada
view profile

Niels Fenger, Advisory Practice Director, Omada

In this session you will learn about what is important to think through before using AI for role mining. You will also get a customer example of how one customer used this approach in their IGA deployment.

11:50 (CET)

Prevention of Lateral Movement using MFA and service account protection in Active Directory

Haiko Wolberink
VP of Sales – EMEA, Silverfort
view profile

Haiko Wolberink, VP of Sales – EMEA, Silverfort

In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.

What are the security gaps to address this exponential phase of the attack?

This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.

12:05 (CET)

Questions to the Panel of Speakers &

12:20 (CET)

Delegates move to the Seminar Rooms

12:30 (CET)

Seminar Sessions

13:15 (CET)

Networking Lunch Served in the Exhibition Area

Afternoon Session

adapting to the new normal with the right tools, technology, and processes

  • Making sense of uncertain identity information: Collecting and assessing good quality data in the field of migration
  • Large scale pilot with digital identity wallets: EWC experiences up until now
  • How Decentralized Identity will affect your APIs

14:00 (CET)

Welcome to Session Four

Dr Gilad Rosner
Digital Identity, Privacy and Regulatory Consultant
view profile

Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant

14:05 (CET)

Making sense of uncertain identity information: Collecting and assessing good quality data in the field of migration

Raffaele Angius
Product Owner, The Norwegian Directorate of Immigration - UDI
view profile

Raffaele Angius, Product Owner, The Norwegian Directorate of Immigration – UDI

This presentation will take a closer look at the extreme cases in which a person’s claimed identity is not backed by reliable, recognized documents and sources. How do you ensure that Raffaele is who he claims he is? How is legal identity assessed and administered? Some migration cases are the frontier of identity determination. The collection of good-quality data and the management of information is crucial when we don’t know anything about the person in front of us. Discussion points will include:

  • Data quality in migration cases
  • Assessment of identity data
  • Control and investigation in borderline cases

14:20 (CET)

Large scale pilot with digital identity wallets: EWC experiences up until now

David Magård
Senior Advisor at Swedish Companies Registration Office (Bolagsverket) and Coordinator at EWC
view profile

David Magård, Senior Advisor at Swedish Companies Registration Office (Bolagsverket) and Coordinator at EWC

Digital identity wallets are expected to be the main solution to how we identify and exchange attestations in the EU in the coming years. EWC is part of the EU large-scale pilots and is focusing on travel, payments, and organisational identities. EWC will present what they are doing, key learnings so far, and what the future might hold for digital identity wallets.

14:35 (CET)

How Decentralized Identity will affect your APIs

Jacob Ideskog
CTO, Curity
view profile

Jacob Ideskog, CTO, Curity

In this talk Jacob Ideskog, CTO of Curity, will describe the shift taking place in the digital identity space. Within a few short years, decentralized identity technologies and standards will be a common part of user authentication, on boarding, and data exchange. This major shift will also affect the APIs of  organizations. Authorization will need to be adapted to new ways of working with digital identity.
In this talk, attendees will be presented with a broad description of digital identity and the changes taking place in this field. Participants will gain insights into how they should update their architectures in order to  prepare for this new identity paradigm. Attendees will be left with a timeline for adoption, which starts now, so you won’t want to miss this talk!

14:50 (CET)

Questions to the Panel of Speakers

15:05 (CET)

Afternoon Networking and Refreshments served in the Exhibition Area

15:30 (CET)

Seminars

Delegates can attend another one of the Seminar sessions 

View Seminar Sessions

16:15 (CET)

Conference Closes Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Phased Approach: The Importance of Building a Mature PAM Program
Blog By: Xalient  The ever-present cybersecurity threats and the high costs of cyber insurance are driving many organizations to consider building a mature Privileged Access Management (PAM) program to protect their systems and infrastructure. When approaching PAM, organizations often view the process as a one-time solution implementation to help them stay compliant. The reality is...
Optimized IGA: The Power of Clear Skye + ServiceNow
Blog by: Clear Skye  Our decision to build our software natively on ServiceNow is a big part of what enables us to approach identity differently—dare we say better?—than other players in the game. It’s not just our opinion that the platform way is the best way—so why settle for better when we could be the...
The Crucial Role of Identity in Zero Trust Security
Written by Jaye Tilson, Field CTO, HPE Aruba Networking and Brian Ramsey, VP America, Xalient In an increasingly digital world where cybersecurity threats are constantly evolving, organizations are embracing new strategies to protect their sensitive data and assets. One such approach that has gained prominence in recent years is Zero Trust. Zero Trust challenges the traditional...