Programme @

IDM Nordics

Identity Management

7 May 2024

Clarion Hotel Arlanda Airport

Programme @ IDM Nordics

Morning Session

towards a more robust, reliable and flexible ID-driven enterprise

  • Modern Authentication
  • Migrating from Legacy to Modern IGA
  • Artificial Intelligence – Impact and Threats in Identity and Access Management
  • Navigating Identity Evolution: From Past to Future
  • Navigating Complexity: Implementing Unified CIAM Solutions across Diverse Franchisee Landscapes
  • Rise Above the Noise: A Vault Solution Alone is Not Enough
  • PAM: The Critical Foundation For a Successful Identity Security Strategy
  • Benefits of Having a Cross-Collaborative Understanding of IAM
  • The Key to Secure Online Ecosystem and Identity Management With CIAM

08:00 (CEST)

Registration and Exhibition Opens

Refreshments will be available in the Exhibition area.

09:00 (CEST)

Conference Chair's Opening Address

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

09:10 (CEST)

Modern Authentication

Ernestas Bartkevičius
Head of Identity and Access Management, SEB (Skandinaviska Enskilda Banken)
view profile

Ernestas Bartkevičius, Head of Identity and Access Management, Skandinaviska Enskilda Banken (SEB)

  • What is your password?
  • Enterprise password management best practice
  • Industry IAM maturity as “common wealth”
  • IAM as foundation for digital resiliency
  • Modern authentication: Passwordless
  • Windows Hello: practical use case

09:30 (CEST)

Migrating from Legacy to Modern IGA

Paul Walker
Field Strategist, Omada
view profile

Paul Walker, Field Strategist, Omada

Join this session together with Omada’s Field Strategist, Paul Walker, who will walk you through the migration from a legacy identity system to modern IGA.

The following key topics that will be covered are:
• The challenges of legacy identity systems
• The benefits of a modern IGA solution – and what does it include?
• The steps towards deploying a modern IGA solution explained through real-life customer cases

09:45 (CEST)

Artificial Intelligence - Impact and Threats in Identity and Access Management

Daniela de Almeida Lourenço
CISO, Financial Services Company
view profile

Daniela Almeida Lourenço, CISOFinancial Services Company

  • AI as a friend – imminent possibilities of revolutionising the concept of identity
  • AI as a foe – threats and weaponisation; machine versus machine
  • Is Attribute-Based Access Control back?
  • Potential breakthrough use cases for digital identity providers, from cybersecurity practitioners

10:00 (CEST)

Navigating Identity Evolution: From Past to Future

Hans-Robert Vermeulen
Identity Strategist, SailPoint
view profile

Hans-Robert Vermeulen, Identity Strategist, SailPoint

To envision the future, one must first grasp the past. The transition from rudimentary IDM to today’s Identity Security embodies a pivotal shift towards a comprehensive and proactive stance in safeguarding digital identities amidst escalating threats. Reflecting on this journey offers invaluable insights into our present circumstances, the path that led us here, and the trajectory we must pursue. Join us in this session as we explore this evolutionary journey, elucidate existing challenges, and anticipate the unfolding landscape of Identity in the days to come.

10:15 (CEST)

Navigating Complexity: Implementing Unified CIAM Solutions across Diverse Franchisee Landscapes

Sushant Devata
Enterprise Architect (IAM), Inter Ikea Technology Services AB
view profile

Sushant Devata, Enterprise Architect (IAM), Inter Ikea Technology Services AB

In today’s dynamic business environment, delivering exceptional customer experiences has evolved from a luxury to an indispensable necessity. However, attaining this benchmark is a formidable task without the backing of a robust CIAM solution. Join me as I guide you through the intricacies of designing CIAM solutions tailored for complex and expansive enterprises. This presentation will encompass:

  • Setting the Background and Context
  • Identifying Key Challenges and Considerations
  • Outlining the Approach
  • Detailing the Design and Implementation Strategy
  • Extracting Key Takeaways for Implementation Success

 

10:30 (CEST)

Rise Above the Noise: A Vault Solution Alone is Not Enough

Chris Dearden
Senior Sales Engineer, Delinea
view profile

Chris Dearden, Senior Sales Engineer, Delinea

– The current status of Identities/Privileges in today’s market.

– Assessing key attack vectors.

– How compliance and regulations affect the adoption of Privileged Access Management: How Delinea’s PAM solution can help meet the requirements of the EU NIS2 directive.

– A vault alone is not enough: How does modern PAM enforce security best practices and what role do Least Privilege and Just-in-Time Access Policies play?

10:45 (CEST)

Questions to the Panel of Speakers

11:00 (CEST)

Refreshments Served in the Exhibition Area

11:25 (CEST)

Welcome to Session Two

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

11:30 (CEST)

PAM: The Critical Foundation For a Successful Identity Security Strategy

Matthew Sturman
Senior Solutions Engineer, BeyondTrust
view profile

Matthew Sturman, Senior Solutions Engineer, BeyondTrust

Identity compromise and misuse are central to almost every cyberattack. This is causing a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security. This session will cover:

  • How gaps in visibility between Identity Access Management (IAM) and security tools create vulnerabilities.
  • How impersonated identities can be exploited to access resources, compromise systems, and achieve illicit objectives.
  • The emerging field of Identity Threat Detection and Response (ITDR).

11:45 (CEST)

Benefits of Having a Cross-Collaborative Understanding of IAM

Nicklas Moestrup
Enterprise Security Architect, Semler 
view profile

Nicklas Moestrup, Enterprise Security Architect, Semler

Using a concrete example, this session will explore:

  • How taking a holistic view helps identifying strengths and weaknesses of an IAM design
  • How a good collaboration among partners, contractors, employees helps achieve a broader design overview
  • Why people still play a crucial role when designing IAM

12:00 (CEST)

The Key to Secure Online Ecosystem and Identity Management With CIAM

Vibeke Holm
Senior Sales Director Nordics, Thales
view profile

Vibeke Holm, Senior Sales Director Nordics, Thales

The global digital landscape is undergoing a significant transformation and the battle for customers is intensifying. Modern organisations are now focused on delivering strategic, omnichannel experiences to their customers that support user-friendly applications, regulatory compliance, and streamline onboarding processes for new customers and partners.

Furthermore, the need to secure customers’ personal data across all digital touchpoints in user-friendly solutions has never been more pronounced. To deliver these experiences efficiently and securely, organisations must leverage Customer Identity Access Management (CIAM) solutions that not only enhance the customer experience, but also protect customer data and privacy. A CIAM solution is no longer a luxury, but a necessity for organisations striving to create seamless customer experiences while ensuring the highest levels of security and data protection. As businesses continue to adapt to the changing digital landscape, the role of CIAM will become more integral.

12:15 (CEST)

Questions to the Panel of Speakers and Delegates Move to the Seminar Rooms

12:30 (CEST)

Seminar Sessions

13:15 (CEST)

Networking Lunch Served in the Exhibition Area

Afternoon Session

adapting to the new normal with the right tools, technology, and processes

  • How Knowledge of the Human Brain Can Help You to Succeed With Your IAM Programs
  • Life after IGA deployment: Lessons Learned
  • E-signing and How to Avoid Placebo Solutions?
  • IT Compliance as the IGA Transformation Driver
  • Securing Your Identities for Digital Services
  • Experiences with Role Based Access Control (RBAC) and Multi-Affiliation

14:00 (CEST)

Welcome to Session Four

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

14:05 (CEST)

How Knowledge of the Human Brain Can Help You to Succeed With Your IAM Programs

Sarah Aalborg
CISO & Head of IT Governance, Tivoli
view profile

Sarah Aalborg, CISO & Head of IT Governance, Tivoli

Starting right can make the rest easy. Understanding the human brain and using the right approach can take you far when implementing your IAM solution.

This discussion will focus on conquering challenges during IAM rollouts and implementing disciplines such as user and access management. We’ll use basic knowledge of the brain and our subconscious mind, starting with human evolution. 

14:20 (CEST)

Life after IGA deployment: Lessons Learned

Miska Laakkonen
Head of IGA & PAM Business, Nixu, a DNV Company
view profile
Brede Trollsås
Product Manager IAM, Coop Norge
view profile

Miska Laakkonen, Head of IGA & PAM Business, Nixu, a DNV Company

Brede Trollsås, Product Manager IAM, Coop Norge

Join us for an insightful discussion about life after an IGA deployment. In this session, Miska Lakkonen from Nixu, a DNV company and Brede Trollsås from Coop Norge will dive into the practical aspects of transitioning post-Identity Governance and Administration (IGA) implementation.

The session will be focused around:

– Insights from Coop’s successful IGA implementation project

– Lessons learned after the deployment process

– The way forward after implementation

14:35 (CEST)

E-signing and How to Avoid Placebo Solutions?

Mihails Galuška
Identity and Access Management Global Product Manager, If Insurance
view profile

Mihails Galuška, Identity and Access Global Product Manager, If Insurance

  • Many e-signing services look and work smoothly, though fail to ensure sufficient legal evidence to the business.
  • Get to know fundamental cryptographic principles used to identity-protect legal evidence in the document.
  • Understand why many widely adopted “e-signing” methods in Nordic provide a false feeling of safety and suggest an easy way to forger the signature.

14:55 (CEST)

Questions to the Panel of Speakers

15:10 (CEST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:35 (CEST)

Welcome to Session Five

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

15:40 (CEST)

IT Compliance as the IGA Transformation Driver

Grzegorz Nawrocki
Manager IAM Governance, DSV Global Transport and Logistics
view profile

Grzegorz Nawrocki, Manager IAM Governance, DSV Global Transport and Logistics

In this discussion, Grzegorz will present how the IGA governance ownership can be placed in the IT Compliance department and how the overall ownership and responsibilities with regards to IGA can be split between Compliance, IT, and Business. He will speak about increasing external expectations towards IGA and present our internal requirements defined by IT Compliance. He will present the overall IGA ownership setup we have in DSV, and share challenges encountered, lessons learned, and recommendations. This presentation will be focused on processes and compliance requirements, not on a certain technology or application. He will mostly discuss IGA, not IAM in general. In this high-level agenda, Grzegorz will take you through:

  • A brief walkthrough of increasing external expectations and requirements towards IGA & IAM (ISO 27001, NIS2 etc.)
  • Internal IGA requirements defined by IT Compliance
  • Why IT Compliance as a transformation driver?
  • DSV IGA Ownership
  • Challenges encountered, lessons learned and recommendations

 

16:00 (CEST)

Securing Your Identities for Digital Services

Per-Gustaf Stenberg
Senior IT Security Consultant, Ductus
view profile
Peter Jervgren
Enterprise Architect Information Security, Ductus
view profile

Per-Gustaf Stenberg, Senior IT Security Consultant, Ductus

Peter Jervgren, Enterprise Architect Information Security, Ductus

Identities are not just personal information that you use to log in or verify yourself online. They are often associated and linked to other complex and dynamic attributes that reflect who you are, what you do, and what you want in different contexts and situations. And then we have the identities that exist beyond the personal ones, such as organizational, social, and device identities. We will discuss how identities and users are different, and why it matters.

We will also share some best practices and tips on how to use your identities securely in a digital service and how to enable your different identities for different services. The presentation will explain how to leverage the benefits of identity and access management (IAM) solutions that can help you protect your identities across various digital services.

16:15 (CEST)

Experiences with Role Based Access Control (RBAC) and Multi-Affiliation

Inge Broberg Kristiansen
IAM Product Manager, Region Midtjylland
view profile

Inge Broberg Kristiansen, IAM Product Manager, Region Midtjylland

Central Denmark Region has worked with IAM since 2007 and has achieved a high degree of maturity within IAM. The solution provides many advantages to the 40.000 employees in Hospitals, Psychiatry, and Social Services.

During this journey, the focus has been on implementing automated user administration, RBAC (Role Based Access Control), Governance, and multifactor login. This presentation will take a closer look at the benefits of RBAC in an organization that works with multi-affiliation.

16:30 (CEST)

Questions to the Panel of Speakers

16:45 (CEST)

Closing Remarks from the Conference Chair

Robert Garskamp
Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform
view profile

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

16:50 (CEST)

Conference Closes Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Why Henrique Teixeira Joined Saviynt | The IGA Problem, The Technology, The People | Saviynt
Blog By: Saviynt | Author: Henrique Teixeira The reason I’ve decided to join Saviynt was because my wife agreed it was a good idea. I’ve prepared an essay, entirely in my head, and I presented her the 3 things that made me think this was a good idea, during the Easter holiday of 2024. Today is...
Maintenance – the vital defense longtail of any IAM solution
Blog By: Ductus  Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities...
How to Manage Non-Employee Access
Blog by: Saviynt  The world of third party access governance  is – and isn’t – like identity governance and administration (IGA). The motivations may be the same but the risks are very different. Recently, Anirudh Sen (AS), Saviynt VP of Products, and Nitish Deshpande (ND), Research Analyst with  KuppingerCole, sat down to discuss third-party lifecycle management, process challenges, and...