Morning Session
towards a more robust, reliable and flexible ID-driven enterprise
- Cybercrime – A Societal Threat
- Securing the Future of Digital Identity
- A Global Retails Access Governance Journey
- Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
- Unlocking the Power of CIAM: SaxoBank’s Road to Enhanced Security, User Experience, and Operational Efficiency
- AI and role mining – do’s and don’ts
- Prevention of Lateral Movement using MFA and service account protection in Active Directory
08:00 (CET)
Registration and Exhibition Opens
Refreshments will be available in the Exhibition area.
09:15 (CET)
Conference Chair's Opening Address
Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant
09:25 (CET)
Cybercrime - A Societal Threat
Jan Olsson, Police Superintendent/Operations Developer, SC3 Swedish CyberCrime Center
With each passing day, new and increasingly advanced cyberattacks are published. Pretty much every company and organization has had attacks from cybercriminals and many don’t even know about it. In a world that is painted more and more like an ongoing Armageddon, one wonders if there are even opportunities to protect oneself and one’s business?
The answer is that it is easy to significantly reduce the risks of an attack and significantly minimize damage in the event of a completed attack.
Jan will be discussing:
- What the consequences are of cybercrime?
- Who are behind the attacks?
- What the police and other actors are doing?
- What is fast approaching regarding the new Modus Operandi?
09:45 (CET)
Securing the Future of Digital Identity
Mehmet Yaliman, Principle Solutions Architect, Ping Identity
Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials.Decentralized identity represents a massive paradigm shift to a safer, more secure future by making the user’s device the transport mechanism for that single user’s data. In other words, no more “trusted” third parties. Decentralized identity eliminates the need to build connections into federation systems, and reduces the amount of personally identifiable information organizations must collect.In short, we’ll discuss how shifting to a decentralized identity model reduces risk for organizations while simultaneously improving users privacy.
10:00 (CET)
A Global Retailers Access Governance Journey

Johan Finndahl
Engineering Manager – Access Governance, Enterprise Identity & Access Management, IKEA IT AB
view profileJohan Finndahl, Engineering Manager – Access Governance, Enterprise Identity & Access Management, IKEA IT AB
How are IKEA approaching Access Governance for their global retail organisation with an everchanging digital landscape? This presentation will cover the following topics:
- What are the Access Governance challenges in our organization?
- Where did we start and what we have done up until today?
- What’s next on our roadmap?
- Lessons learned
10:15 (CET)
Adrift in a sea of Cyber-terror: Are you looking for a life jacket or a lifeboat?
Hans-Robert Vermeulen, Identity Strategist, SailPoint
As you try to defend yourselves against current threats and have the desire to better control the access you hand out, you need to choose the right solution. With vendors in the Access Management and Privileged Access Management space branching out and offering IGA-like capabilities, it becomes more difficult to choose. Especially if you must rely on websites of different vendors, as you will quickly learn that they all use the same verbiage, making it difficult to understand the actual differences between these offerings. Differences you will need to understand to distinguish between the life jacket and the lifeboat before committing to a solution.
10:30 (CET)
Questions to the Panel of Speakers
10:45 (CET)
Refreshments Served in the Exhibition Area
11:15 (CET)
Welcome to Session Two
Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant
11:20 (CET)
Unlocking the Power of CIAM: SaxoBank's Road to Enhanced Security, User Experience, and Operational Efficiency

Ivo Van Bennekom
EMEA Impact Center Leader, Digital Identity, PwC.
view profile
Matthew Berzinski
Senior Director, Product Management, ForgeRock
view profileIvo Van Bennekom, EMEA Impact Center Leader, Digital Identity, PwC
Matthew Berzinski, Senior Director, Product Management, ForgeRock
As more financial services became primarily a digital experience, SaxoBank’s legacy application and security system was not able to keep up. By putting security in the epicentre of their innovation they were able to develop new capabilities where security enhanced end user experiences and increased business, as opposed to being a hindrance as previously viewed. In this session, we will delve into a case study illustrating how SaxoBank revamped their CIAM infrastructure to deliver:
- – Increased conversion rate of new investor self service enrollments
- – Fast, yet secure, authentication for financial traders
- – Flexible Journey Time Orchestration to meet unique user’s needs
- – Improved Business Agility by reducing develop time to release new applications and feature
11:35 (CET)
Mind the GAP
Karin Bianconi, Digital Planning, Coop
Daniel Lundegård, IAM Solution Architect, Mowiid
Niels Fenger, Advisory Practice Director, Omada
This presentation is a story about how a well-defined procurement process and the best intentions in the world can compromise a successful operational implementation of any enterprise-wide IT solution. When you do not ask the right questions to the right people, you likely become unknowingly naive about your own maturity and is headed into a situation that will be difficult to navigate. This story is based on Coop’s IGA journey with Omada and is co-presented by Coop. Coop is one of the largest grocery retailer chains in Sweden with more than 830 stores and an online offering.
11:50 (CET)
Prevention of Lateral Movement using MFA and service account protection in Active Directory
Haiko Wolberink, VP of Sales – EMEA, Silverfort
In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.
What are the security gaps to address this exponential phase of the attack?
This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.
12:05 (CET)
Questions to the Panel of Speakers &
12:20 (CET)
Delegates move to the Seminar Rooms
12:30 (CET)
Seminar Sessions
13:15 (CET)
Networking Lunch Served in the Exhibition Area
Afternoon Session
adapting to the new normal with the right tools, technology, and processes
- Making sense of uncertain identity information: Collecting and assessing good quality data in the field of migration
- Large scale pilot with digital identity wallets: EWC experiences up until now
- How Decentralized Identity will affect your APIs
14:00 (CET)
Welcome to Session Four
Dr. Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant
14:05 (CET)
Making sense of uncertain identity information: Collecting and assessing good quality data in the field of migration
Raffaele Angius, Product Owner, The Norwegian Directorate of Immigration – UDI
This presentation will take a closer look at the extreme cases in which a person’s claimed identity is not backed by reliable, recognized documents and sources. How do you ensure that Raffaele is who he claims he is? How is legal identity assessed and administered? Some migration cases are the frontier of identity determination. The collection of good-quality data and the management of information is crucial when we don’t know anything about the person in front of us. Discussion points will include:
- Data quality in migration cases
- Assessment of identity data
- Control and investigation in borderline cases
14:20 (CET)
Large scale pilot with digital identity wallets: EWC experiences up until now

David Magård
Senior Advisor at Swedish Companies Registration Office (Bolagsverket) and Coordinator at EWC
view profileDavid Magård, Senior Advisor at Swedish Companies Registration Office (Bolagsverket) and Coordinator at EWC
Digital identity wallets are expected to be the main solution to how we identify and exchange attestations in the EU in the coming years. EWC is part of the EU large-scale pilots and is focusing on travel, payments, and organisational identities. EWC will present what they are doing, key learnings so far, and what the future might hold for digital identity wallets.
14:35 (CET)
How Decentralized Identity will affect your APIs
Jacob Ideskog, CTO, Curity
In this talk Jacob Ideskog, CTO of Curity, will describe the shift taking place in the digital identity space. Within a few short years, decentralized identity technologies and standards will be a common part of user authentication, on boarding, and data exchange. This major shift will also affect the APIs of organizations. Authorization will need to be adapted to new ways of working with digital identity.
In this talk, attendees will be presented with a broad description of digital identity and the changes taking place in this field. Participants will gain insights into how they should update their architectures in order to prepare for this new identity paradigm. Attendees will be left with a timeline for adoption, which starts now, so you won’t want to miss this talk!
14:50 (CET)
Questions to the Panel of Speakers
15:05 (CET)
Afternoon Networking and Refreshments served in the Exhibition Area
15:30 (CET)
Seminars
Delegates can attend another one of the Seminar sessions
16:15 (CET)
Conference Closes Delegates Depart
Please note:
Whitehall Media reserve the right to change the programme without prior notice.
Follow us on social
Keep up to date with what's going on by following us on social media.