Thursday 15th November 2018

The Seminars will take place from 12.15 hrs – 13.00 hrs
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


PAM: The Critical Missing Piece in Your Security Strategy

Chris Clarkson, Senior Solutions Engineer, Bomgar

Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). This session will cover what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will discuss: – Why organisations should make PAM their top 2019 investment – Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success – Tools to prepare the business case for your PAM project and to get Executive Leadership buy in.

Extend Your Enterprise IAM Strategy to Where the Money is Being Made

Ernesto Di Mauro, Senior Cloud Identity and Access Management Expert, Okta

As Identity Management is becoming mainstream, the audience around IAM requirements is changing from just employees to B2B and CIAM. While organisations are taking advantage of digital transformation, it is no longer just a way to keep the lights on in your business, it is becoming a money maker. In this session Frank Benus, Solution Engineer from Okta, will discuss how extending your IAM strategy towards your core business will help you deliver secure and seamless experiences while opening new opportunities to differentiate your products and services. In a dynamic session, he will briefly explain the concept of Oauth2.0 and Open ID Connect, and demonstrate how this can help you deliver value to customers and business partners.

After the session, you will gain better understanding on how IAM can drive business opportunities both in the B2B as well as in the B2C space. And how you can maximize your investment in portals and apps and deliver products and services even quicker and more secure to your customers and partners.

Why Identity Should be at the Centre of Your Cybersecurity Strategy

Martin Whitby, EMEA Identity Specialist, SailPoint Technologies
Jonathan Raynor’s, Cybersecurity Programme Lead, Changestream Ltd

With the increase in the adoption of cloud solutions within enterprise information technology architecture there is a significant shift in the ability to rely on the traditional perimeter security model. Corporate boundaries have become increasingly porous as more and more capabilities are facilitated using off premises solutions.

In this session Martin Whitby, SailPoint’s Identity Specialist in Europe and Jonathan Raynor, a senior leader in transformational change, will show you why placing Identity at the centre of your Cybersecurity Strategy will decrease your risks while increasing agility and adoption of new solutions.

Businesses often find it hard to understand what identities exist in their estate, what applications they are associated with and what authority those identities should be associated with those identities whether on premise or in cloud based systems. Considering the dynamic of doing business with 3rd parties and the fact that it creates even more challenges around the security perimeter.

You need to start by having a controlled approach to your identity and how you allocate and use business processes around authorization and governance.
It takes time and you need to plan and take the journey.

Jonathan will talk through his experience of leading several multi-million dollar Information Security Improvement Programmes and developing and implementing IAM strategies for companies like Johnson Matthey, GSK and AstraZeneca.

The Adventures of Identity Governance in the Financial World

Bethina Pernille Luckow, Drift projektleder, Strategi & Optimering, BEC

BEC is a Danish IT development company servicing IT systems for financial institutions in operating in Denmark. They will be presenting the challenges and successes in an interactive format around User Engagement and User readiness as well as how to bring the fun of attestation and Segregation of Duties to users in a financially regulated environment.

Identity and Access Management, What’s the Risk?

Diana Volere, Principal Solution Engineer, Saviynt

In today’s landscape. Identity is now on the front lines of both Offense and Defense. With the rise of breaches involving weak or compromised identities we need to learn how to assess that risk in real time. Risk has become the new frontier in the Identity Game. Come and learn how our out of the box offerings can solve your governance, compliance and regulation heavy policies that can be as easy as the check of a box.

In this session you will learn how we change the approach to how users request access, how automation can lead the user and how machine learning can guide them to a less risky profile. During the approvals process we will show you how the approver can insure that the access is appropriate and know the risks in real time. We will show how risk is part of the entire process from end to end as well as insuring that when a person leaves we automatically mitigate any exposure from that departure.

With the move to the cloud, we will show how our solution which was built natively in the cloud to allow for ease of implementation, vast expansion capabilities, and a true SaaS offering. Why develop connectors when you can leverage standards based APIs for complete and easy implementation without coding.

Come and learn how Identity is Risk!

Poor Access Management Could Cost You Your Job

Harish Sekar, Regional Manager, ManageEngine

Are poor privileged account management practices leaving you vulnerable? Generally, privileged access includes permission for critical infrastructure, sensitive data, configuring systems and more. To know where they stand, every organization must perform a data risk assessment. This will give them a fair idea of who has access to what. Poor Identity and access management practices by organizations have resulted in many breaches and with the GDPR in place, there is an urgent need to implement an organization-wide Secure Identity and Privilege Access Management strategy to truly protect your business from both the outside and inside. In this talk, you will gain a better understanding of

  • How to skim through your existing data and implement a data governance strategy
  • Steps involved in building a secure and trustable identity access management process
  • How to sustain and operate on the least privilege methodology