Identity Management

4 November 2020

Business Design Centre




Session One- deliver your strategy, help your customers and identify the leading solutions

  • Craft and deliver a successful IAM strategy
  • Identify your key digital transformation enablers
  • Neutralising the privacy-personalisation conundrum
  • Binding privacy and personalisation
  • third party identity and access demands
  • Managing identities in the cloud
  • Modernising your IAM architecture


Conference Chair’s Opening Address
Craft and deliver a successful IAM strategy: understanding the key components

What are your critical IAM priorities? Do you have the tools necessary to accomplish your goals? What is the cost of failure? These are just some of the questions business and IAM leaders are asking themselves as enterprises continue to navigate through an era of unprecedented disruption.

In our opening address, we explore what it is you need to do in order to elevate, align and integrate your IAM strategy with the priorities of the boardroom, how best to communicate IAM risk and compliance, how to secure companywide buy in and future proof your organisation in preparation for the evolving threat landscape.

Identify your key digital transformation enablers: CIAM

The information age has produced an environment in which the products and services offered by businesses are becoming intrinsically linked with customers and employees. Whilst integration supports innovation, collaboration and communication, it also breeds new challenges for CIAM governance.

Having an agreed CIAM solution which can accommodate privacy expectations and enterprise security is vital if you are to provide an unencumbered customer experience. 

By utilising CIAM in the right way you can deliver on your digital transformation ambitions and ensure your customers are a key part of that journey.

Neutralising the privacy-personalisation dynamic

One of the greatest challenges faced by IAM business leaders is striking the right balance between privacy and personalisation. This is particularly true when engaging with your customer base.

Whilst delivering experiences which meet the expectations of consumers helps drive your digital transformation, it also opens you up to increased security concerns, greater difficulty in mitigating risk and a lack of trust between businesses and customers.

In our opening address, we explore:

  • Transparent engagement
  • Data as an equal asset in the value exchange
  • Layered life cycle management with consent
  • Managing profiles and privacy on a shared platform
Binding privacy and personalisation: Blockchain for IAM

Given the trend towards greater levels of decentralisation, one of the ways in which organisations are seeking to address the conflict between privacy and personalisation is to isolate ownership of customer identities in the enterprise IAM pipeline through the adoption of distributed ledger technologies such as Blockchain.

We explore the growing popularity of distributed ledger technologies, how it can answer many of your CIAM challenges, enhance your privacy features and increase your trust factors.

The decentralisation challenge: third party identity and access demands

Across all industrialised nations, enterprises are becoming increasingly global, dynamic and decentralised. One dynamic element of how its workforces are structured is its non-employee contribution to global operations.

Interacting with globally dispersed partners and suppliers in real time relies upon an IAM system capable of mapping different lines of business according to the access demands being made and the verification of multiple identities required at any one time.

  • Granting and governing access in the non-employee context
  • The approach required for partners and suppliers
  • Addressing the complexities of non-employee business demands
  • Securing actionable insights on non-employee IAM
  • Mapping non-employee workflows and understanding the gaps
Questions To The Panel Of Speakers
Refreshments served in the Exhibition Area
Managing identities in the cloud: security and scalability

A requirement for all apps is the effective management of identities and authorisations. In an age in which applications must manage millions of identities at once, knowing how to verify its security features is of fundamental importance.

We will address:

  • Leveraging fully managed, serverless services in the cloud
  • Securely managing your user pools
  • Common challenges of IAM and identity federation
  • How cloud-based solutions can simplify your application security
Modernising your IAM architecture: supporting hybrid and multi-cloud environments

Internal and external privileged users present a challenge to today’s businesses as access demands shift according to the target servers required. Whilst hybrid and multi-cloud platforms are able to support such demands, many are faced with legacy issues which leak into new architecture and infrastructure designed to support privileged users moving between and within enterprise systems.

We discuss the value of introducing a unified, scalable and agile management platform which will help you move beyond the friction created by legacy systems, manage user authentication and authorisation at the speed of business operations and streamline the access management traffic flow.

Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
Seminar Sessions
Networking Lunch Served in the Exhibition Area

Session Two – navigating the complex and evolving IAM environment with cutting edge technology

  • Verifying identities with augmented intelligence
  • Simplifying and automating your overall control environment
  • Biometric authentication for consumer confidence
  • Entitlement Management: moving from spreadsheets to AI
  • Elevate your trust factor with Multi Factor Authentication
  • Navigate your digital ecosystem with single sign-on
Conference Chair’s Afternoon Address
AI and identity verification: verifying identities with augmented intelligence

AI, augmented intelligence and ML led identity solutions are increasingly being utilised by IAM leaders in order to verify identities and detect fraud. Whilst many projects have not transitioned from the piloting stage to production, there exists a number of real-world examples of successful deployment.

Through an anonymised example, we will detail how it is that AI, augmented intelligence and ML powered IAM can reduce verification costs, increase accuracy and improve customer experience.

Simplifying and automating your overall control environment

Many organisations wish to simplify and automate processes which are currently overly complex and manual heavy. Sadly, many lack the knowledge, understanding and vision necessary to deliver.

In this session, we explore how you can reduce complexity and add automation to your overall control environment by investing in access controls, assessing the end-to-end access risk evaluation process and identifying risks through a balanced remediation and mitigation framework.

Biometric authentication: from hype to reality

In order to meet growing demands for greater transparency, security and privacy in the business-consumer relationship, biometric methods have witnessed a technological upgrade in recent years.

By tying personal and physical traits to an online account in order to provide for seamless movement through the portfolio of online platforms your organisation may offer, you can advance your primary method of authenticating a customer profile, identify where biometric authentication can add most value and understand how best to manage your IAM systems moving forward as new and emerging technologies come to fruition.

Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Entitlement Management: moving from spreadsheets to AI

Many IAM leaders find the process by which they implement access management products for recertification and joiner, mover and leaver controls too reliant on manual processes. As a result, IAM leaders see the future as one in which this particular domain is dominated by AI analytics.


We discuss:


  • How to review data and recertify for auditors
  • How to move from manual to automated provisioning and centralising tools
  • How to move to an API component-based strategy as you move to the cloud
  • Simplify the recertification process with automated approval

Rejection of access demands via analytics

Multi Factor Authentication: elevate your trust factor

Organisations are now embracing MFA at an impressive rate due to its proven capability to protect important information and accounts. One of the primary reasons for increasing levels of adoption is the migration to hybrid/multi cloud platforms topologies designed to support SaaS, IaaS and PaaS.

It is time for MFA to form a key part of your strategic enterprise IAM initiatives.

We discuss how the right MFA can:

  • Identifying the right MFA for your organisation
  • Reduce risk of stolen credentials
  • Protect corporate applications
  • Mitigate phishing attacks
Single sign on: navigate your digital ecosystem with ease

With an effectively configured and positively streamlined single sign-on portal users only have to enter one set of credentials to access their web apps, whether in the cloud or behind the firewall. This can be done with the use of desktops, smartphones and tablets.

We discuss:

  • Selecting the right SSO for your organisation
  • How to deploy an effective single sign-on portal
  • The ROI secured and how to measure it
  • The increase in productivity
  • How this keeps your data secure
Questions to the Panel of Speakers
Closing Remarks from the Conference Chair
Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.