Live Agenda

IDM 2020 – VIRTUALCONFEX – The Live Virtual Summit will feature a mix of keynotes, panel discussions and covering the most IAM deployment issues so join us live if you can!

Be sure to check back as we enhance the agenda to ensure you have the most up-to-date information.  We look forward to your participation in IDM 2020 VIRTUALCONFEX.

Registered users can view the keynote, watch recorded sessions, and access other valuable content on-demand. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change.

Conference Content Overview:

Through cross-sector case studies and industry perspectives, we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The early morning session will also explore:

  • Identity governance and data access controls
  • Privileged Access Management and user authentication methods
  • Innovation and future-proofing your IAM programme
  • IAM security architecture
  • Digital transformation and your IAM platforms
  • How to utilise IAM to achieve business goals and empower digital business
  • Operationalising identity intelligence for risk mitigation
  • Future trends in the IAM space
24 hours pre event
Virtual Site Opens
  • Set up your networking profile
  • Set appointments
  • Familiarise yourself with event layout and select which sessions you wish to view

Live Stream On Demand

  • Browse stands
  • Set appointments
  • Watch online demos in networking area



Conference Chair’s Opening Address

David Terrar, Director and Chair, Cloud Industry Forum

View Profile

Universal Privilege Management: Secure Every Privilege, Every Time

Charlie Wood, Regional Sales Manager, BeyondTrust

View Profile

Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment; once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage. Enterprises of all sizes have experienced a privilege explosion, driven by trends like cloud computing, DevOps, and edge computing, and the proliferation of non-human identities and accounts. As a result, privileged access is pervasive across the modern IT environment, yet it is often inadequately managed and monitored. Many organizations assume that password management will solve the privilege problem—but it’s only a partial solution.

In this 15 minute session, learn about Universal Privilege Management, and how it is used to secure every user, session, and asset across your IT environment. Charlie will cover:

• Why relying on password management alone leaves dangerous gaps in protection
• Disrupting the cyberattack chain with privileged access security controls
• Keys to a frictionless PAM solution that is invisible to end users

Business Roles and Least Privilege: (Re-)Balancing Risks and Efficiency

Oliver Briese, IAM Project Lead & Head of SoD, Deutsche Kreditbank AG (DKB)

View Profile

Markus Duda, External Project Manager, Deutsche Kreditbank AG (DKB)

View Profile

In today’s advanced and distributed IT landscapes business roles (BR) is the means to cope with the size and complexity of user access

rights. Building BRs means a constant struggle to fulfil conflicting interests such as least privilege, need to know, segregation of duty and reducing building and provisioning efforts. As of late auditors have also been stressing the importance of least privilege.

We will therefore show a risk-oriented approach on how to harmonize the contradicting goals.

Choosing the Right IAM solution for your Hybrid Cloud

Matt Berzinski, Senior Director, Product Management, ForgeRock

View Profile

Digital transformation, competitive advantage, and saving money are driving factors for any organisation moving to the cloud. However, many organisations still need to support their legacy applications, running on premises, that are providing business critical functionality. To support and secure this reality and enable a smooth migration to the cloud, you need a comprehensive Hybrid cloud IAM strategy today.

In this session we will cover:

  •  Realities of hybrid cloud
  •  IAM strategies to secure them
  • Customer use case
  • Browse stands
  • Set appointments
  • Watch online demos in networking area



Welcome to session two

David Terrar, Director and Chair, Cloud Industry Forum

View Profile

How to go from traditional IAM to Modern Identity Governance

Mark Vermeulen, Regional Director, Omada

View Profile

 The IAM market has matured and there is an increased demand for cloud architected IGA solutions. Today\’s CIOs demand a reduced time to value and many are convinced that a cloud first strategy will take them there. This transition is happening rapidly and leading analysts predict that by 2022 SaaS delivered IGA solutions will replace 75% of existing software-delivered IGA implementations globally.

In this session you will learn: – Key success factors for an IGA project and how SaaS improves TCO and TTV – How modern SaaS delivered IGA can accelerate implementation of IGA best practice processes – How to master governance and compliance with automated processes and reports

How to convince your organisation that effective IAM is its top priority

Ian Evans, IAM Expert, Hargreaves Lansdown

View Profile

You know that effective IAM is crucial for your organisation’s survival. But how do you convince others? Ian draws on his dual experience of client-side IAM and influencing/ presenting/ negotiating to propose approaches that could prove useful:

  • Structuring an IAM proposal
  • Real-world examples of good and bad IAM outcomes
  • The benefits and costs of IAM – and the alternatives
  • Likely questions and objections to an IAM proposal
Is it time to Re-Think Identity?

Hans-Robert Vermeulen, SaaS Solution Specialist, EMEA, SailPoint

View Profile

We live in a world where identity must adapt in near real-time to stay aligned with today’s dynamic business environment, in this presentation you will hear about the very real challenges business are facing today and how SailPoint will dramatically simplifying the future of identity.

Questions To The Panel Of Speakers



Welcome to session three

David Terrar, Director and Chair, Cloud Industry Forum

View Profile


Growing Need for Identity and Access Management to Support Digital Business Initiatives

Niamh Muldoon Senior Director, Trust and Cybersecurity, EMEA OneLogin

View Profile

This session looks at the future of identity management and looks at how CISOs can make sense of this rapidly evolving landscape.


Denise Beardon, Head of Information Security Engagement, Pinsent Masons

View Profile

Hannah Tufts, Cyber Security Awareness Specialist, Pinsent Masons

View Profile

For too long phishing simulation programmes have focused on the minutiae of ‘lookout for poor spelling, hover over that link’ rather than addressing the fundamental reasons behind why someone clicks on a link.

By engaging partners and employees in an empathetic way and exploring neuroscientific insights into habits and behaviours, Pinsent Masons have introduced a new approach to their phishing simulation using positive reinforcement.

In this presentation we explore:

  • Why awareness should focus on good security-related behaviour
  • Educating through empathy
  • Why phishing emails trigger our happy (neuro) hormones
  • The importance of building confidence
Security and the Cloud: The Missing Ingredient? Identity

Max Faun, Head of EMEA Consulting, Okta

View Profile

Mobile and cloud proliferation has exposed organisations to much higher risks for potential hacks and attacks. The traditional perimeter is crumbling under the weight of these threats, making it imperative to re-examine traditional security approaches. IAM must now take centre stage to defend against identity-based security breaches. This session will discuss the best practices and success factors to dramatically reduce attack surfaces and vectors.

Questions to the Panel of Speakers
sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
online session four



Seminars A-D

Delegates can attend one of the sessions below ‘live’ and the reminder ‘on demand’ post event

CLICK HERE to view seminars

sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
online session five



Seminars E - H

Delegates can attend one of the sessions below ‘live’ and the reminder ‘on demand’ post event

CLICK HERE to view seminars

sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
online session six



welcome to session six

David Terrar, Director and Chair, Cloud Industry Forum

View Profile


A Case Study on Fixing the JML (Joiners, Movers, Leavers) Process – not a journey for the faint-hearted

Ralph Loewen, CEO, Itergy 

View Profile

The JML (Joiners, Movers, Leavers)  process was already a demanding one before the pandemic, and the challenge has only increased.  How do you integrate multiple processes, supply chains and departments into a seamless, automated workflow?  Is there any hope?  The corporate closet is full of identity and SSO skeletons of projects that never made it to the end.  Learn from at least one of our customers who successfully brought their JML process down from weeks to days, and how HR and IT are finally realizing positive results.

IAM Delivery with DevOps

Vilma Blomberg, IAM Solution Design Owner, KONE

View Profile

IAM programmes are traditionally slow and expensive multi-year investments for organizations. Today organizations must be able to adapt fast to changes in the IAM environment and implement IAM solutions faster with lower cost.

Organizations could accelerate and automate the delivery of value from IAM by using DevOps principles and mechanisms… but how?

A solution to this challenge will be presented by using a case study on how to adopt DevOps in IDM (SailPoint IIQ) delivery in a large corporation.

  • IAM is a business-critical area of IT that is heavily driven by security risk management
  • IDM system must be highly configured and customized to meet organizations’ requirements and to become an IAM solution that brings value to the organization
  • Today organizations must deliver these solutions faster and cheaper than ever to meet business, security and regulatory requirements
  • Automated DevOps pipeline can be built to automate IAM deployments, shorten the release cycles and speed up the resolution time of the incident
The Modern IT Dilemma - Delivering Work from Anywhere Identity Management

Nelson Cicchitto, Founder and CEO, Avatier Corporation

View Profile

The world has never faced such a shift in how and where we work due to the global pandemic we are facing now. How we consume identity management services needs to be modernized to support this digital transformation. This presentation will explore how a universal identity management user experience revolutionizes how fast workflow requests are approved, access certification reviews are conducted, and new integrated ways to securely but quickly access cloud applications.

questions to the panel
sessions close for networking
Virtual Summit Closes

Virtual platform stays ‘live’ for one month

Please note:
Whitehall Media reserve the right to change the programme without prior notice.