SOCIAL


LATEST TWEETS

SEMINARS

Evaluate cutting-edge technology and solution providers through our Live Web Seminars by attending solution provider sessions. Connect with your fellow IAM and IT security leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest IAM innovations.

All sessions will be available on-demand after, so you won’t miss anything. Session times are subject to change. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend two seminars at the event ‘live’ as they will run in two sessions.
All event footage will be available on demand for a maximum of 2 hours after the session has closed.

SESSIONS

SEMINAR A

Session Four @ 13:30
Sponsored by:
The Future of Identity Governance: AI-Driven Identity Analytics

Tim Bedard, Sr. Director, Product Marketing, ForgeRock


View Profile

Dennis Haake, Sr. Solution Architect, ForgeRock


View Profile

Global organizations are under constant regulatory compliance pressure while trying to reduce costs and mitigate security risks. As a result, security and risk professionals are struggling to manage existing identity governance solutions and manually keep up with thousands of access requests, approvals and reviews every day. Combined with problematic role-based access controls (RBAC), this is even tougher to manage as more and more employees are working remotely.

With existing identity governance solutions failing, a new, much needed approach is emerging.  Artificial intelligence (AI)-driven identity analytics solutions are helping to identify security and access blind spots, enabling organizations to quickly understand who has access to what, and more importantly, why.

Join ForgeRock to hear why AI-driven identity analytics is the future of identity governance and how they help to reduce costs, mitigate risks, and automate user access privileges.

In this webinar, you will learn:

  • Understand market trends, business challenges and use cases
  • Learn why existing identity solutions are falling short
  • How to increase the business value of existing Identity Governance investments
  • What to look for in an AI-driven identity analytics solution
  • What customer success looks like

Live Stream On Demand

SEMINAR B

Session Four @ 13:30
Sponsored by:
The Anatomy of Credential Stuffing Attack

Jamie Hughes, Lead Solutions Engineer, UKI, Middle East & South Africa, Auth0


View Profile

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue. In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

Join Jamie Hughes, Lead Solutions Engineer, UKI, Middle East & South Africa at Auth0, to learn:

– How credential stuffing attacks work
– What effect they can have on your company

Live Stream On Demand

SEMINAR C

Session Four @ 13:30
Sponsored by:
Intelligent Identity Management: The Role of AI and Automation in the Identity Journey

Andree Niebuhr, Head of IAM and SAP Compliance, Wienerberger AG 


View Profile

Yash Prakash, Chief Operating Officer, Saviynt 


View Profile

The rise of artificial intelligence (AI) and automation in identity access management (IAM) increases effectiveness (risk-based) and drives efficiency throughout the identity process. Intelligent insights simplify organizations’ identity journey, eliminate confusion and fatigues through anticipatory guidance and collaborations, and enable automatic decisions at scale.

In this session, Saviynt Chief Operating Officer Yash Prakash is joined by Wienerberger AG’s Head of IAM and SAP Compliance, Andree Niebuhr. They’ll discuss Wienerberger’s recent KuppingerCole award-winning IAM implementation, the role of IAM in its digital transformation strategies, the effect it had on compliance initiatives, and how the latest AI and automation capabilities impact the organization.

Live Stream On Demand

SEMINAR D

Session Four @ 13:30
Sponsored by:
Presentation Title: Identity and Access Management Strategies That Grow with Your Business: Path to IGA and PAM

Robert Byrne, Sales Engineer, One Identity by Quest


View Profile

For organizations that may not be in a position to go all-in on Identity Governance & Administration (IGA), account and group administration for their hybrid AD environment may be an ideal first step.

For these organizations, an adaptable hybrid Active Directory-centered  approach can address many  high impact areas such as account lifecycle management, least privileged administrator access, and zero trust. By adding cloud-based identity services such as access request and access certification a very large portion of the elusive IGA and PAM utopias can be realized quicker, simpler, and at an affordable price.

This session discusses easily implemented and high-impact ways to:

  • Automate the user, account, and group lifecycle management needs of your AD and Azure AD environments – and beyond
  • Lay the foundation for enterprise identity governance and administration
  • Solve the PAM needs of hybrid AD while forging a successful path to full enterprise PAM
  • Set up your identity security program for ongoing success

Learn how to build a strategy for a right-sized and modular approach to identity security that can be custom fit to your requirements, size, complexity, and budget.

Live Stream On Demand

SEMINAR E

Session Five @ 14:30
Sponsored by:
Why Just-in-Time (JIT) Privileged Access is the Next Big Step in Risk Reduction

Ian Pitfield, Senior Solutions Engineer, BeyondTrust


View Profile

A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using Privileged Access Management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. Today, powerful accounts with always-on (24×7) privileged access proliferate across enterprises. The privileges of these accounts are always in an active mode—for both legitimate use and misuse.

Just-in-Time (JIT) Administration is an approach in which organizations dynamically assign privileges to accounts and assets to ensure identities only have the appropriate privileges when necessary, and for the least time necessary. Adopting JIT as part of your PAM approach means you can implement a true least-privilege model across your enterprise. Join this session to understand how to: – Significantly reduce your organization’s threat surface by shifting from an always-on privileged access model to a JIT approach – Identify use cases where JIT PAM is an absolutely necessity – Choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide

Live Stream On Demand

SEMINAR F

Session Five @ 14:30
Sponsored by:
6 Keys to Risk-based Assurance for the Remote Workforce and Security Operations

Murtaza Hafizji, Senior Go To Market Advisor, RSA


View Profile

Gerald Aubel, IG&L Go To Marketing Consultant, RSA


View Profile

Organisations that set up “temporary” remote workers and virtual security operations are now contemplating if their organizations are fully protected and optimized. Those that are still transforming or planning for a longer-term impact are exploring how to do so effectively and securely. Wherever you are in your journey, this presentation will provide you with six key considerations for risk-based assurance that will improve protection, productivity, and compliance. Get best practices, actionable steps and tools you can use to address today’s challenges and tomorrow’s opportunities.

Live Stream On Demand

SEMINAR G

Session Five @ 14:30
Sponsored by:
Why Your Organisation Needs An Authentication Authority

Daniel Le Hair, Solutions Architect, Ping Identity


View Profile

The average enterprise has thousands of applications and that number only continues to rise. As organisations rapidly onboard these new resources in an effort to stay competitive, unintended authentication silos have emerged. That has resulted in a patchwork environment that is difficult to maintain, and for employees, more logins and passwords to keep track of. The operational headaches and password sprawl limit productivity, increase security risk and prevent digital transformation initiatives from taking flight. But it does not have to be this way. Join us for this session about why organisations need a workforce authentication authority, and how it delivers simplified authentication to your workforce with lasting benefits.

Live Stream On Demand