Programme @

IDM uk

Identity Management

9 November 2021

Business Design Centre, London

Programme @ IDM uk

Session one

the people, principles and processes which make up a successful IAM enterprise

  • How to become a better communicator: collaboration is key
  • Starting an IAM programme: how to succeed in project management
  • Accounting for the privacy-personalisation conundrum
  • Scoring your IAM maturity against your business needs
  • Understanding the value of PAM: protecting every privilege in every setting
  • IAM for the people! How to govern in the digital age

09:00

Conference Chair's Opening Address

09:15

How to become a better communicator: collaboration is key

A significant issue for IAM leaders is effectively communicating security concerns and establishing sustainable lines of communication.

 

In place of clear, accessible, and business relevant information, cyber security professionals often fall back on terminologies which fail to align with business goals situated outside of the IT function.

We address, the benefits of communication, the consequences of miscommunication, and how to bring together IAM practitioners and other business elements.

09:35

Starting an IAM programme: how to succeed in project management

Many organisations still rely on manual forms of IAM process management despite the availability of technology-assisted tools which enable project progression and create the space for human-led technical innovation.

One of the primary reasons for a lack of initiative is an inability to envisage how to move from the identification of an inefficiency to its resolution through the deployment of the right technology and the empowerment of the right people.

We address:

  • What you need to initiate
  • Taking that initial step
  • Real-world examples of best practice
  • What a well-run programme looks like

09:50

Accounting for the privacy-personalisation conundrum

Digital experiences which take account of an end user’s unique digital characteristics in order to deliver on expectations, whilst ensuring the privacy and security of both the organisation and the individual is not compromised, is one of the most important tasks within the enterprise IAM space.

We look at:

  • Transparent engagement
  • Choice and control for all parties
  • Equal value exchanges
  • Structured consent and lifecycle management
  • Profile and privacy management at ease

10:05

Scoring your IAM maturity against your business needs

As IAM competencies mature, businesses are looking to enhance the means by which practitioners and the business stakeholders are able to better identify and optimise alignment with IT and business goals and needs.

We address, how to help IAM leaders to develop maturity roadmaps and action plans.

10:35

Questions to the Panel of Speakers

10:50

Refreshment Break Served in the Exhibition Area

11:30

Understanding the value of PAM: protecting every privilege in every setting

Today, the vast majority of breaches are conducted through the successful exploitation of privileged access. Once an enterprise has been breached, it is then playing host to any number of hostile actors who are then able to operate within your network, access sensitive data, install malware and funnel out business critical information to a wider audience.

Reducing your security risk means fully appreciating and understanding the value that PAM brings to your organisation.

We address:

  • The pervasiveness of PAM across the enterprise
  • Accounting for PAM technology trends
  • Advancing your managing and monitoring techniques
  • Deploying universal privilege management

11:45

IAM for the people! How to govern in the digital age

As the IAM market continues to evolve at a rapid rate, extra demands are being placed on IAM governance models lacking in sustainability.

The driving force behind the need to amend existing IAM governance frameworks  is increased demand for cloud enabled IGA solutions, a quicker time to value expectation and enterprise migration away from on-prem software to the cloud.

We address, how SaaS delivered IGA can automate processes and reports which deliver on your governance and compliance needs and respond in real time to protocol violations with built-in automated workflow management.

12:00

Questions to the Panel of Speakers and Delegates move to the Seminar Rooms

12:15

Seminar Sessions

13:00

Networking Lunch Served in the Exhibition Area

Session two

deploying the right technology to where it is needed most

  • Mapping your customer base: architecting an identity graph
  • Supporting your mobile workforce: mobile identity platforms
  • Password-less authentication: achieving the required distribution
  • Make privacy matter: adopting an always-on approach
  • Adopting a hierarchical order of system control: ABAC and RBAC
  • Accelerate the adoption of a decentralised identity platform

14:00

Conference Chair’s Afternoon Address

14:05

Mapping your customer base: architecting an identity graph

One of the ways in which businesses can better manage customer identity and access demands and consolidate their identifiers is with the deployment of an architected data warehouse which takes account of the many points of contact that customer digital identities have within the enterprise network and the digital prints they leave behind.

We address:

  • Deploying an identity graph
  • Identity as a multi-faceted asset
  • Privacy-compliant identification
  • Creating greater linkage between business and customers
  • Establishing a universal ID

14:20

Supporting your mobile workforce: mobile identity platforms

2020 was the year in which mobile working became much more established for businesses, with many now having chosen to either keep the majority of its workforce remote or to move away from the office entirely.

This development, for all its positives, has also made the job of IAM leaders more difficult as the enterprise ecosystem has taken on a more complex, varied, and layered outlook.

We address:

  • Identifying users and devices in a mobile landscape
  • Convergence of mobility management and IAM technologies
  • Implications of this ‘new normal’ for the digital workplace

14:35

Password-less authentication: achieving the required distribution

Passwords are increasingly faced with either becoming a component of an MFA strategy or being eliminated from the IAM process entirely.

The driving force behind the effort to create a truly passwordless platform is to improve user and customer experience, add security layers and address the fact that users have still not improved how we manage our password portfolios.

We address, how to adopt a universal approach to passwordless authentication, better manage the technology constraints you will encounter, and understand what the best model for your business is in order to derive the most value.

14:50

Questions to the Panel of Speakers

15:00

Afternoon Networking and Refreshments served in the Exhibition Area

15:30

Make privacy matter: adopting an always-on approach

Organisations like Cambridge Analytica once boasted of their capability to mine, link, and exploit the data of billions of Facebook users in the service of a premium customer with devious motivations. Today, with public knowledge of this type of exploitation growing, customers are demanding businesses limit the possibility of their digital identities being subject to misuse.

We address:

  • Implementing a zero-trust approach to IT security
  • Adopting a CARTA strategic approach to security and risk
  • Continuous security assessments
  • Prevent internal fraud from insider threats
  • Achieve a more private space for customer interaction

15:45

Adopting a hierarchical order of system control: ABAC and RBAC

As authorisation architecture evolves at an impressive rate in response to the trend towards greater digitisation of workloads in hybrid IT environments, IAM leaders are having to design and orchestrate greater linkage between their RBAC and ABAC hierarchy.

We address, how to create a dynamic authorisation environment which will support the ever-expanding need to facilitate fine grain access.

16:00

Accelerate the adoption of a decentralised identity platform

Our online identity is, in many respects, a multi-dimensional entity which is stored across a myriad of platforms. Where exactly our digital personas are stored is for most of us a mystery.

Not knowing where our identity is and who has access to it makes our data highly vulnerable as hackers are constantly on the hunt for honey pots to exploit personal information.

We address:

  • The vulnerabilities of aggregated online systems
  • Rethinking how identity solutions interact with one another
  • Embedding digital identities in modern transactions
  • Removing identity mediators
  • Moving control points to the edge of the network
  • Blockchain identity as a trust enabler

16:15

Questions to the Panel of Speakers

16:25

Closing Remarks from the Conference Chair

16:30

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Amazon Trials at Hand
In a progressive step for the online retail giant, Amazon has presented a new and improved contactless payment service currently being trialled is US Amazon Go stores. Amazon One The new biometric scanner is the hope to streamline contactless payment security as well as physical access for consumers. Labelled as Amazon One, the device scans...
Remote workers on the front line: access to sensitive data and its security implications
Remote workers needing access to sensitive data and their security implications Following the overwhelming success of IDM Europe and ECS UK, we were delighted once again with the outcome of our Government IT Security virtual conference, which was held on the 23rd of September. During this event, delegates were enlightened by our guest speakers who...
Fixing the cybersecurity shortage
Our Annual Enterprise Cyber Security Virtual Conference was held on the 22nd of September. At this event, our guest speakers were able to express their personal and professional opinions in regards to their organisational roles and responsibilities In addition, our industry partners had the opportunity to expand their client base and delegates were able to...