Seminars @

IDM uk

Identity Management

9 November 2021

Brought to you by Whitehall Media

Seminars @ IDM uk

Seminars

Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Delegates will be able to attend one seminar live at the event. No pre-selection is required – delegates will be able to select which session they attend live and watch the remainder on demand.

 

CLICK HERE to enter the virtual environment to view the seminars.

Seminar A – ForgeRock – Zero trust and Battling Insider Threats

SEMINAR A

Eve Maler, CTO, ForgeRock
Allan Foster, Chief Evangelist, ForgeRock 

Remote work has soared, and organisations are facing rapid change in their workforces. What\\\’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities?

Attend this engaging session to learn more about:

– All the ways digital identity impacts today’s enterprise
– How you can nurture cyber resilience
– The practical realities of implementing least privilege in identity and access management systems …and more

Eve Maler
CTO, ForgeRock
view profile
Allan Foster
Chief Evangelist, ForgeRock
view profile
Room / Location:
Session 4 @ 13:45

Seminar B – Venafi – Rise of Machines: Protecting your Machine Identities

SEMINAR B

Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi

The number of machines of all types is on the rise. Every machine requires an identity.

However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors create debilitating outages and millions in lost business. That’s why leading analysts are recommending Machine Identity Management as a top security trend.

Attend this session to learn three things your organisation can do to secure Machine Identities.

Kevin Bocek
Vice President, Security Strategy and Threat Intelligence, Venafi
view profile
Room / Location:
Session 4 @ 13:45

Seminar C – Auth0 – The Login Experience Customers Want

SEMINAR C

Domanic Smith-Jones, Solutions Engineer, Auth0

Consumers around the world are becoming more educated on best practices, and are increasingly considering how application and service providers implement and manage identity when deciding whether to interact with and share their personal information. Auth0 and YouGov’s recently published global research, ‘The Login Experience Customers Want’, reveals that most businesses fail to meet consumer expectations around login technology, and risk frustrating their users and losing sales, as more than 8 in 10 consumers abandon carts or apps due to arduous login experiences.

In this session, Domanic Smith-Jones, Solutions Engineer at Auth0, will discuss:

– The widening gap in consumer expectations.
– What this means for the identity management landscape.
– How the desire for convenience and security is driving consumers to seek out modern identity solutions.
– How you can deliver both convenience and security without compromise

Domanic Smith-Jones
Solution Engineer, Auth0
view profile
Room / Location:
Session 4 @ 13:45

Seminar D – One Identity – Distributed Privilege in a Distributed World

SEMINAR D

Robert Byrne, Field Strategist, One Identity

It is a given that we operate now in a distributed multi-cloud world. This has brought many advantages in terms of accessibility and agility but comes with an expanded attack surface and increased risk. Experience is showing that most security failures are due to flaws in configuration and access management rather than flaws in IT software or platforms. This session explores how we can address these problems using next-gen approaches to Privilege and Identity Governance.

We will look at Privilege + Governance as applied to topics like remote privileged workers, Cloud Platforms, Third Parties and RPAs. The goal here is to substantially mitigate risk and enhance breach resiliency all these cases.

Robert Byrne
Field Strategist, One Identity
view profile
Room / Location:
Session 4 @ 13:45

Seminar E – BeyondTrust – Building Cybersecurity Immunity to Ransomware with PAM

SEMINAR E

James Maude, Lead Cyber Security Researcher, BeyondTrust

Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them.

Attend this session to learn:

• 6 things to know about ransomware

• Realistic security practices you can implement to protect against ransomware

• The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.

James Maude
Lead Cyber Security Researcher, BeyondTrust
view profile
Room / Location:
Session Five @ 14:45

Seminar F – ThirdSpace – How to Avoid the Human Trojan Horse with Microsoft Identity Governance

SEMINAR F

Marcus Idle, Head of External Identity, ThirdSpace

If the story of Troy has taught us anything, it’s that the most dangerous threats can arise from enemies you unwittingly invite into your organisation.

Businesses spend a lot of time and money building cutting edge cyber defences around critical systems, infrastructure and sensitive data. But all too often the importance of strong identity governance can be overlooked – is this your Achilles’ heel?

In this session ThirdSpace’s Identity Governance Expert, Marcus Idle demonstrates the newest B2B Access and Identity Governance functionality now available within Microsoft’s Azure Active Directory. Discover how to improve security and reduce insider risks through focusing on improved access governance.

You’ll learn:

    • How Azure AD B2B can be used to securely grant (and manage) guest user access into your environment
    • How Azure governance features such as access packages, entitlements management, access reviews and privileged access work in practice – INCLUDING A STEP-BY-STEP DEMO
    • Real life stories of organisations that have overcome security challenges with improved identity governance
Marcus Idle
Head of External Identity, ThirdSpace
view profile
Room / Location:
Session 5 @ 14:45

Seminar G – Saviynt – Navigating the Modern Identity Landscape

SEMINAR G

Chris Owen, Director of Product Management, Saviynt

Identity isn’t what it was a decade ago. Changes in the technology and regulatory landscape, user behaviour, and organisational priorities have transformed it from a compliance-oriented discipline to a business enabler — and often a board-level initiative. It has also become the first step to adopting a modern Zero Trust maturity model.

New technology has impacted the way identity is perceived and practiced, accelerating the need for digital transformation. As a result, we see trends in technology convergence, cloud transformation, software simplification, intelligent automation, and business optimisation. Starting with the right strategy is critical for navigating today’s complex security landscape and setting your organisation up for success.

Current trends & challenges we’ll be covering:

  • Leading factors influencing identity transformation
  • Top trends driving industry change, plus predictions
  • Benefits of modernising IAM solutions and practices
  • Key lessons learned
  • Insight on common pitfalls and winning strategies
Chris Owen
Director of Product Management, Saviynt
view profile
Room / Location:
Session 5 @ 14:45

Seminar H – IC Consult – The IAM Cloud Journey – Your Path to the Cloud

SEMINAR H

Gavin Brown, Sales Director UK, iC Consult UK

Join us for a discussion around the drivers for moving IAM into the cloud, the benefits and challenges of opting for Cloud-based IAM, the main options available and how to choose the path to Cloud that is best suited to your organisation.

We will share insights from a wide variety of IAM projects and explain the value of a structured roadmap to help IAM stakeholders and their organisations to plan and align their cloud journey. We will also detail the processes involved in creating an IAM roadmap, including a preparation and migration plan.

Join this session to:

  • Understand the importance of a modern IAM system
  • Hear about the benefits and challenges of moving IAM to the Cloud
  • Explore the options for adopting a Cloud-based IAM solution
  • Learn how to prepare to launch a new IAM Cloud project
  • Discover how structured roadmap to Cloud IAM is created
  • Find out how managed services for IAM can support your Cloud journey
Gavin Brown
Sales Director UK, iC Consult UK
view profile
Room / Location:
Session 5 @ 14:45

Seminar I – Okta – Identity Enables Digital Trust

SEMINAR I

Craig Perrett, Global Head of Identity Architecture, WPP
Max Faun, Head of EMEA Consulting & Ian Lowe, Director of Industry Solutions, Okta

The way we work has changed forever. With hybrid offices fast becoming the new normal, employees today expect the freedom to work wherever works for them, and organisations must find a way to deliver that freedom without jeopardising security. In this context, digital trust becomes a top priority, and identity is its key enabler.

Join us to discuss:

How hybrid work is transforming the enterprise landscape
Why trust is crucial for balancing the scale between freedom and security
What role identity plays in enabling trust in the digital era

Craig Perrett
Global Head of Identity Architecture, WPP
view profile
Max Faun
Head of EMEA Consulting, Okta
view profile
Ian Lowe
Director of Industry Solutions, Okta
view profile
Room / Location:
Session 5 @ 14:45

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Passwords are the problem!
By Frederic Klat | OneWelcome For companies in regulated industries, offering a flawless online experience for your customers is more important than ever. Once a customer sets up an account on your site, you must do everything you can to make sure they can easily access their information. It all starts with a smooth yet...
Sneak Preview of Omada at IDM UK
Blog by: Craig Ramsay | Omada Next week, we will be at IDM UK, speaking with attendees about what modern Identity Governance and Administration (IGA) means to us, and why more and more organizations are choosing to deploy IGA as a Service. The IDM event has a great agenda, and we are slotted to speak...
IAM workflows and how they benefit you
Blog By: Sidsel Loyche | neweratech To be effective, an IAM solution must faithfully model an organisation’s people, policies and processes. ​What does this look like for your organisation? A modern IAM solution achieves this using workflows. These manage your users’ identity lifecycles; provisions and deprovisions their access to the ever-growing list of IT resources; as well...