Seminars
Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.
Delegates will be able to attend one seminar live at the event. No pre-selection is required – delegates will be able to select which session they attend live and watch the remainder on demand.
CLICK HERE to enter the virtual environment to view the seminars.
Seminar A – ForgeRock – Zero trust and Battling Insider Threats
SEMINAR
A
Eve Maler, CTO, ForgeRock
Allan Foster, Chief Evangelist, ForgeRock
Remote work has soared, and organisations are facing rapid change in their workforces. What\\\’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities?
Attend this engaging session to learn more about:
– All the ways digital identity impacts today’s enterprise
– How you can nurture cyber resilience
– The practical realities of implementing least privilege in identity and access management systems …and more
SEMINAR A
Eve Maler, CTO, ForgeRock
Allan Foster, Chief Evangelist, ForgeRock
Remote work has soared, and organisations are facing rapid change in their workforces. What\\\’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities?
Attend this engaging session to learn more about:
– All the ways digital identity impacts today’s enterprise
– How you can nurture cyber resilience
– The practical realities of implementing least privilege in identity and access management systems …and more


Eve Maler
CTO, ForgeRock
view profile
Allan Foster
Chief Evangelist, ForgeRock
view profileRoom / Location:
Session 4 @ 13:45
Seminar B – Venafi – Rise of Machines: Protecting your Machine Identities
SEMINAR
B
Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
The number of machines of all types is on the rise. Every machine requires an identity.
However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors create debilitating outages and millions in lost business. That’s why leading analysts are recommending Machine Identity Management as a top security trend.
Attend this session to learn three things your organisation can do to secure Machine Identities.
SEMINAR B
Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
The number of machines of all types is on the rise. Every machine requires an identity.
However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors create debilitating outages and millions in lost business. That’s why leading analysts are recommending Machine Identity Management as a top security trend.
Attend this session to learn three things your organisation can do to secure Machine Identities.


Kevin Bocek
Vice President, Security Strategy and Threat Intelligence, Venafi
view profileRoom / Location:
Session 4 @ 13:45
Seminar C – Auth0 – The Login Experience Customers Want
SEMINAR
C
Domanic Smith-Jones, Solutions Engineer, Auth0
Consumers around the world are becoming more educated on best practices, and are increasingly considering how application and service providers implement and manage identity when deciding whether to interact with and share their personal information. Auth0 and YouGov’s recently published global research, ‘The Login Experience Customers Want’, reveals that most businesses fail to meet consumer expectations around login technology, and risk frustrating their users and losing sales, as more than 8 in 10 consumers abandon carts or apps due to arduous login experiences.
In this session, Domanic Smith-Jones, Solutions Engineer at Auth0, will discuss:
– The widening gap in consumer expectations.
– What this means for the identity management landscape.
– How the desire for convenience and security is driving consumers to seek out modern identity solutions.
– How you can deliver both convenience and security without compromise
SEMINAR C
Domanic Smith-Jones, Solutions Engineer, Auth0
Consumers around the world are becoming more educated on best practices, and are increasingly considering how application and service providers implement and manage identity when deciding whether to interact with and share their personal information. Auth0 and YouGov’s recently published global research, ‘The Login Experience Customers Want’, reveals that most businesses fail to meet consumer expectations around login technology, and risk frustrating their users and losing sales, as more than 8 in 10 consumers abandon carts or apps due to arduous login experiences.
In this session, Domanic Smith-Jones, Solutions Engineer at Auth0, will discuss:
– The widening gap in consumer expectations.
– What this means for the identity management landscape.
– How the desire for convenience and security is driving consumers to seek out modern identity solutions.
– How you can deliver both convenience and security without compromise
Seminar D – One Identity – Distributed Privilege in a Distributed World
SEMINAR
D
Robert Byrne, Field Strategist, One Identity
It is a given that we operate now in a distributed multi-cloud world. This has brought many advantages in terms of accessibility and agility but comes with an expanded attack surface and increased risk. Experience is showing that most security failures are due to flaws in configuration and access management rather than flaws in IT software or platforms. This session explores how we can address these problems using next-gen approaches to Privilege and Identity Governance.
We will look at Privilege + Governance as applied to topics like remote privileged workers, Cloud Platforms, Third Parties and RPAs. The goal here is to substantially mitigate risk and enhance breach resiliency all these cases.
SEMINAR D
Robert Byrne, Field Strategist, One Identity
It is a given that we operate now in a distributed multi-cloud world. This has brought many advantages in terms of accessibility and agility but comes with an expanded attack surface and increased risk. Experience is showing that most security failures are due to flaws in configuration and access management rather than flaws in IT software or platforms. This session explores how we can address these problems using next-gen approaches to Privilege and Identity Governance.
We will look at Privilege + Governance as applied to topics like remote privileged workers, Cloud Platforms, Third Parties and RPAs. The goal here is to substantially mitigate risk and enhance breach resiliency all these cases.
Seminar E – BeyondTrust – Building Cybersecurity Immunity to Ransomware with PAM
SEMINAR
E
James Maude, Lead Cyber Security Researcher, BeyondTrust
Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them.
Attend this session to learn:
• 6 things to know about ransomware
• Realistic security practices you can implement to protect against ransomware
• The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.
SEMINAR E
James Maude, Lead Cyber Security Researcher, BeyondTrust
Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them.
Attend this session to learn:
• 6 things to know about ransomware
• Realistic security practices you can implement to protect against ransomware
• The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.


James Maude
Lead Cyber Security Researcher, BeyondTrust
view profileRoom / Location:
Session Five @ 14:45
Seminar F – ThirdSpace – How to Avoid the Human Trojan Horse with Microsoft Identity Governance
SEMINAR
F
Marcus Idle, Head of External Identity, ThirdSpace
If the story of Troy has taught us anything, it’s that the most dangerous threats can arise from enemies you unwittingly invite into your organisation.
Businesses spend a lot of time and money building cutting edge cyber defences around critical systems, infrastructure and sensitive data. But all too often the importance of strong identity governance can be overlooked – is this your Achilles’ heel?
In this session ThirdSpace’s Identity Governance Expert, Marcus Idle demonstrates the newest B2B Access and Identity Governance functionality now available within Microsoft’s Azure Active Directory. Discover how to improve security and reduce insider risks through focusing on improved access governance.
You’ll learn:
-
- How Azure AD B2B can be used to securely grant (and manage) guest user access into your environment
- How Azure governance features such as access packages, entitlements management, access reviews and privileged access work in practice – INCLUDING A STEP-BY-STEP DEMO
- Real life stories of organisations that have overcome security challenges with improved identity governance
SEMINAR F
Marcus Idle, Head of External Identity, ThirdSpace
If the story of Troy has taught us anything, it’s that the most dangerous threats can arise from enemies you unwittingly invite into your organisation.
Businesses spend a lot of time and money building cutting edge cyber defences around critical systems, infrastructure and sensitive data. But all too often the importance of strong identity governance can be overlooked – is this your Achilles’ heel?
In this session ThirdSpace’s Identity Governance Expert, Marcus Idle demonstrates the newest B2B Access and Identity Governance functionality now available within Microsoft’s Azure Active Directory. Discover how to improve security and reduce insider risks through focusing on improved access governance.
You’ll learn:
-
- How Azure AD B2B can be used to securely grant (and manage) guest user access into your environment
- How Azure governance features such as access packages, entitlements management, access reviews and privileged access work in practice – INCLUDING A STEP-BY-STEP DEMO
- Real life stories of organisations that have overcome security challenges with improved identity governance
Seminar G – Saviynt – Navigating the Modern Identity Landscape
SEMINAR
G
Chris Owen, Director of Product Management, Saviynt
Identity isn’t what it was a decade ago. Changes in the technology and regulatory landscape, user behaviour, and organisational priorities have transformed it from a compliance-oriented discipline to a business enabler — and often a board-level initiative. It has also become the first step to adopting a modern Zero Trust maturity model.
New technology has impacted the way identity is perceived and practiced, accelerating the need for digital transformation. As a result, we see trends in technology convergence, cloud transformation, software simplification, intelligent automation, and business optimisation. Starting with the right strategy is critical for navigating today’s complex security landscape and setting your organisation up for success.
Current trends & challenges we’ll be covering:
- Leading factors influencing identity transformation
- Top trends driving industry change, plus predictions
- Benefits of modernising IAM solutions and practices
- Key lessons learned
- Insight on common pitfalls and winning strategies
SEMINAR G
Chris Owen, Director of Product Management, Saviynt
Identity isn’t what it was a decade ago. Changes in the technology and regulatory landscape, user behaviour, and organisational priorities have transformed it from a compliance-oriented discipline to a business enabler — and often a board-level initiative. It has also become the first step to adopting a modern Zero Trust maturity model.
New technology has impacted the way identity is perceived and practiced, accelerating the need for digital transformation. As a result, we see trends in technology convergence, cloud transformation, software simplification, intelligent automation, and business optimisation. Starting with the right strategy is critical for navigating today’s complex security landscape and setting your organisation up for success.
Current trends & challenges we’ll be covering:
- Leading factors influencing identity transformation
- Top trends driving industry change, plus predictions
- Benefits of modernising IAM solutions and practices
- Key lessons learned
- Insight on common pitfalls and winning strategies
Seminar H – IC Consult – The IAM Cloud Journey – Your Path to the Cloud
SEMINAR
H
Gavin Brown, Sales Director UK, iC Consult UK
Join us for a discussion around the drivers for moving IAM into the cloud, the benefits and challenges of opting for Cloud-based IAM, the main options available and how to choose the path to Cloud that is best suited to your organisation.
We will share insights from a wide variety of IAM projects and explain the value of a structured roadmap to help IAM stakeholders and their organisations to plan and align their cloud journey. We will also detail the processes involved in creating an IAM roadmap, including a preparation and migration plan.
Join this session to:
- Understand the importance of a modern IAM system
- Hear about the benefits and challenges of moving IAM to the Cloud
- Explore the options for adopting a Cloud-based IAM solution
- Learn how to prepare to launch a new IAM Cloud project
- Discover how structured roadmap to Cloud IAM is created
- Find out how managed services for IAM can support your Cloud journey
SEMINAR H
Gavin Brown, Sales Director UK, iC Consult UK
Join us for a discussion around the drivers for moving IAM into the cloud, the benefits and challenges of opting for Cloud-based IAM, the main options available and how to choose the path to Cloud that is best suited to your organisation.
We will share insights from a wide variety of IAM projects and explain the value of a structured roadmap to help IAM stakeholders and their organisations to plan and align their cloud journey. We will also detail the processes involved in creating an IAM roadmap, including a preparation and migration plan.
Join this session to:
- Understand the importance of a modern IAM system
- Hear about the benefits and challenges of moving IAM to the Cloud
- Explore the options for adopting a Cloud-based IAM solution
- Learn how to prepare to launch a new IAM Cloud project
- Discover how structured roadmap to Cloud IAM is created
- Find out how managed services for IAM can support your Cloud journey
Seminar I – Okta – Identity Enables Digital Trust
SEMINAR
I
Craig Perrett, Global Head of Identity Architecture, WPP
Max Faun, Head of EMEA Consulting & Ian Lowe, Director of Industry Solutions, Okta
The way we work has changed forever. With hybrid offices fast becoming the new normal, employees today expect the freedom to work wherever works for them, and organisations must find a way to deliver that freedom without jeopardising security. In this context, digital trust becomes a top priority, and identity is its key enabler.
Join us to discuss:
How hybrid work is transforming the enterprise landscape
Why trust is crucial for balancing the scale between freedom and security
What role identity plays in enabling trust in the digital era
SEMINAR I
Craig Perrett, Global Head of Identity Architecture, WPP
Max Faun, Head of EMEA Consulting & Ian Lowe, Director of Industry Solutions, Okta
The way we work has changed forever. With hybrid offices fast becoming the new normal, employees today expect the freedom to work wherever works for them, and organisations must find a way to deliver that freedom without jeopardising security. In this context, digital trust becomes a top priority, and identity is its key enabler.
Join us to discuss:
How hybrid work is transforming the enterprise landscape
Why trust is crucial for balancing the scale between freedom and security
What role identity plays in enabling trust in the digital era


Craig Perrett
Global Head of Identity Architecture, WPP
view profile
Max Faun
Head of EMEA Consulting, Okta
view profile
Follow us on social
Keep up to date with what's going on by following us on social media.